Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
MODIFI: A MODel-Implemented Fault Injection Tool
KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Mechatronics.
KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Mechatronics.ORCID iD: 0000-0002-4300-885X
2010 (English)In: 29th International Conference on Computer Sagety, Reliability and Security, 2010, 210-222 p.Conference paper, Published paper (Refereed)
Abstract [en]

Fault injection is traditionally divided into simulation-based and physical techniques depending on whether faults are injected into hardware models, or into an actual physical system or prototype. Another classification is based on how fault injection mechanisms are implemented. Well known techniques are hardware-implemented fault injection (HIFI) and software-implemented fault injection (SWIFI). For safety analyses during model-based development, fault injection mechanisms can be added directly into models of hardware, models of software or models of systems. This approach is denoted by the authors as model-implemented fault injection. This paper presents the MODIFI (MODel-Implemented Fault Injection) tool. The tool is currently targeting behaviour models in Simulink. Fault models used by MODIFI are defined using XML according to a specific schema file and the fault injection algorithm uses the concept of minimal cut sets (MCS) generation. First, a user defined set of single faults are injected to see if the system is tolerant against single faults. Single faults leading to a failure, i.e. a safety requirement violation, are stored in a MCS list together with the corresponding counterexample. These faults are also removed from the fault space used for subsequent experiments. When all single faults have been injected, the effects of multiple faults are investigated, i.e. two or more faults are introduced at the same time. The complete list of MCS is finally used to automatically generate test cases for efficient fault injection on the target system.

Place, publisher, year, edition, pages
2010. 210-222 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 6351
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:kth:diva-50181ISI: 000289187100016Scopus ID: 2-s2.0-77956574809ISBN: 978-3-642-15650-2 (print)OAI: oai:DiVA.org:kth-50181DiVA: diva2:461604
Conference
29th International Conference on Computer Safety Reliability and Security SEP 14-17 2010 Vienna A U S T R I A
Note
QC 20111205Available from: 2011-12-05 Created: 2011-12-02 Last updated: 2011-12-05Bibliographically approved
In thesis
1. Model-Implemented Fault Injection for Robustness Assessment
Open this publication in new window or tab >>Model-Implemented Fault Injection for Robustness Assessment
2011 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The complexity of safety-related embedded computer systems is steadilyincreasing. Besides verifying that such systems implement the correct functionality, it is essential to verify that they also present an acceptable level of robustness. Robustness is in this thesis defined as the resilience of hardware, software or systems against errors that occur during runtime.

One way of performing robustness assessment is to carry out fault injection, also known as fault insertion testing from certain safety standards. The idea behind fault injection is to accelerate the occurrence of faults in the system to evaluate its behavior under the influence of anticipated faults, and to evaluate error handling mechanisms.

Model-based development is becoming more and more common for the development of safety-related software. Thus, in this thesis we investigate how we can benefit from conducting fault injection experiments on behavior models of software. This is defined as model-implemented fault injection in this thesis, since additional model artifacts are added to support the injection of faults that are activated during simulation. In particular, this thesis addresses injection of hardware fault effects (e.g. bit-level errors in microcontrollers) into Simulink® models.

To evaluate the method, a fault injection tool has been developed (called MODIFI), that is able to perform fault injection into Simulink behavior models. MODIFI imports tailored fault libraries that define the effects of faults according to an XML-schema. The fault libraries are converted into executable model blocks that are added to behavior models and activated during runtime to emulate the effect of faults. Further, we use a method called minimal cut sets generation to increase the usefulness of the tool.

During the work within MOGENTES, an EU 7th framework programme project that focused on model-based generation of test cases for dependable embedded systems, fault injection experiments have been performed on safety related models with the MODIFI tool. Experiments were also performed using traditional fault injection methods, and in particular hardware-implemented fault injection, to evaluate the correlation between the methods.

The results reveal that fault injection on software models is efficient and useful for robustness assessment and that results produced with MODIFI appear to be representative for the results obtained with other fault injection methods. However, a software model suppresses implementation details, thus leading to fewer locations where faults can be injected. Therefore it cannot entirely replace traditional fault injection methods, but by performing model-implemented fault injection in early design phases an overview of the robustness of a model can be obtained, given these limitations. It can also be useful for testing of error handling mechanisms that are implemented in the behavior model.

Place, publisher, year, edition, pages
Stockholm: KTH Royal Institute of Technology, 2011. xi, 39 p.
Series
Trita-MMK, ISSN 1400-1179 ; 2011:16
Keyword
Fault Injection, Model-Implemented Fault Injection, Robustness, Assessment, ISO 26262, ISO 61508, Software
National Category
Embedded Systems
Identifiers
urn:nbn:se:kth:diva-49887 (URN)978-91-7501-173-8 (ISBN)
Presentation
2011-12-09, B319, KTH, Brinellvägen 83, Stockholm, 14:45 (English)
Opponent
Supervisors
Note
QC 20111205Available from: 2011-12-05 Created: 2011-11-30 Last updated: 2011-12-05Bibliographically approved

Open Access in DiVA

No full text

Scopus

Authority records BETA

Törngren, Martin

Search in DiVA

By author/editor
Svenningsson, RickardTörngren, Martin
By organisation
Mechatronics
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 394 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf