This Article 
 Bibliographic References 
 Add to: 
Identifying Efficient Combinations of Error Detection Mechanisms Based on Results of Fault Injection Experiments
February 2002 (vol. 51 no. 2)
pp. 235-239

We introduce novel performance ratings for error detection mechanisms. Given a proper setup of the fault injection experiments, these ratings can be directly computed from raw readout data. They allow the evaluation of the overall performance of arbitrary combinations of mechanisms without the need for further experiments. With this means we can determine a minimal subset of mechanisms that still provides the required performance.

[1] J.R. Samson Jr., W. Moreno, and F. Falquez, “A Technique for Automated Validation of Fault Tolerant Designs Using Laser Fault Injection (LFI),” Proc. 28th Fault-Tolerant Computer Systems Symp., pp. 162-167, 1998.
[2] C. Constantinescu, “Validation of the Fault/Error Handling Mechanisms of the Teraflops Supercomputer,” Proc. 28th Fault-Tolerant Computer Systems Symp., pp. 382-389, 1998.
[3] J. Arlat, A. Costes, Y. Crouzet, J.-C. Laprie, and D. Powell, Fault Injection and Dependability Evaluation of Fault-Tolerant Systems IEEE Trans. Computers, vol. 42, no. 8, pp. 913-923, Aug. 1993.
[4] H. Madeira, M. Rela, F. Moreira, and J.G. Silva, RIFLE: A General Purpose Pin-Level Fault Injector Proc. First European Dependable Computing Conf. (EDCC-1), pp. 199-216, 1994.
[5] J. Ohlsson, M. Rimen, and U. Genneflo, "A Study of the Effects of Transient Fault Injection into a 32-bit RISC with Built-In Watchdog," Proc. Int'l Symp. Fault-Tolerant Computing, pp. 316-325, 1992.
[6] J. Karlsson, P. Folkesson, J. Arlat, Y. Crouzet, G. Leber, and J. Reisinger, “Application of Three Physical Fault Injection Techniques to the Experimental Assessment of the MARS Architecture,” Proc. Fifth Conf. Dependable Computing for Critical Applications (DCCA-5), Sept. 1995.
[7] H. Madeira and J. Silva, “Experimental Evaluation of the Fail-Silent Behavior in Computers without Error Masking,” Proc. IEEE Int'l Symp. Fault-Tolerant Computing, pp. 350–359, 1994.
[8] R.K. Iyer and D. Tang, “Experimental Analysis of Computer System Dependability,” technical report, Center for Highly Reliable Computing, Univ. of Illinois at Urbana-Champaign, May 1994.
[9] “Dependability: Basic Concepts and Terminology,” Dependable Computing and Fault Tolerance, J.C. Laprie, ed., vol. 5, Berlin: Springer, 1992.
[10] A. Steininger and C. Scherrer, “On Finding an Optimal Combination of Error Detection Mechanisms Based on Results of Fault Injection Experiments,” Proc. 27th Ann. Int'l Symp. Fault-Tolerant Computing (FTCS-27), pp. 238-247, 1997.
[11] C. Scherrer and A. Steininger, “Periodic Node Shutdown in a Fail-Silent Architecture—Risk or Rescue?” Proc. Fourth World Multiconf. Systemics, Cybernetics, and Informatics (SCI2000), 2000.
[12] H. Madeira, G. Quadros, and J.G. Silva, “Experimental Evaluation of a Set of Simple Error Detection Mechanisms,” Euromicro J. Microprocessing and Microprogramming, vol. 30, nos. 1-5, pp. 513-520, Aug. 1990.

Index Terms:
Error detection, fault injection, coverage estimation, optimization of fault tolerance.
A. Steininger, C. Scherrer, "Identifying Efficient Combinations of Error Detection Mechanisms Based on Results of Fault Injection Experiments," IEEE Transactions on Computers, vol. 51, no. 2, pp. 235-239, Feb. 2002, doi:10.1109/12.980011
Usage of this product signifies your acceptance of the Terms of Use.