Skip to main content

Formal Fault Tolerance Analysis of Algorithms for Redundant Systems in Early Design Stages

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 8785))

Abstract

Redundant techniques, that use voting principles, are often used to increase the reliability of systems by ensuring fault tolerance. In order to increase the efficiency of these redundancy strategies we propose to exploit the inherent fault masking properties of software-algorithms at application-level. An important step in early development stages is to choose from a class of algorithms that achieve the same goal in different ways, one or more that should be executed redundantly. In order to evaluate the resilience of the algorithm variants, there is a great need for a quantitative reasoning about the algorithms fault tolerance in early design stages.

Here, we propose an approach of analyzing the vulnerability of given algorithm variants to hardware faults in redundant designs by applying a model checker and fault injection modelling. The method is capable of automatically identifying all input and fault combinations that remain undetected by a voting system. This leads to a better understanding of algorithm-specific resilience characteristics.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baarir, S., Braunstein, C., Encrenaz, E., Ilié, J.: Feasibility Analysis for MEU Robustness Quantification by Symbolic Model checking. Formal Methods in System Design (2011)

    Google Scholar 

  2. Bozzano, M., Villafiorita, A.: The FSAP/NuSMV-SA safety analysis platform. Journal on Software Tools for Technology Transfer (2007)

    Google Scholar 

  3. Campetelli, A., Hölzl, F., Neubeck, P.: User-friendly model checking integration in model-based development. In: CAINE (2011)

    Google Scholar 

  4. Cavada, R., Cimatti, A., Jochim, C., Keighren, G., Olivetti, E., Pistore, M., Roveri, M., Tchaltsev, A.: Nusmv 2.4 User Manual. ITCIRST (2005)

    Google Scholar 

  5. Ezekiel, J., Lomuscio, A.: Combining fault injection and model checking to verify fault tolerance in multi-agent systems. In: AAMAS (2009)

    Google Scholar 

  6. Henkel, J., Bauer, L., Zhang, H.: Multi-layer dependability: From microarchitecture to application level. In: DAC (2014)

    Google Scholar 

  7. Höller, A., Krieg, A., Preschern, C., Steger, C., Bock, H., Haid, J., Kreiner, C.: Automatized high-level evaluation of security properties for RTL hardware designs. In: 8th Workshop on Embedded Systems Security (2013)

    Google Scholar 

  8. Huang, et al.: A simulator for evaluating redundancy analysis algorithms of repairable embedded memories. In: Workshop on Memory Technology, Design and Testing (2002)

    Google Scholar 

  9. Huth, M., Ryan, M.: Logic in Computer Science: Modelling and reasoning about systems. Cambridge University Press (2006)

    Google Scholar 

  10. IEC/EN 61508: Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems (1999-2002)

    Google Scholar 

  11. ISO 26262: Road vehicles - Functional Safety Standard (2009)

    Google Scholar 

  12. Krautz, et al.: Evaluating coverage of error detection logic for soft errors using formal methods. In: DATE (2006)

    Google Scholar 

  13. Krieg, et al.: Power and Fault Emulation for Software Verification and System Stability Testing in Safety Critical Environments. IEEE Transactions on Industrial Informatics (2013)

    Google Scholar 

  14. Kuznetsova, Y.: Analysis and Evaluation of Sequential Redundancy Identification Algorithms. Ph.D. thesis (2011)

    Google Scholar 

  15. Latif-Shabgahi, G., Bass, J.M., Bennett, S.: A taxonomy for software voting algorithms used in safety-critical systems. IEEE Transactions on Reliability (2004)

    Google Scholar 

  16. Maniatakos, M., Michael, M.K., Makris, Y.: Investigating the limits of AVF analysis in the presence of multiple bit errors. In: International On-Line Testing Symposium (2013)

    Google Scholar 

  17. Peters, A.J., Sindrilaru, E.A., Zigann, P.: Evaluation of software based redundancy algorithms for the EOS storage system at CERN. Journal of Physics: Conference Series (2012)

    Google Scholar 

  18. Rafe, V., Rahmani, M., Rashidi, K.: A Survey on Coping with the State Space Explosion Problem in Model Checking. International Research Journal of Applied and Basic Sciences (2013)

    Google Scholar 

  19. Seshia, S.A., Li, W., Mitra, S.: Verification-guided soft error resilience. In: DATE (2007)

    Google Scholar 

  20. Sharma, V., Haran, A., Rakamaric, Z., Gopalakrishnan, G.: Towards Formal Approaches to System Resilience. In: Pacific Rim International Symposium on Dependable Computing (2013)

    Google Scholar 

  21. Voelter, et al.: Mbeddr: Instantiating a Language Workbench in the Embedded Software Domain. Automated Software Engineering (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Höller, A., Kajtazovic, N., Preschern, C., Kreiner, C. (2014). Formal Fault Tolerance Analysis of Algorithms for Redundant Systems in Early Design Stages. In: Majzik, I., Vieira, M. (eds) Software Engineering for Resilient Systems. SERENE 2014. Lecture Notes in Computer Science, vol 8785. Springer, Cham. https://doi.org/10.1007/978-3-319-12241-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12241-0_6

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12240-3

  • Online ISBN: 978-3-319-12241-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics