SailFAIL: Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms.

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Autoren

  • Christian Dietrich
  • Malte Bargholz
  • Yannick Loeck
  • Marcel Budoj
  • Luca Nedaskowskij
  • Daniel Lohmann

Externe Organisationen

  • Technische Universität Hamburg (TUHH)
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des SammelwerksComputer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings
UntertitelComputer Safety, Reliability, and Security
Herausgeber/-innenMario Trapp, Francesca Saglietti, Marc Spisländer, Friedemann Bitsch
Seiten207-221
Seitenumfang15
ISBN (elektronisch)978-3-031-14835-4
PublikationsstatusVeröffentlicht - 2022

Publikationsreihe

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Band13414 LNCS
ISSN (Print)0302-9743
ISSN (elektronisch)1611-3349

Abstract

For systematic fault injection (FI), we deterministically re-execute a program, introduce faults, and observe the program outcome to assess its resilience in the presence of transient hardware faults. For this, simulation-assisted ISA-level FI provides a good trade-off between result quality and the required time to execute the FI campaign. However, for each architecture, this requires a specialized ISA simulator with tracing, injection, and error observation capabilities; a dependency that not only increases the bar for the exploration of ISA-level hardening mechanisms, but which can also deviate from the behavior of the actual hardware, especially when an error propagates through the system and triggers semantic edge cases. With SailFAIL, we propose a model-driven approach to derive FI platforms from Sail models, which formally describe the ISA semantics. Based on two existing (RISC-V, CHERI RISC-V) and one newly introduced (AVR) Sail models, we use the Sail toolchain to derive emulators that we combine with the FAIL* framework into multiple new FI platforms. Furthermore, we extend Sail to automatically introduce bit-wise dynamic register tracing into the emulator, which enables us to harvest bit-wise access information that we use to improve the well-known def-use pruning technique. Thereby, we further reduce the number of necessary injections by up to 19%.

ASJC Scopus Sachgebiete

Zitieren

SailFAIL: Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms. / Dietrich, Christian; Bargholz, Malte; Loeck, Yannick et al.
Computer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings: Computer Safety, Reliability, and Security. Hrsg. / Mario Trapp; Francesca Saglietti; Marc Spisländer; Friedemann Bitsch. 2022. S. 207-221 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 13414 LNCS).

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Dietrich, C, Bargholz, M, Loeck, Y, Budoj, M, Nedaskowskij, L & Lohmann, D 2022, SailFAIL: Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms. in M Trapp, F Saglietti, M Spisländer & F Bitsch (Hrsg.), Computer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings: Computer Safety, Reliability, and Security. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bd. 13414 LNCS, S. 207-221. https://doi.org/10.1007/978-3-031-14835-4_14
Dietrich, C., Bargholz, M., Loeck, Y., Budoj, M., Nedaskowskij, L., & Lohmann, D. (2022). SailFAIL: Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms. In M. Trapp, F. Saglietti, M. Spisländer, & F. Bitsch (Hrsg.), Computer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings: Computer Safety, Reliability, and Security (S. 207-221). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 13414 LNCS). https://doi.org/10.1007/978-3-031-14835-4_14
Dietrich C, Bargholz M, Loeck Y, Budoj M, Nedaskowskij L, Lohmann D. SailFAIL: Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms. in Trapp M, Saglietti F, Spisländer M, Bitsch F, Hrsg., Computer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings: Computer Safety, Reliability, and Security. 2022. S. 207-221. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). Epub 2022 Aug 25. doi: 10.1007/978-3-031-14835-4_14
Dietrich, Christian ; Bargholz, Malte ; Loeck, Yannick et al. / SailFAIL : Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms. Computer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings: Computer Safety, Reliability, and Security. Hrsg. / Mario Trapp ; Francesca Saglietti ; Marc Spisländer ; Friedemann Bitsch. 2022. S. 207-221 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Download
@inproceedings{c8d979d4f0f546b584cffc3512895c69,
title = "SailFAIL: Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms.",
abstract = "For systematic fault injection (FI), we deterministically re-execute a program, introduce faults, and observe the program outcome to assess its resilience in the presence of transient hardware faults. For this, simulation-assisted ISA-level FI provides a good trade-off between result quality and the required time to execute the FI campaign. However, for each architecture, this requires a specialized ISA simulator with tracing, injection, and error observation capabilities; a dependency that not only increases the bar for the exploration of ISA-level hardening mechanisms, but which can also deviate from the behavior of the actual hardware, especially when an error propagates through the system and triggers semantic edge cases. With SailFAIL, we propose a model-driven approach to derive FI platforms from Sail models, which formally describe the ISA semantics. Based on two existing (RISC-V, CHERI RISC-V) and one newly introduced (AVR) Sail models, we use the Sail toolchain to derive emulators that we combine with the FAIL* framework into multiple new FI platforms. Furthermore, we extend Sail to automatically introduce bit-wise dynamic register tracing into the emulator, which enables us to harvest bit-wise access information that we use to improve the well-known def-use pruning technique. Thereby, we further reduce the number of necessary injections by up to 19%.",
keywords = "ISA-level fault injection, Simulation-assisted fault injection, Transient hardware faults",
author = "Christian Dietrich and Malte Bargholz and Yannick Loeck and Marcel Budoj and Luca Nedaskowskij and Daniel Lohmann",
year = "2022",
doi = "10.1007/978-3-031-14835-4_14",
language = "English",
isbn = "978-3-031-14834-7",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "207--221",
editor = "Trapp, {Mario } and Francesca Saglietti and Marc Spisl{\"a}nder and Friedemann Bitsch",
booktitle = "Computer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings",

}

Download

TY - GEN

T1 - SailFAIL

T2 - Model-Derived Simulation-Assisted ISA-Level Fault-Injection Platforms.

AU - Dietrich, Christian

AU - Bargholz, Malte

AU - Loeck, Yannick

AU - Budoj, Marcel

AU - Nedaskowskij, Luca

AU - Lohmann, Daniel

PY - 2022

Y1 - 2022

N2 - For systematic fault injection (FI), we deterministically re-execute a program, introduce faults, and observe the program outcome to assess its resilience in the presence of transient hardware faults. For this, simulation-assisted ISA-level FI provides a good trade-off between result quality and the required time to execute the FI campaign. However, for each architecture, this requires a specialized ISA simulator with tracing, injection, and error observation capabilities; a dependency that not only increases the bar for the exploration of ISA-level hardening mechanisms, but which can also deviate from the behavior of the actual hardware, especially when an error propagates through the system and triggers semantic edge cases. With SailFAIL, we propose a model-driven approach to derive FI platforms from Sail models, which formally describe the ISA semantics. Based on two existing (RISC-V, CHERI RISC-V) and one newly introduced (AVR) Sail models, we use the Sail toolchain to derive emulators that we combine with the FAIL* framework into multiple new FI platforms. Furthermore, we extend Sail to automatically introduce bit-wise dynamic register tracing into the emulator, which enables us to harvest bit-wise access information that we use to improve the well-known def-use pruning technique. Thereby, we further reduce the number of necessary injections by up to 19%.

AB - For systematic fault injection (FI), we deterministically re-execute a program, introduce faults, and observe the program outcome to assess its resilience in the presence of transient hardware faults. For this, simulation-assisted ISA-level FI provides a good trade-off between result quality and the required time to execute the FI campaign. However, for each architecture, this requires a specialized ISA simulator with tracing, injection, and error observation capabilities; a dependency that not only increases the bar for the exploration of ISA-level hardening mechanisms, but which can also deviate from the behavior of the actual hardware, especially when an error propagates through the system and triggers semantic edge cases. With SailFAIL, we propose a model-driven approach to derive FI platforms from Sail models, which formally describe the ISA semantics. Based on two existing (RISC-V, CHERI RISC-V) and one newly introduced (AVR) Sail models, we use the Sail toolchain to derive emulators that we combine with the FAIL* framework into multiple new FI platforms. Furthermore, we extend Sail to automatically introduce bit-wise dynamic register tracing into the emulator, which enables us to harvest bit-wise access information that we use to improve the well-known def-use pruning technique. Thereby, we further reduce the number of necessary injections by up to 19%.

KW - ISA-level fault injection

KW - Simulation-assisted fault injection

KW - Transient hardware faults

UR - http://www.scopus.com/inward/record.url?scp=85137992380&partnerID=8YFLogxK

U2 - 10.1007/978-3-031-14835-4_14

DO - 10.1007/978-3-031-14835-4_14

M3 - Conference contribution

SN - 978-3-031-14834-7

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 207

EP - 221

BT - Computer Safety, Reliability, and Security - 41st International Conference, SAFECOMP 2022, Proceedings

A2 - Trapp, Mario

A2 - Saglietti, Francesca

A2 - Spisländer, Marc

A2 - Bitsch, Friedemann

ER -