Developing Inherently Resilient Software Against Soft-Errors Based on Algorithm Level Inherent Features

被引:21
作者
Arasteh, Bahman [1 ]
Miremadi, Seyed Ghassem [2 ]
Rahmani, Amir Masoud [1 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran, Iran
[2] Sharif Univ Technol, Dept Comp, Dependable Syst Lab, Tehran, Iran
来源
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS | 2014年 / 30卷 / 02期
关键词
Soft-error; Error-derating; Algorithm-designing technique; Resilient program; Fault injection;
D O I
10.1007/s10836-014-5438-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A potential peculiarity of software systems is that a large number of soft-errors are inherently derated (masked) at the software level. The rate of error-deration may depend on the type of algorithms and data structures used in the software. This paper investigates the effects of the underlying algorithms of programs on the rate of error-deration. Eight different benchmark programs were used in the study; each of them was implemented by four different algorithms, i.e. divide-and-conquer, dynamic, backtracking and branch-and-bound. About 10,000 errors were injected into each program in order to quantify and analyze the error-derating capabilities of different algorithm-designing-techniques. The results reveal that about 40.0 % of errors in the dynamic algorithm are derated; this figure for backtracking, branch-and-bound and divide-and-conquer algorithms are 39.5 %, 38.1 % and 28.8 %, respectively. These results can enable software designers and programmers to select the most efficient algorithms for developing inherently resilient programs. Furthermore, an analytical examination of the results using one-way ANOVA acknowledged the statistical significance of difference between the algorithm-designing-techniques in terms of resiliency at 95 % level of confidence.
引用
收藏
页码:193 / 212
页数:20
相关论文
共 52 条
[1]  
Ammann P., 2016, INTRO SOFTWARE TESTI
[2]  
[Anonymous], 1998, ALGORITHMS C
[3]   SimpleScalar: An infrastructure for computer system modeling [J].
Austin, T ;
Larson, E ;
Ernst, D .
COMPUTER, 2002, 35 (02) :59-+
[4]  
Benso A, 2003, INT TEST CONF P, P802, DOI 10.1109/TEST.2003.1270912
[5]  
Benso A, 2000, IEEE INT C DEP SYST
[6]   Protective Redundancy Overhead Reduction Using Instruction Vulnerability Factor [J].
Borodin, Demid ;
Juurlink, B. H. H. .
PROCEEDINGS OF THE 2010 COMPUTING FRONTIERS CONFERENCE (CF 2010), 2010, :319-326
[7]  
Cook J.J., 2008, IEEE INT C DEP SYST
[8]  
Devi S., 2012, INT J ENG RES GEN SC, V4, P246, DOI [DOI 10.1145/1186736.1186737, 10.1145/1186736.1186737]
[9]  
Dixit A, 2011, P IEEE WORKSH SIL ER
[10]   Data flow transformations to detect results which are corrupted by hardware faults [J].
Engel, H .
IEEE HIGH-ASSURANCE SYSTEMS ENGINEERING WORKSHOP, PROCEEDINGS, 1997, :279-285