Component software: beyond object-oriented programming
Component software: beyond object-oriented programming
An Approach to Program Testing
ACM Computing Surveys (CSUR)
An empirical study of operating systems errors
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Dependability of COTS Microkernel-Based Systems
IEEE Transactions on Computers - Special issue on fault-tolerant embedded systems
Software Engineering Economics
Software Engineering Economics
Software Cost Estimation with Cocomo II with Cdrom
Software Cost Estimation with Cocomo II with Cdrom
Predicting How Badly "Good" Software Can Behave
IEEE Software
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
IEEE Transactions on Software Engineering
PRDC '02 Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing
Comparing Operating Systems Using Robustness Benchmarks
SRDS '97 Proceedings of the 16th Symposium on Reliable Distributed Systems
Operational anomalies as a cause of safety-critical requirements evolution
Journal of Systems and Software
Benchmarking The Dependability of Windows NT4, 2000 and XP
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Error Propagation Profiling of Operating Systems
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Injection of faults at component interfaces and inside the component code: are they equivalent?
EDCC '06 Proceedings of the Sixth European Dependable Computing Conference
On the Selection of Error Model(s) for OS Robustness Evaluation
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Robustness Testing of the Windows DDK
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Windows XP kernel crash analysis
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
IEEE Transactions on Software Engineering
On the Impact of Injection Triggers for OS Robustness Evaluation
ISSRE '07 Proceedings of the The 18th IEEE International Symposium on Software Reliability
Towards a reasoning framework for software product line testing
Proceedings of the 16th International Software Product Line Conference - Volume 2
Hi-index | 0.00 |
Following the design and in-lab testing of software, the evaluation of its resilience to actual operational perturbations in the field is a key validation need. Software-implemented fault injection (SWIFI) is a widely used approach for evaluating the robustness of software components. Recent research [24, 18] indicates that the selection of the applied fault model has considerable influence on the results of SWIFI-based evaluations, thereby raising the question how to select appropriate fault models (i.e. that provide justified robustness evidence). This paper proposes several metrics for comparatively evaluating fault models's abilities to reveal robustness vulnerabilities. It demonstrates their application in the context of OS device drivers by investigating the influence (and relative utility) of four commonly used fault models, i.e. bit flips (in function parameters and in binaries), data type dependent parameter corruptions, and parameter fuzzing. We assess the efficiency of these models at detecting robustness vulnerabilities during the SWIFI evaluation of a real embedded operating system kernel and discuss application guidelines for our metrics alongside.