Revisiting Fault-Injection Experiment-Platform Architectures

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Autoren

  • Horst Schirmeier
  • Martin Hoffmann
  • Rüdiger Kapitza
  • Daniel Lohmann
  • Olaf Spinczyk

Externe Organisationen

  • Technische Universität Dortmund
  • Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU Erlangen-Nürnberg)
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des Sammelwerks2011 17th IEEE Pacific Rim International Symposium on Dependable Computing
Seiten284-285
Seitenumfang2
PublikationsstatusVeröffentlicht - 19 Jan. 2012
Extern publiziertJa
Veranstaltung17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC) - Pasadena, USA / Vereinigte Staaten
Dauer: 12 Dez. 201114 Dez. 2011

Abstract

Many years of research on dependable, fault-tolerant software systems yielded a myriad of tool implementations for vulnerability analysis and experimental validation of resilience measures. Trace recording and fault injection are among the core functionalities these tools provide for hardware debuggers or system simulators, partially including some means to automate larger experiment campaigns. We argue that current fault-injection tools are too highly specialized for specific hardware devices or simulators, and are developed in poorly modularized implementations impeding evolution and maintenance. In this article, we present a novel design approach for a fault-injection infrastructure that allows experimenting researchers to switch simulator or hardware back ends with little effort, fosters experiment code reuse, and retains a high level of maintainability.

ASJC Scopus Sachgebiete

Zitieren

Revisiting Fault-Injection Experiment-Platform Architectures. / Schirmeier, Horst; Hoffmann, Martin; Kapitza, Rüdiger et al.
2011 17th IEEE Pacific Rim International Symposium on Dependable Computing. 2012. S. 284-285.

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Schirmeier, H, Hoffmann, M, Kapitza, R, Lohmann, D & Spinczyk, O 2012, Revisiting Fault-Injection Experiment-Platform Architectures. in 2011 17th IEEE Pacific Rim International Symposium on Dependable Computing. S. 284-285, 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Pasadena, California, USA / Vereinigte Staaten, 12 Dez. 2011. https://doi.org/10.1109/PRDC.2011.46
Schirmeier, H., Hoffmann, M., Kapitza, R., Lohmann, D., & Spinczyk, O. (2012). Revisiting Fault-Injection Experiment-Platform Architectures. In 2011 17th IEEE Pacific Rim International Symposium on Dependable Computing (S. 284-285) https://doi.org/10.1109/PRDC.2011.46
Schirmeier H, Hoffmann M, Kapitza R, Lohmann D, Spinczyk O. Revisiting Fault-Injection Experiment-Platform Architectures. in 2011 17th IEEE Pacific Rim International Symposium on Dependable Computing. 2012. S. 284-285 doi: 10.1109/PRDC.2011.46
Schirmeier, Horst ; Hoffmann, Martin ; Kapitza, Rüdiger et al. / Revisiting Fault-Injection Experiment-Platform Architectures. 2011 17th IEEE Pacific Rim International Symposium on Dependable Computing. 2012. S. 284-285
Download
@inproceedings{59aab28de9f04b059b37319f23f0c443,
title = "Revisiting Fault-Injection Experiment-Platform Architectures",
abstract = "Many years of research on dependable, fault-tolerant software systems yielded a myriad of tool implementations for vulnerability analysis and experimental validation of resilience measures. Trace recording and fault injection are among the core functionalities these tools provide for hardware debuggers or system simulators, partially including some means to automate larger experiment campaigns. We argue that current fault-injection tools are too highly specialized for specific hardware devices or simulators, and are developed in poorly modularized implementations impeding evolution and maintenance. In this article, we present a novel design approach for a fault-injection infrastructure that allows experimenting researchers to switch simulator or hardware back ends with little effort, fosters experiment code reuse, and retains a high level of maintainability.",
keywords = "AOP, Fault injection, Separation of concerns, Software engineering",
author = "Horst Schirmeier and Martin Hoffmann and R{\"u}diger Kapitza and Daniel Lohmann and Olaf Spinczyk",
year = "2012",
month = jan,
day = "19",
doi = "10.1109/PRDC.2011.46",
language = "English",
isbn = "9780769545905",
pages = "284--285",
booktitle = "2011 17th IEEE Pacific Rim International Symposium on Dependable Computing",
note = "17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), PRDC ; Conference date: 12-12-2011 Through 14-12-2011",

}

Download

TY - GEN

T1 - Revisiting Fault-Injection Experiment-Platform Architectures

AU - Schirmeier, Horst

AU - Hoffmann, Martin

AU - Kapitza, Rüdiger

AU - Lohmann, Daniel

AU - Spinczyk, Olaf

PY - 2012/1/19

Y1 - 2012/1/19

N2 - Many years of research on dependable, fault-tolerant software systems yielded a myriad of tool implementations for vulnerability analysis and experimental validation of resilience measures. Trace recording and fault injection are among the core functionalities these tools provide for hardware debuggers or system simulators, partially including some means to automate larger experiment campaigns. We argue that current fault-injection tools are too highly specialized for specific hardware devices or simulators, and are developed in poorly modularized implementations impeding evolution and maintenance. In this article, we present a novel design approach for a fault-injection infrastructure that allows experimenting researchers to switch simulator or hardware back ends with little effort, fosters experiment code reuse, and retains a high level of maintainability.

AB - Many years of research on dependable, fault-tolerant software systems yielded a myriad of tool implementations for vulnerability analysis and experimental validation of resilience measures. Trace recording and fault injection are among the core functionalities these tools provide for hardware debuggers or system simulators, partially including some means to automate larger experiment campaigns. We argue that current fault-injection tools are too highly specialized for specific hardware devices or simulators, and are developed in poorly modularized implementations impeding evolution and maintenance. In this article, we present a novel design approach for a fault-injection infrastructure that allows experimenting researchers to switch simulator or hardware back ends with little effort, fosters experiment code reuse, and retains a high level of maintainability.

KW - AOP

KW - Fault injection

KW - Separation of concerns

KW - Software engineering

UR - http://www.scopus.com/inward/record.url?scp=84857774793&partnerID=8YFLogxK

U2 - 10.1109/PRDC.2011.46

DO - 10.1109/PRDC.2011.46

M3 - Conference contribution

AN - SCOPUS:84857774793

SN - 9780769545905

SP - 284

EP - 285

BT - 2011 17th IEEE Pacific Rim International Symposium on Dependable Computing

T2 - 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC)

Y2 - 12 December 2011 through 14 December 2011

ER -