메뉴 건너뛰기




Volumn 8, Issue 5, 2011, Pages 640-655

Automated derivation of application-Specific error detectors using dynamic analysis

Author keywords

critical variables; Data errors; dynamic execution; FPGA hardware; likely invariants

Indexed keywords

COMPUTER HARDWARE; RECONFIGURABLE HARDWARE;

EID: 79960509775     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.19     Document Type: Article
Times cited : (30)

References (30)
  • 1
    • 0033688092 scopus 로고    scopus 로고
    • A static analyzer for finding dynamic programming errors
    • W.R. Bush et al., "A Static Analyzer for Finding Dynamic Programming Errors," Software Practice and Experience, vol. 30, pp. 775-802, 2000.
    • (2000) Software Practice and Experience , vol.30 , pp. 775-802
    • Bush, W.R.1
  • 2
    • 85011293817 scopus 로고
    • LCLint: A tool for using specifications to check code
    • D. Evans et al., "LCLint: A Tool for Using Specifications to Check Code," Proc. ACM SIGSOFT, pp. 87-96, 1994.
    • (1994) Proc. ACM SIGSOFT , pp. 87-96
    • Evans, D.1
  • 3
    • 0032639445 scopus 로고    scopus 로고
    • Dynamically discovering likely program invariants to support program evolution
    • M.D. Ernst et al., "Dynamically Discovering Likely Program Invariants to Support Program Evolution," Proc. 21st Int'l Conf. Software Eng., pp. 213-224, 1999.
    • (1999) Proc. 21st Int'l Conf. Software Eng. , pp. 213-224
    • Ernst, M.D.1
  • 4
    • 0036041420 scopus 로고    scopus 로고
    • Bugs as deviant behavior: A general approach to inferring errors in systems code
    • DOI 10.1145/502059.502041
    • D. Engler et al., "Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code," Proc. 18th ACM Symp. Operating Systems Principles, pp. 57-72, 2001. (Pubitemid 33612605)
    • (2001) Operating Systems Review (ACM) , vol.35 , Issue.5 , pp. 57-72
    • Engler, D.1    Chen, D.Y.2    Hallem, S.3    Chou, A.4    Chelf, B.5
  • 5
    • 1542359963 scopus 로고    scopus 로고
    • Characterization of linux kernel behavior under errors
    • W. Gu et al., "Characterization of Linux Kernel Behavior under Errors," Proc. Int'l Conf. Dependable Systems and Networks, pp. 459-468, 2003.
    • (2003) Proc. Int'l Conf. Dependable Systems and Networks , pp. 459-468
    • Gu, W.1
  • 7
    • 0001631180 scopus 로고
    • Software dependability in the tandem GUARDIAN system
    • May
    • I. Lee and R.K. Iyer, "Software Dependability in the Tandem GUARDIAN System," IEEE Trans. Software Eng., vol. 21, no. 5, pp. 455-467, May 1995.
    • (1995) IEEE Trans. Software Eng. , vol.21 , Issue.5 , pp. 455-467
    • Lee, I.1    Iyer, R.K.2
  • 9
    • 0025414676 scopus 로고
    • The use of self checks and voting in software error detection: An empirical study
    • Apr.
    • N.G. Leveson et al., "The Use of Self Checks and Voting in Software Error Detection: An Empirical Study," IEEE Trans. Software Eng., vol. 16, no. 4 pp. 432-443, Apr. 1990.
    • (1990) IEEE Trans. Software Eng. , vol.16 , Issue.4 , pp. 432-443
    • Leveson, N.G.1
  • 10
    • 0029715105 scopus 로고    scopus 로고
    • Experimental evaluation of the fail-silent behaviour in programs with consistency checks
    • M.Z. Rela et al., "Experimental Evaluation of the Fail-Silent Behaviour in Programs with Consistency Checks," Proc. Ann. Symp. Fault-Tolerant Computing, pp. 394-403, 1996.
    • (1996) Proc. Ann. Symp. Fault-Tolerant Computing , pp. 394-403
    • Rela, M.Z.1
  • 11
    • 0034590170 scopus 로고    scopus 로고
    • Executable assertions for detecting data errors in embedded control systems
    • M. Hiller, "Executable Assertions for Detecting Data Errors in Embedded Control Systems," Proc. Int'l Conf. Dependable Systems and Networks, pp. 24-33, 2000.
    • (2000) Proc. Int'l Conf. Dependable Systems and Networks , pp. 24-33
    • Hiller, M.1
  • 12
    • 0036930706 scopus 로고    scopus 로고
    • On the placement of software mechanisms for detection of data errors
    • M. Hiller et al., "On the Placement of Software Mechanisms for Detection of Data Errors," Proc. Int'l Conf. Dependable Systems and Networks, pp. 135-144, 2002.
    • (2002) Proc. Int'l Conf. Dependable Systems and Networks , pp. 135-144
    • Hiller, M.1
  • 13
    • 34547396006 scopus 로고    scopus 로고
    • Dynamic derivation of application-specific error detectors and their implementation in hardware
    • K. Pattabiraman et al., "Dynamic Derivation of Application-Specific Error Detectors and Their Implementation in Hardware," Proc. Sixth European Dependable Computing Conf., pp. 97-108, 2006.
    • (2006) Proc. Sixth European Dependable Computing Conf. , pp. 97-108
    • Pattabiraman, K.1
  • 15
    • 84881290765 scopus 로고
    • A study of the effects of transient fault injection into a 32-Bit RISC with built-in watchdog
    • J. Ohlsson et al., "A Study of the Effects of Transient Fault Injection into a 32-Bit RISC with Built-In Watchdog," Proc. 22nd Int'l Symp. Fault-Tolerant Computing, pp. 316-325, 1992.
    • (1992) Proc. 22nd Int'l Symp. Fault-Tolerant Computing , pp. 316-325
    • Ohlsson, J.1
  • 17
    • 0022565113 scopus 로고
    • Why do computers stop and what can be done about it?
    • J. Gray, "Why Do Computers Stop and What Can Be Done About It?" Proc. Symp. Reliable Distributed Systems, pp. 3-12, 1986.
    • (1986) Proc. Symp. Reliable Distributed Systems , pp. 3-12
    • Gray, J.1
  • 18
    • 0011730564 scopus 로고    scopus 로고
    • Software testability measurement for intelligent assertion placement
    • J. Voas, "Software Testability Measurement for Intelligent Assertion Placement," Software Quality Control, vol. 6, pp. 327-336, 1997.
    • (1997) Software Quality Control , vol.6 , pp. 327-336
    • Voas, J.1
  • 19
    • 4544387534 scopus 로고    scopus 로고
    • An architectural framework for providing reliability and security support
    • N. Nakka et al., "An Architectural Framework for Providing Reliability and Security Support," Proc. Int'l Conf. Dependable Systems and Networks, pp. 585-594, 2004.
    • (2004) Proc. Int'l Conf. Dependable Systems and Networks , pp. 585-594
    • Nakka, N.1
  • 21
    • 0028166441 scopus 로고
    • Experiments of the effectiveness of dataflowand controlflow-based test adequacy criteria
    • M. Hutchins et al., "Experiments of the Effectiveness of Dataflowand Controlflow-Based Test Adequacy Criteria," Proc. 16th Int'l Conf. Software Eng., pp. 191-200, 1994.
    • (1994) Proc. 16th Int'l Conf. Software Eng. , pp. 191-200
    • Hutchins, M.1
  • 22
    • 0036469652 scopus 로고    scopus 로고
    • Simplescalar: An infrastructure for computer system modeling
    • Feb.
    • T. Austin et al., "SimpleScalar: An Infrastructure for Computer System Modeling," Computer, vol. 35, no. 2, pp. 59-67, Feb. 2002.
    • (2002) Computer , vol.35 , Issue.2 , pp. 59-67
    • Austin, T.1
  • 23
    • 33748113790 scopus 로고    scopus 로고
    • ReStore: Symptom-based soft error detection in microprocessors
    • DOI 10.1109/TDSC.2006.40, 1673379
    • N.J. Wang and S.J. Patel, "ReStore: Symptom-Based Soft Error Detection in Microprocessors," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 3, pp. 188-201, July-Sept. 2006. (Pubitemid 44304207)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.3 , pp. 188-201
    • Wang, N.J.1    Patel, S.J.2
  • 26
    • 0036472459 scopus 로고    scopus 로고
    • Anomaly detection in embedded systems
    • Feb.
    • R.A. Maxion and K.M. C. Tan, "Anomaly Detection in Embedded Systems," IEEE Trans. Computers, vol. 51, no. 2, pp. 108-120, Feb. 2002.
    • (2002) IEEE Trans. Computers , vol.51 , Issue.2 , pp. 108-120
    • Maxion, R.A.1    Tan, K.M.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.