期刊文献+

Bipartite graph-based control flow checking for COTS-based small satellites 被引量:2

Bipartite graph-based control flow checking for COTS-based small satellites
原文传递
导出
摘要 Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites. Abstract Single event upset (SEU) effect, caused by highly energized particles in aerospace, threatens the reliability and security of small satellites composed of commercialofftheshelves (COTS). SEU induced control flow errors (CFEs) may cause unpredictable behavior or crashes of COTSbased small satellites. This paper proposes a generic softwarebased control flow checking technique (CFC) and bipartite graphbased control flow checking (BGCFC). To simplify the types of illegal branches, it transforms the conventional control flow graph into the equivalent bipartite graph. It checks the legal ity of control flow at runtime by comparing a global signature with the expected value and introduces consecutive IDs and bitmaps to reduce the time and memory overhead. Theoretical analysis shows that BGCFC can detect all types of internode CFEs with constant time and memory overhead. Practical tests verify the result of theoretical analysis. Compared with previous techniques, BGCFC achieves the highest error detection rate, lower time and memory overhead; the composite result in evaluation fac tor shows that BGCFC is the most effective one among all these techniques. The results in both theory and practice verify the applicability of BGCFC for COTSbased small satellites.
出处 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期883-893,共11页 中国航空学报(英文版)
基金 support from the National Natural Science Foundation of China the Fundamental Research Funds for the Central Universities of China
关键词 Bipartite graph Control flow checking Commercial-off-the-shelves(COTS) Error injection Fault tolerant Illegal branch Small satellites Bipartite graph Control flow checking Commercial-off-the-shelves(COTS) Error injection Fault tolerant Illegal branch Small satellites
  • 相关文献

参考文献3

二级参考文献10

共引文献9

同被引文献14

  • 1施寅生,邓世伟,谷天阳.软件安全性测试方法研究[J].微计算机信息,2008,24(3):56-58. 被引量:13
  • 2杨学军,高珑.错误流模型:硬件故障的软件传播建模与分析[J].软件学报,2007,18(4):808-820. 被引量:9
  • 3严蔚敏,吴伟民.数据结构[M].北京:清华大学出版社,2007.
  • 4陈涛.基于AHP与DEA的组合方法确定指标权重[J].科学技术与工程,2007,7(23):6143-6145. 被引量:39
  • 5Knight J C. Safety critical systems : Challenges and direc-tions [C]// Proceedings of the 24th Intemational Confer-ence on Software Engineering ( ICSE). 2002: 547-550.
  • 6Kloos J,Hussain T,Eschbach R. Risk-based testing of safe-ty-critical embedded systems driven by fault tree analysis[C]// Proceedings of the IEEE 4th Intemational Confer-ence on Software Testing, Verification and Validation(ICST 2011). 2011,26-33.
  • 7GJB/Z 142-2004. Guide for military software safety analy-sis. 2004 (in Chinese) [ EB/OL]. http://www.gjb.com.cn/standardshow. php. id = 682743,2015-11-09.
  • 8Cha S, Yoo J. A safety-focused verification using softwarefault trees [ J ]. Future Generation Computer Systems,2012,28(8) :1272-1282.
  • 9Mohamed_Larbi Rebaiaia, Daoud Ait_Kadi, Afshin Jam-shidi, et al. A combination of reliability calculus and im-portance measures for probability risk analysis[ C]// 20153rd Intemational Conference on Control, Engineering & In-formation Technology (CEIT). 2015 :l-6.
  • 10Hammer C,Snelting G. Flow-sensitive, context-sensitive,and object-sensitive information flow control based on pro-gram dependence graphs[ J]. Intemational Journal of Infor-mation Security, 2009,8(6) : 399-422.

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部