Home > Research > Publications & Outputs > EPIC

Links

Text available via DOI:

View graph of relations

EPIC: Profiling the propagation and effect of data errors in software

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

EPIC : Profiling the propagation and effect of data errors in software. / Hiller, M.; Jhumka, A.; Suri, Neeraj.

In: IEEE Transactions on Computers, Vol. 53, No. 5, 01.05.2004, p. 512-530.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Hiller, M, Jhumka, A & Suri, N 2004, 'EPIC: Profiling the propagation and effect of data errors in software', IEEE Transactions on Computers, vol. 53, no. 5, pp. 512-530. https://doi.org/10.1109/TC.2004.1275294

APA

Hiller, M., Jhumka, A., & Suri, N. (2004). EPIC: Profiling the propagation and effect of data errors in software. IEEE Transactions on Computers, 53(5), 512-530. https://doi.org/10.1109/TC.2004.1275294

Vancouver

Hiller M, Jhumka A, Suri N. EPIC: Profiling the propagation and effect of data errors in software. IEEE Transactions on Computers. 2004 May 1;53(5):512-530. doi: 10.1109/TC.2004.1275294

Author

Hiller, M. ; Jhumka, A. ; Suri, Neeraj. / EPIC : Profiling the propagation and effect of data errors in software. In: IEEE Transactions on Computers. 2004 ; Vol. 53, No. 5. pp. 512-530.

Bibtex

@article{32d4fad83f8f4224adc01fd3b3328e15,
title = "EPIC: Profiling the propagation and effect of data errors in software",
abstract = "We present an approach for analyzing the propagation and effect of data errors in modular software enabling the profiling of the vulnerabilities of software to find 1) the modules and signals most likely exposed to propagating errors and 2) the modules and signals which, when subjected to error, tend to cause more damage than others from a systems operation point-of-view. We discuss how to use the obtained profiles to identify where dependability structures and mechanims will likely be the most effective, i.e., how to perform a cost-benefit analysis for dependability. A fault-injection-based method for estimation of the various measures is described and the software of a real embedded control system is profiled to show the type of results obtainable by the analysis framework.",
keywords = "Data error effect, Data error propagation, Dependability assessment, Fault injection, Software profiling, Computer architecture, Computer hardware, Computer software, Data handling, Data structures, Embedded systems, Fault tolerant computer systems, Failure mode effect and criticality analysis, Error detection",
author = "M. Hiller and A. Jhumka and Neeraj Suri",
year = "2004",
month = may,
day = "1",
doi = "10.1109/TC.2004.1275294",
language = "English",
volume = "53",
pages = "512--530",
journal = "IEEE Transactions on Computers",
issn = "0018-9340",
publisher = "IEEE Computer Society",
number = "5",

}

RIS

TY - JOUR

T1 - EPIC

T2 - Profiling the propagation and effect of data errors in software

AU - Hiller, M.

AU - Jhumka, A.

AU - Suri, Neeraj

PY - 2004/5/1

Y1 - 2004/5/1

N2 - We present an approach for analyzing the propagation and effect of data errors in modular software enabling the profiling of the vulnerabilities of software to find 1) the modules and signals most likely exposed to propagating errors and 2) the modules and signals which, when subjected to error, tend to cause more damage than others from a systems operation point-of-view. We discuss how to use the obtained profiles to identify where dependability structures and mechanims will likely be the most effective, i.e., how to perform a cost-benefit analysis for dependability. A fault-injection-based method for estimation of the various measures is described and the software of a real embedded control system is profiled to show the type of results obtainable by the analysis framework.

AB - We present an approach for analyzing the propagation and effect of data errors in modular software enabling the profiling of the vulnerabilities of software to find 1) the modules and signals most likely exposed to propagating errors and 2) the modules and signals which, when subjected to error, tend to cause more damage than others from a systems operation point-of-view. We discuss how to use the obtained profiles to identify where dependability structures and mechanims will likely be the most effective, i.e., how to perform a cost-benefit analysis for dependability. A fault-injection-based method for estimation of the various measures is described and the software of a real embedded control system is profiled to show the type of results obtainable by the analysis framework.

KW - Data error effect

KW - Data error propagation

KW - Dependability assessment

KW - Fault injection

KW - Software profiling

KW - Computer architecture

KW - Computer hardware

KW - Computer software

KW - Data handling

KW - Data structures

KW - Embedded systems

KW - Fault tolerant computer systems

KW - Failure mode effect and criticality analysis

KW - Error detection

U2 - 10.1109/TC.2004.1275294

DO - 10.1109/TC.2004.1275294

M3 - Journal article

VL - 53

SP - 512

EP - 530

JO - IEEE Transactions on Computers

JF - IEEE Transactions on Computers

SN - 0018-9340

IS - 5

ER -