Control-flow checking by software signatures

N Oh, PP Shirvani, EJ McCluskey - IEEE transactions on …, 2002 - ieeexplore.ieee.org
This paper presents a new signature monitoring technique, CFCSS (control flow checking by
software signatures); CFCSS is a pure software method that checks the control flow of a …

Error detection by duplicated instructions in super-scalar processors

N Oh, PP Shirvani, EJ McCluskey - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
This paper proposes a pure software technique" error detection by duplicated
instructions"(EDDI), for detecting errors during usual system operation. Compared to other …

Xception: A technique for the experimental evaluation of dependability in modern computers

J Carreira, H Madeira, JG Silva - IEEE Transactions on …, 1998 - ieeexplore.ieee.org
An important step in the development of dependable systems is the validation of their fault
tolerance properties. Fault injection has been widely used for this purpose, however with the …

Soft-error detection using control flow assertions

O Goloubeva, M Rebaudengo… - … IEEE Symposium on …, 2003 - ieeexplore.ieee.org
Over the last few years, an increasing number of safety-critical tasks have been demanded
of computer systems. In this paper, a software-based approach for developing safety-critical …

ED/sup 4/I: error detection by diverse data and duplicated instructions

N Oh, S Mitra, EJ McCluskey - IEEE Transactions on Computers, 2002 - ieeexplore.ieee.org
Errors in computing systems can cause abnormal behavior and degrade data integrity and
system availability. Errors should be avoided especially in embedded systems for critical …

Beyond the personal software process: Metrics collection and analysis for the differently disciplined

PM Johnson, H Kou, J Agustin, C Chan… - 25th International …, 2003 - ieeexplore.ieee.org
Pedagogues such as the Personal Software Process (PSP) shift metrics definition,
collection, and analysis from the organizational level to the individual level. While case study …

Low-cost on-line fault detection using control flow assertions

R Venkatasubramanian, JP Hayes… - 9th IEEE On-Line …, 2003 - ieeexplore.ieee.org
A control flow fault occurs when a processor fetches and executes an incorrect next
instruction. Executable assertions, ie, special instructions that check some invariant …

[PDF][PDF] Application of three physical fault injection techniques to the experimental assessment of the MARS architecture

J Karlsson, P Folkesson, J Arlat, Y Crouzet… - … Computing and Fault …, 1998 - Citeseer
This paper describes and compares three physical fault injection techniques—heavy-ion
radiation, pin-level injection, and electromagnetic interference—and their use in the …

Soft error sensitivity characterization for microprocessor dependability enhancement strategy

S Kim, AK Somani - Proceedings International Conference on …, 2002 - ieeexplore.ieee.org
This paper presents an empirical investigation on the soft error sensitivity (SES) of
microprocessors, using the picoJava-II as an example, through software simulated fault …

Transient fault tolerance in digital systems

J Sosnowski - IEEE Micro, 1994 - ieeexplore.ieee.org
It is hard to shield systems effectively from transient faults (fault avoidance techniques). So
some other means must be employed to assure appropriate levels of transient fault …