期刊文献+

基于VHDL的故障注入技术 被引量:7

Fault Injection Technology Based on VHDL
在线阅读 下载PDF
导出
摘要 对基于VHDL的故障注入技术进行研究,阐述基于仿真命令、"破坏"和"突变"的故障注入技术原理,以8051处理器为注入对象,实现3种故障注入技术。对3种技术的特性进行比较分析。对于仿真命令方式,研究信号操作和变量操作2种方式,针对变量操作方式提出可行的实现方法。对于"破坏"方式,通过对"串行破坏"和"并行破坏"的分析比较,证明前者更具实用价值。对于"突变"方式,介绍不同的实现方法,提出优化的设计方案。 This paper studies a fault injection technology based on VHDL. It expounds the theories of simulation commands, saboteurs and mutants and implements them with the injection object, 8051 processor. It compares and analyzes the characters of them. For simulation commands, it studies the signal operation and variable operation styles. Aiming at the variable operation styles, it presents the feasible method. For saboteurs, it analyzes the serial saboteurs and collateral saboteurs, and proves the practical value of the serial saboteurs. For mutants, it introduces the different realizations, and presents the optimization design method.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第11期244-246,249,共4页 Computer Engineering
基金 航空科学基金资助项目(2008ZD53035) 陕西省自然科学基金资助项目(SJ08F20)
关键词 VHDL语言 故障注入 仿真命令 破坏 突变 VHDL fault injection simulation commands saboteurs mutants
  • 相关文献

参考文献5

  • 1Boue J, Petillon P, Crouzet Y. MEFISTO-L: A VHDL-based Fault Injection Tool for the Experimental Assessment of Fault Tolerance[C]//Proc. of the 28th IEEE International Syrup. on Fault-Tolerant Computing.[S. l.]: IEEE Press, 1998.
  • 2孙峻朝,王建莹,杨孝宗.故障注入方法与工具的研究现状[J].宇航学报,2001,22(1):99-104. 被引量:52
  • 3Baraza J C, Gracia J, Gil D, et al. Improvement of Fault Injection Techniques Based on VHDL Code Modification[C]//Proc. of HLDVT'05. [S. l.]: IEEE Computer Society, 2005.
  • 4Baraza J, Gracia J, Blanc S, et al. Enhancement of Fault Injection Techniques Based on the Modification of VHDL Code[J]. IEEE Trans. on Very Large Scale Integration Systems, 2008, 16(6): 693-706.
  • 5Gracia J, Baraza J C, Gil D, et al. Comparison and Application of Different VHDL-based Fault Injection Techniques[C]//Proc. of IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems. San Francisco, CA, USA: IEEE Press, 2001.

二级参考文献2

  • 1Kalbarczyk Z,Proc 3rd IEEE Int Symp Computer Performance Dependability(IPDS'98),1998年,249页
  • 2Cha H,IEEE Trans Comput,1996年,45卷,11期,1248页

共引文献51

同被引文献58

  • 1秦磊,庞东贺,张展,左德承,杨孝宗.IA64固件层处理器故障注入技术[J].计算机研究与发展,2010,47(S1):141-146. 被引量:1
  • 2赵广燕,孙宇锋,康锐,吴跃.电路故障仿真中的故障建模、注入及判定方法研究[J].微电子学与计算机,2007,24(1):143-146. 被引量:17
  • 3Goloubeva O, Rebaudengo M, Reorda M S, et al. Soft-error Detection Using Control Flow Assertions[C] //Proc. of the 18th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems. Los Alamitos, California, USA: [s. n.] , 2003.
  • 4Cheynet P, Nicolescu B, Velazco R, et al. Experimentally Evalu- ating an Automatic Approach for Generating Safety-critical Software with Respect to Transient Errors[J]. IEEE Trans. on Nuclear Science, 2000, 47(6): 2231-2236.
  • 5Ziegler J F. IBM Experiments in Soft Fails in Computer Elec- tronics(1978-1994)[J]. IBM Journal of Research and Development, 1996, 40(1): 3-18.
  • 6Mahmood A, McCluskey E J. Concurrent Error Detection Using Watchdog Processors——A Survey[J]. IEEE Trans. on Computers, 1988, 37(2): 160-174.
  • 7Nahmsuk O, Shirvani P P, McCluskey E J. Control Flow Checking by Software Signatures[J]. IEEE Trans. on Reliability, 2002, 51: 111-122.
  • 8Huang J C. Detection of Data Flow Anomaly Through Program Instrumentation[J]. IEEE Trans. on Software Engineering, 1979, 5(3): 226-236.
  • 9Nahmsuk O, Subhasish M, McCluskey E J. ED4I: Error Detection by Diverse Data and Duplicated Instructions[J]. IEEE Trans. on Computers, 2002, 51(2): 180-199.
  • 10Avizienis A. The N-version Approach to Fault-tolerant Software[J]. IEEE Trans. on Software Engineering, 1985, 11(12): 1491-1501.

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部