SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Sangchoolie Behrooz) "

Sökning: WFRF:(Sangchoolie Behrooz)

  • Resultat 1-25 av 40
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Agirre, Joseba A, et al. (författare)
  • Multidimensional Framework for Characterizing Verification and Validation of Automated Systems
  • 2022
  • Ingår i: 18<sup>th</sup> European dependable computing conference (EDCC 2022).
  • Konferensbidrag (refereegranskat)abstract
    • Verification and Validation (V&V) of automated systems is becoming more costly and time-consuming because of the increasing size and complexity of these systems. Moreover, V&V of these systems can be hindered if the methods and processes are not properly described, analysed, and selected. It is essential that practitioners use suitable V&V methods and enact adequate V&V processes to confirm that these systems work as intended and in a cost-effective manner. Previous works have created different taxonomies and models considering different aspects of V&V that can be used to classify V&V methods and tools. The aim of this work is to provide a broad, comprehensive and a easy to use framework that addresses characterisation needs, rather than focusing on individual aspects of V&V methods and processes.To this end, in this paper, we present a multi-domain and multi-dimensional framework to characterize and classify V&V methods and tools in a structured way. The framework considers a comprehensive characterization of different relevant aspects of V&V. A web-based repository has been implemented on the basis of the framework, as an example of use, in order to collect information about the application of V&V methods and tools. This way, practitioners and researchers can easily learn about and identify suitable V&V processes.
  •  
2.
  • Agirre, J. A., et al. (författare)
  • The VALU3S ECSEL project : Verification and validation of automated systems safety and security
  • 2021
  • Ingår i: Microprocessors and microsystems. - : Elsevier BV. - 0141-9331 .- 1872-9436. ; 87, s. 104349-
  • Tidskriftsartikel (refereegranskat)abstract
    • Manufacturers of automated systems and their components have been allocating an enormous amount of time and effort in R&D activities, which led to the availability of prototypes demonstrating new capabilities as well as the introduction of such systems to the market within different domains. Manufacturers need to make sure that the systems function in the intended way and according to specifications. This is not a trivial task as system complexity rises dramatically the more integrated and interconnected these systems become with the addition of automated functionality and features to them. This effort translates into an overhead on the V&V (verification and validation) process making it time-consuming and costly. In this paper, we present VALU3S, an ECSEL JU (joint undertaking) project that aims to evaluate the state-of-the-art V&V methods and tools, and design a multi-domain framework to create a clear structure around the components and elements needed to conduct the V&V process. The main expected benefit of the framework is to reduce time and cost needed to verify and validate automated systems with respect to safety, cyber-security, and privacy requirements. This is done through identification and classification of evaluation methods, tools, environments and concepts for V&V of automated systems with respect to the mentioned requirements. VALU3S will provide guidelines to the V&V community including engineers and researchers on how the V&V of automated systems could be improved considering the cost, time and effort of conducting V&V processes. To this end, VALU3S brings together a consortium with partners from 10 different countries, amounting to a mix of 25 industrial partners, 6 leading research institutes, and 10 universities to reach the project goal.
  •  
3.
  • Ayatolahi, Fatemeh, 1984, et al. (författare)
  • A study of the impact of single bit-flip and double bit-flip errors on program execution
  • 2013
  • Ingår i: Lect. Notes Comput. Sci.. - Berlin, Heidelberg : Springer Berlin Heidelberg. - 9783642407925 ; , s. 265-276
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents the results of an extensive experimental study of bit-flip errors in instruction set architecture registers and main memory locations. Comprising more than two million fault injection experiments conducted with thirteen benchmark programs, the study provides insights on whether it is necessary to consider double bit-flip errors in dependability benchmarking experiments. The results show that the proportion of silent data corruptions in the program output, is almost the same for single and double bit errors. In addition, we present detailed statistics about the error sensitivity of different target registers and memory locations, including bit positions within registers and memory words. These show that the error sensitivity varies significantly between different bit positions and registers. An important observation is that injections in certain bit positions always have the same impact regardless of when the error is injected.
  •  
4.
  • Barbosa, Raul, et al. (författare)
  • The VALU3S ECSEL Project: Verification and Validation of Automated Systems Safety and Security
  • 2020
  • Ingår i: 23rd Euromicro Conference on Digital System Design (DSD).
  • Konferensbidrag (refereegranskat)abstract
    • Manufacturers of automated systems and their components have been allocating an enormous amount of time and effort in R&D activities. This effort translates into an overhead on the V&V (verification and validation) process making it timeconsuming and costly. In this paper, we present an ECSEL JU project (VALU3S) that aims to evaluate the state-of-the-art V&V methods and tools, and design a multi-domain framework to create a clear structure around the components and elements needed to conduct the V&V process. The main expected benefit of the framework is to reduce time and cost needed to verify and validate automated systems with respect to safety, cyber-security, and privacy requirements. This is done through identification and classification of evaluation methods, tools, environments and concepts for V&V of automated systems with respect to the mentioned requirements. To this end, VALU3S brings together a consortium with partners from 10 different countries, amounting to a mix of 25 industrial partners, 6 leading research institutes, and 10 universities to reach the project goal.
  •  
5.
  • Bauer, Thomas, et al. (författare)
  • Cross-domain Modelling of Verification and Validation Workflows in the Large Scale European Research Project VALU3S
  • 2021
  • Ingår i: Lecture Notes in Computer Science. - Cham : Springer. ; , s. 386-382
  • Konferensbidrag (refereegranskat)abstract
    • The complexity of systems continues to increase rapidly, especially due to the multi-level integration of subsystems from different domains into cyber-physical systems. This results in special challenges for the efficient verification and validation (V&V) of these systems with regard to their requirements and properties. In order to tackle the new challenges and improve the quality assurance processes, the V&V workflows have to be documented and analyzed. In this paper, a novel approach for the workflow modelling of V&V activities is presented. The generic approach is tailorable to different industrial domains and their specific constraints, V&V methods, and toolchains. The outcomes comprise a dedicated modelling notation (VVML) and tool-support using the modelling framework Enterprise Architect for the efficient documentation and implementation of workflows in the use cases. The solution enables the design of re-usable workflow assets such as V&V activities and artifacts that are exchanged between workflows. This work is part of the large scale European research project VALU3S that deals with the improvement and evaluation of V&V processes in different technical domains, focusing on safety, cybersecurity, and privacy properties.
  •  
6.
  • de la Vara, Jose Luis, et al. (författare)
  • A Proposal for the Classification of Methods for Verification and Validation of Safety, Cybersecurity, and Privacy of Automated Systems
  • 2021
  • Ingår i: 14th International Conference on the Quality of Information and Communications Technology (QUATIC 2021).
  • Konferensbidrag (refereegranskat)abstract
    • As our dependence on automated systems grows, so does the need for guaranteeing their safety, cybersecurity, and privacy (SCP). Dedicated methods for verification and validation (V&V) must be used to this end and it is necessary that the methods and their characteristics can be clearly differentiated. This can be achieved via method classifications. However, we have experienced that existing classifications are not suitable to categorise V&V methods for SCP of automated systems. They do not pay enough attention to the distinguishing characteristics of this system type and of these quality concerns. As a solution, we present a new classification developed in the scope of a large-scale industry-academia project. The classification considers both the method type, e.g., testing, and the concern addressed, e.g., safety. Over 70 people have successfully used the classification on 53 methods. We argue that the classification is a more suitable means to categorise V&V methods for SCP of automated systems and that it can help other researchers and practitioners.
  •  
7.
  • Di Leo, D., et al. (författare)
  • On the impact of hardware faults - An investigation of the relationship between workload inputs and failure mode distributions
  • 2012
  • Ingår i: Lect. Notes Comput. Sci.. - Berlin, Heidelberg : Springer Berlin Heidelberg. - 1611-3349 .- 0302-9743. - 9783642336775 ; , s. 198-209
  • Konferensbidrag (refereegranskat)abstract
    • Technology scaling of integrated circuits is making transistors increasingly sensitive to process variations, wear-out effects and ionizing particles. This may lead to an increasing rate of transient and intermittent errors in future microprocessors. In order to assess the risk such errors pose to safety critical systems, it is essential to investigate how temporary errors in the instruction set architecture (ISA) registers and main memory locations influence the behaviour of executing programs. To this end, we investigate - by means of extensive fault injection experiments - how such errors affect the execution of four target programs. The paper makes three contributions. First, we investigate how the failure modes of the target programs vary for different input sets. Second, we evaluate the error coverage of a software-implemented hardware fault tolerant technique that relies on triple-time redundant execution, majority voting and forward recovery. Third, we propose an approach based on assembly language metrics which can be used to correlate the dynamic fault-free behaviour of a program with its failure mode distribution obtained by fault injection.
  •  
8.
  • Farooqui, Ashfaq, et al. (författare)
  • Towards Formal Fault Injection for Safety Assessment of Automated Systems
  • 2023
  • Ingår i: Fifth International Workshop on Formal Methods for Autonomous Systems.
  • Konferensbidrag (refereegranskat)abstract
    • Reasoning about safety, security, and other dependability attributes of autonomous systems is a challenge that needs to be addressed before the adoption of such systems in day-to-day life. Formal methods is a class of methods that mathematically reason about a system’s behavior. Thus, a correctness proof is sufficient to conclude the system’s dependability. However, these methods are usually applied to abstract models of the system, which might not fully represent the actual system. Fault injection, on the other hand, is a testing method to evaluate the dependability of systems. However, the amount of testing required to evaluate the system is rather large and often a problem. This vision paper introduces formal fault injection, a fusion of these two techniques throughout the development lifecycle to enhance the dependability of autonomous systems. We advocate for a more cohesive approach by identifying five areas of mutual support between formal methods and fault injection. By forging stronger ties between the two fields, we pave the way for developing safe and dependable autonomous systems. This paper delves into the integration’s potential and outlines future research avenues, addressing open challenges along the way.
  •  
9.
  • Ferrari, Enrico, et al. (författare)
  • Criteria for the Analysis of Gaps and Limitations of V&V Methods for Safety- and Security-Critical Systems
  • 2022
  • Konferensbidrag (refereegranskat)abstract
    • As society increasingly relies on safety- and security- critical systems, the need for confirming their dependability becomes essential. Adequate V&V (verification and validation) methods must be employed, e.g., for system testing. When selecting and using the methods, it is important to analyze their possible gaps and limitations, such as scalability issues. However, and as we have experienced, common, explicitly defined criteria are seldom used for such analyses. This results in analyses that consider different aspects and to a different extent, hindering their comparison and thus the comparison of the V&V methods. As a solution, we present a set of criteria for the analysis of gaps and limitations of V&V methods for safety- and security-critical systems. The criteria have been identified in the scope of the VALU3S project. Sixty-two people from 33 organizations agreed upon the use of nine criteria: functionality, accuracy, scalability, deployment, learning curve, automation, reference environment, cost, and standards. Their use led to more homogeneous and more detailed analyses when compared to similar previous efforts. We argue that the proposed criteria can be helpful to others when having to deal with similar activities.
  •  
10.
  • Folkesson, Peter, 1968, et al. (författare)
  • Back-to-Back Fault Injection Testing in Model-Based Development
  • 2015
  • Ingår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). - Cham : Springer International Publishing. - 1611-3349 .- 0302-9743. - 9783319242545 - 9783319242552 ; 9337, s. 135-148
  • Konferensbidrag (refereegranskat)abstract
    • Today, embedded systems across industrial domains (e.g., avionics, automotive) are representatives of software-intensive systems with increasing reliance on software and growing complexity. It has become critically important to verify software in a time, resource and cost effective manner. Furthermore, industrial domains are striving to comply with the requirements of relevant safety standards. This paper proposes a novel workflow along with tool support to evaluate robustness of software in model-based development environment, assuming different abstraction levels of representing software. We then show the effectiveness of our technique, on a brake-by-wire application, by performing back-to-back fault injection testing between two different abstraction levels using MODIFI for the Simulink model and GOOFI-2 for the generated code running on the target microcontroller. Our proposed method and tool support facilitates not only verifying software during early phases of the development lifecycle but also fulfilling back-to-back testing requirements of ISO 26262 when using model-based development.
  •  
11.
  • Islam, Md Mafijul, et al. (författare)
  • Towards benchmarking of functional safety in the automotive industry
  • 2013
  • Ingår i: Lecture Notes in Computr Science. - Berlin, Heidelberg : Springer Berlin Heidelberg. - 1611-3349 .- 0302-9743. - 9783642387883 ; , s. 111-125
  • Konferensbidrag (refereegranskat)abstract
    • Functional safety is becoming increasingly important in the automotive industry to deal with the growing reliance on the electrical and/or electronic (E/E) systems and the associated complexities. The introduction of ISO 26262, a new standard for functional safety in road vehicles, has made it even more important to adopt a systematic approach of evaluating functional safety. However, standard assessment methods of benchmarking functional safety of automotive systems are not available as of today. This is where the BeSafe (Benchmarking of Functional Safety) project comes into the picture. BeSafe project aims to lay the foundation for benchmarking functional safety of automotive E/E systems. In this paper, we present a brief overview of the project along with the benchmark targets that we have identified as relevant for the automotive industry, assuming three abstraction layers (model, software, hardware). We then define and discuss a set of benchmark measures. Next, we propose a benchmark framework encompassing fault/error models, methods and the required tool support. This paper primarily focuses on functional safety benchmarking from the Safety Element out of Context (SEooC) viewpoint. Finally, we present some preliminary results and highlight potential future works.
  •  
12.
  •  
13.
  • Jolak, Rodi, et al. (författare)
  • CONSERVE: A framework for the selection of techniques for monitoring containers security
  • 2022
  • Ingår i: Journal of Systems and Software. - : Elsevier BV. - 0164-1212 .- 1873-1228. ; 186:April
  • Tidskriftsartikel (refereegranskat)abstract
    • Context: Container-based virtualization is gaining popularity in different domains, as it supports continuous development and improves the efficiency and reliability of run-time environments. Problem: Different techniques are proposed for monitoring the security of containers. However, there are no guidelines supporting the selection of suitable techniques for the tasks at hand. Objective: We aim to support the selection and design of techniques for monitoring container-based virtualization environments. Approach:: First, we review the literature and identify techniques for monitoring containerized environments. Second, we classify these techniques according to a set of categories, such as technical characteristic, applicability, effectiveness, and evaluation. We further detail the pros and cons that are associated with each of the identified techniques. Result: As a result, we present CONSERVE, a multi-dimensional decision support framework for an informed and optimal selection of a suitable set of container monitoring techniques to be implemented in different application domains. Evaluation: A mix of eighteen researchers and practitioners evaluated the ease of use, understandability, usefulness, efficiency, applicability, and completeness of the framework. The evaluation shows a high level of interest, and points out to potential benefits. © 2021 The Authors
  •  
14.
  • Kleberger, Pierre, et al. (författare)
  • An Integrated Safety and Cybersecurity Resilience Framework for the Automotive Domain
  • 2022
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • As vehicles become more and more connected with their surroundings and utilize an increasing number of services, they also become more exposed to threats as the attack surface increases. With increasing attack surfaces and continuing challenges of eliminating vulnerabilities, vehicles need to be designed to work even under malicious activities, i.e., under attacks. In this paper, we present a resilience framework that integrates analysis of safety and cybersecurity mechanisms. We also integrate resilience for safety and cybersecurity into the fault – error – failure chain. The framework is useful for analyzing the propagation of faults and attacks between different system layers. This facilitates identification of adequate resilience mechanisms at different system layers as well as deriving suitable test cases for verification and validation of system resilience using fault and attack injection.
  •  
15.
  • Lijun, Shan, et al. (författare)
  • A Survey on the Application of Safety, Security,and Privacy Standards for Dependable Systems
  • 2019
  • Ingår i: Proceedings of the 15th European Dependable Computing Conference.
  • Konferensbidrag (refereegranskat)abstract
    • Safety-critical systems are required to comply withsafety standards as well as security and privacy standards.In order to provide insights into how practitioners apply thestandards on safety, security or privacy (Sa/Se/Pr), as well ashow they employ Sa/Se/Pr analysis methodologies and softwaretools to meet such criteria, we conducted a questionnaire-basedsurvey. This paper summarizes our major analysis results of thereceived responses.
  •  
16.
  • Maleki, Mehdi, et al. (författare)
  • CarFASE : A Carla-based Tool for Evaluating the Effects of Faults and Attacks on Autonomous Driving Stacks
  • 2023
  • Ingår i: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). - : Institute of Electrical and Electronics Engineers (IEEE). ; , s. 92-99
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents CarFASE, an open-source carla-based fault and attack simulation engine that is used to test and evaluate the behavior of autonomous driving stacks in the presence of faults and attacks. Carla is a highly customizable and adaptable simulator for autonomous driving research. In this paper, we demonstrate the application of CarFASE by running fault injection experiments on OpenPilot, an open-source advanced driver assistance system designed to provide a suite of features such as lane keeping, adaptive cruise control, and forward collision warning to enhance the driving experience. A braking scenario is used to study the behavior of OpenPilot in the presence of brightness and salt&pepper faults. The results demonstrate the usefulness of the tool in evaluating the safety attributes of autonomous driving systems in a safe and controlled environment.
  •  
17.
  • Maleki, Mehdi, et al. (författare)
  • Modeling and Evaluating the Effects of Jamming Attacks on Connected Automated Road Vehicles
  • 2022
  • Ingår i: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. - 1541-0110. ; 2022-November, s. 12-23
  • Konferensbidrag (refereegranskat)abstract
    • In this work, we evaluate the safety of a platoon of four vehicles under jamming attacks. The platooning application is provided by Plexe-veins, which is a cooperative driving framework, and the vehicles in the platoon are equipped with cooperative adaptive cruise control controllers to represent the vehicles' behavior. The jamming attacks investigated are modeled by extending ComFASE (a Communication Fault and Attack Simulation Engine) and represent three real-world attacks, namely, destructive interference, barrage jamming, and deceptive jamming. The attacks are injected in the physical layer of the IEEE 802.11p communication protocol simulated in Veins (a vehicular network simulator). To evaluate the safety implications of the injected attacks, the experimental results are classified by using the deceleration profiles and collision incidents of the vehicles. The results of our experiments show that jamming attacks on the communication can jeopardize vehicle safety, causing emergency braking and collision incidents. Moreover, we describe the impact of different attack injection parameters (such as, attack start time, attack duration and attack value) on the behavior of the vehicles subjected to the attacks.
  •  
18.
  • Maleki, Mehdi, et al. (författare)
  • Simulation-based Fault Injection in Advanced Driver Assistance Systems Modelled in SUMO
  • 2021
  • Ingår i: 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN) - Best of SELSE. - : IEEE conference proceedings.
  • Konferensbidrag (refereegranskat)abstract
    • Embedded electronic systems used in vehicles are becoming more exposed and thus vulnerable to different types of faults and cybersecurity attacks. Examples of these systems are advanced driver assistance systems (ADAS) used in vehicles with different levels of automation. Failures in these systems could have severe consequences, such as loss of lives and environmental damages. Therefore, these systems should be thoroughly evaluated during different stages of product development. An effective way of evaluating these systems is through the injection of faults and monitoring their impacts on these systems. In this paper, we present SUFI, a simulation-based fault injector that is capable of injecting faults into ADAS features simulated in SUMO (simulation of urban mobility). Simulation-based fault injection is usually used at early stages of product development, especially when the target hardware is not yet available. Using SUFI we target car-following and lane-changing features of ADAS modelled in SUMO. The results of the fault injection experiments show the effectiveness of SUFI in revealing the weaknesses of these models when targeted by faults and attacks.
  •  
19.
  • Maleki, Mehdi, et al. (författare)
  • SUFI : A Simulation-based Fault Injection Tool for Safety Evaluation of Advanced Driver Assistance Systems Modelled in SUMO
  • 2021
  • Ingår i: Proceedings - 2021 17th European Dependable Computing Conference, EDCC 2021. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665436717 ; , s. 45-52
  • Konferensbidrag (refereegranskat)abstract
    • Embedded electronic systems used in vehicles are becoming more exposed and thus vulnerable to different types of faults and cybersecurity attacks. Examples of these systems are advanced driver assistance systems (ADAS) used in vehicles with different levels of automation. Failures in these systems could have severe consequences, such as loss of lives and environmental damages. Therefore, these systems should be thoroughly evaluated during different stages of product development. An effective way of evaluating these systems is through the injection of faults and monitoring their impacts on these systems. In this paper, we present SUFI, a simulation-based fault injector that is capable of injecting faults into ADAS features simulated in SUMO (simulation of urban mobility) and analyse the impact of the injected faults on the entire traffic. Simulation-based fault injection is usually used at early stages of product development, especially when the target hardware is not yet available. Using SUFI we target car-following and lane-changing features of ADAS modelled in SUMO. The results of the fault injection experiments show the effectiveness of SUFI in revealing the weaknesses of these models when targeted by faults and attacks.
  •  
20.
  • Malik, Mateen, et al. (författare)
  • ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles
  • 2022
  • Ingår i: Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022. ; , s. 185-192
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents ComFASE, a communication fault and attack simulation engine. ComFASE is used to identify and evaluate potentially dangerous behaviours of interconnected automated vehicles in the presence of faults and attacks in wireless vehicular networks. ComFASE is built on top of OM-NET++ (a network simulator) and integrates SUMO (a traffic simulator) and Veins (a vehicular network simulator). The tool is flexible in modelling different types of faults and attacks and can be effectively used to study the interplay between safety and cybersecurity attributes by injecting cybersecurity attacks and evaluating their safety implications. To demonstrate the tool, we present results from a series of simulation experiments, where we injected delay and denial-of-service attacks on wireless messages exchanged between vehicles in a platooning application. The results show how different variants of attacks influence the platooning system in terms of collision incidents.
  •  
21.
  • Malik, Mateen, et al. (författare)
  • Simulation-based Evaluation of a Remotely Operated Road Vehicle under Transmission Delays and Denial-of-Service Attacks
  • 2023
  • Ingår i: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. - : IEEE Computer Society. - 1541-0110. ; 2023, s. 23-29
  • Konferensbidrag (refereegranskat)abstract
    • A remotely operated road vehicle (RORV) refers to a vehicle operated wirelessly from a remote location. In this paper, we report results from an evaluation of two safety mechanisms: safe braking and disconnection. These safety mechanisms are included in the control software for RORV developed by Roboauto, an intelligent mobility solutions provider. The safety mechanisms monitor the communication system to detect packet transmission delays, lost messages, and outages caused by naturally occurring interference as well as denial-of-service (DoS) attacks. When the delay in the communication channel exceeds certain threshold values, the safety mechanisms are to initiate control actions to reduce the vehicle speed or stop the affected vehicle safely as soon as possible. To evaluate the effectiveness of the safety mechanisms, we exposed the vehicle control software to various communication failures using a software-in-the-loop (SIL) testing environment developed specifically for this study. Our results show that the safety mechanisms behaved correctly for a vast majority of the simulated communication failures. However, in a few cases, we noted that the safety mechanisms were triggered incorrectly, either too early or too late, according to the system specification.
  •  
22.
  • Sangchoolie, Behrooz, et al. (författare)
  • A Comparison of Inject-on-Read and Inject-on-Write in ISA-Level Fault Injection
  • 2016
  • Ingår i: Proceedings - 2015 11th European Dependable Computing Conference, EDCC 2015. - : Institute of Electrical and Electronics Engineers Inc.. - 9781467392891 ; , s. 178-189, s. 178-189
  • Konferensbidrag (refereegranskat)abstract
    • ISA-level fault injection, i.e. the injection of bit-flip faults in Instruction Set Architecture (ISA) registers and main memory words, is widely used for studying the impact of transient and intermittent hardware faults in computer systems. This paper compares two techniques for ISA-level fault injection: inject-on-read, and inject-on-write. The first technique injects bit-flips in a data-item (the content of a register or memory word) just before the data-item is read by a machine instruction, while the second one injects bit-flips in a data-item just after it has been updated by a machine instruction. In addition, the paper compares two variants of inject-on-read, one where all faults are given the same weight and one where weight factors are used to reflect the time a data-item spends in a register or memory word. The weighted injected-on-read aims to accurately model soft errors that occur when an ionizing particle perturbs a data-item while it resides in an ISA register or a memory word. This is in contrast to inject-on-write, which emulates errors that propagate into an ISA register or a memory word. Our experiments show significant differences in the results obtained with the three techniques.
  •  
23.
  • Sangchoolie, Behrooz, et al. (författare)
  • A study of the impact of bit-flip errors on programs compiled with different optimization levels
  • 2014
  • Ingår i: Proceedings - 2014 10th European Dependable Computing Conference, EDCC 2014. - : IEEE Computer Society. - 9781479938032 ; , s. 146-157
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we study the impact of compiler optimizations on the error sensitivity of twelve benchmark programs. We conducted extensive fault injection experiments where bit-flip errors were injected in instruction set architecture registers and main memory locations. The results show that the percentage of silent data corruptions (SDCs) in the output of the optimized programs is only marginally higher compare to that observed for the non-optimized programs. This suggests that compiler optimizations can be used in safety- and mission-critical systems without increasing the risk that the system produces undetected erroneous outputs. In addition, we investigate to what extent the source code implementation of a program affects the error sensitivity of a program. To this end, we perform experiments with five implementations of a bit count algorithm. In this investigation, we consider the impact of the implementation as well as compiler optimizations. The results of these experiments give valuable insights into how compiler optimizations can be used to reduce error sensitive of registers and main memory sections. They also show how sensitive locations requiring additional protection, e.g., by the use of software-based fault tolerance techniques, can be identified.
  •  
24.
  • Sangchoolie, Behrooz, 1986-, et al. (författare)
  • A Study of the Interplay Between Safety and Security Using Model-Implemented Fault Injection
  • 2018
  • Konferensbidrag (refereegranskat)abstract
    • The combination of high mobility and wireless communication in many safety-critical systems have increased their exposure to malicious security threats. Consequently, many works in the past have proposed solutions to ensure safety and security of these systems. However, not much attention has been given to the interplay between these two groups of nonfunctional requirements. This is a concern as safety solutions may negatively impact system security and vice versa. This paper addresses the interplay between safety and security by proposing an attack injection framework, based on model-implemented fault injection, suitable for model-based design. The framework enables us to study and evaluate the impact of cybersecurity attacks on system safety early in the development process. To this end, we have implemented six attack injection models and conducted experiments on Simulink models of a CAN bus and a brake-by-wire controller. The results show that the security attacks modeled could successfully impact the system safety by violating our defined safety requirements.
  •  
25.
  • Sangchoolie, Behrooz, 1986, et al. (författare)
  • An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors in Programs
  • 2022
  • Ingår i: IEEE Transactions on Dependable and Secure Computing. - : IEEE. - 1545-5971 .- 1941-0018. ; 19:3, s. 1988-2006
  • Tidskriftsartikel (refereegranskat)abstract
    • Recent studies have shown that technology and voltage scaling are expected to increase the likelihood that particle-induced soft errors manifest as multiple-bit errors. This raises concerns about the validity of using single bit-flips in fault injection experiments aiming to assess the program-level impact of soft errors. The goal of this paper is to investigate whether multiple-bit errors could cause a higher percentage of silent data corruptions (SDCs) compared to single-bit errors. Based on 2700 fault injection campaigns with 15 benchmark programs, featuring a total of 27 million experiments, our results show that single-bit errors in most cases either yield a higher percentage of SDCs compared to multiple-bit errors or yield SDC results that are very close to the ones obtained for the multiple-bit errors. Further, we find that only around 2% of the multiple-bit campaigns resulted in an SDC percentage that was more than 5 percentage points higher than that obtained for the corresponding single-bit campaigns. For most of these campaigns, the highest percentage of SDCs was obtained by flipping at most 3 bits. Based on our results, we also propose four techniques for error space pruning to avoid injection of multiple-bit errors that are either unlikely or infeasible to cause SDCs.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-25 av 40
Typ av publikation
konferensbidrag (34)
tidskriftsartikel (4)
doktorsavhandling (1)
licentiatavhandling (1)
Typ av innehåll
refereegranskat (36)
övrigt vetenskapligt/konstnärligt (4)
Författare/redaktör
Sangchoolie, Behrooz (28)
Karlsson, Johan, 195 ... (13)
Ayatolahi, Fatemeh, ... (8)
Vinter, Jonny (6)
Johansson, Roger, 19 ... (6)
De la Vara, Jose Lui ... (4)
visa fler...
Yayan, Ugur (4)
Folkesson, Peter, 19 ... (4)
Barbosa, Raul (3)
Karaca, Mustafa (3)
Karlsson, Johan (2)
Agirre, Joseba A (2)
Yazici, Ahmet (2)
Skoglund, Martin (2)
Schoitsch, Erwin (2)
Nyberg, Mattias (2)
Pereira, D. (1)
Mazzini, Silvia (1)
Pomante, Luigi (1)
Di Blasio, Katia (1)
Etxeberria, Leire (1)
Nazaria, Massimo (1)
Agirre, J. A. (1)
Etxeberria, L. (1)
Barbosa, R. (1)
Basagiannis, S. (1)
Giantamidis, G. (1)
Bauer, T. (1)
Ferrari, E. (1)
Labayen Esnaola, M. (1)
Orani, V. (1)
Öberg, Johnny (1)
Proença, J. (1)
Schlick, R. (1)
Smrčka, A. (1)
Tiberti, W. (1)
Tonetta, S. (1)
Bozzano, M. (1)
Yazici, A. (1)
Vinter, Jonny, 1963 (1)
Olovsson, Tomas, 195 ... (1)
John, Wolfgang, 1978 (1)
Scandariato, Riccard ... (1)
Aramrattana, Maythee ... (1)
Nowdehi, Nasser, 198 ... (1)
Villani, Emilia (1)
Jahic, Jasmin (1)
Barbosa, Raul, 1981 (1)
Skarin, Daniel, 1979 (1)
Basagiannis, Stelios (1)
visa färre...
Lärosäte
RISE (37)
Chalmers tekniska högskola (18)
Göteborgs universitet (1)
Kungliga Tekniska Högskolan (1)
Mälardalens universitet (1)
VTI - Statens väg- och transportforskningsinstitut (1)
Språk
Engelska (40)
Forskningsämne (UKÄ/SCB)
Teknik (26)
Naturvetenskap (14)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy