Abstract
In this paper, the results of an experimental study on the error sensitivities of application data are presented. We develop a portable software-implemented fault-injection (SWIFI) tool that, on top of performing single-bit flip fault injections and capturing their effects on application behavior, is also data-level aware and tracks the corrupted application data to report their high-level characteristics (usage type, size, user, memory space location). After extensive testing of NPB-serial (7.8M fault injections), we are able to characterize the sensitivities of data based on their high-level characteristics. Moreover, we conclude that application data are error sensitive in parts; depending on their type, they have distinct and wide less-sensitive bit ranges either at the MSBs or LSBs. Among other uses, such insight could drive the development of sensitivity-aware protection mechanisms of application data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sorin, D.J.: Fault tolerant computer architecture. Synth. Lect. Comput. Archit. 4, 1–104 (2009)
Kanawati, G., et al.: FERRARI: a flexible software-based fault and error injection system. Trans. Comput. 44(2), 248–260 (1995)
Skarin, D., et al.: GOOFI-2: a tool for experimental dependability assessment. In: DSN (2010)
Stott, D., et al.: NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors. In: IPDS (2000)
Carreira, J., et al.: Xception: a technique for the experimental evaluation of dependability in modern computers. Trans. Softw. Eng. 24(2), 125–136 (1998)
Segall, Z., et al.: FIAT-fault injection based automated testing environment. In: FTCS (1988)
Mukherjee, S.S., et al.: A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor. In: MICRO (2003)
Ayatolahi, F., Sangchoolie, B., Johansson, R., Karlsson, J.: A study of the impact of single bit-flip and double bit-flip errors on program execution. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds.) SAFECOMP. LNCS, vol. 8153, pp. 265–276. Springer, Heidelberg (2013)
Luk, C.K., et al.: Pin: Building customized program analysis tools with dynamic instrumentation. In: PLDI (2005)
Zhu, Y., et al.: Privacy scope: a precise information flow tracking system for finding application leaks. Technical report (2009)
Bailey, D., et al.: The NAS parallel benchmarks. Intern J. High Perform. Comput. Appl. 5(3), 63–73 (1991)
Arlat, J., et al.: Comparison of physical and software-implemented fault injection techniques. Trans. Comput. 52(9), 1115–1133 (2003)
Hiller, M., et al.: PROPANE: an environment for examining the propagation of errors in software. In: ISSTA (2002)
Gerardin, J.P.: The DEF-Injecto test instrument, assistance in the design of reliable and safe systems. Comput. Ind. 11(4), 311–319 (1989)
Greskamp, B., et al.: BlueShift: designing processors for timing speculation from the ground up. In: HPCA (2009)
Ernst, D., et al.: Razor: a low-power pipeline based on circuit-level timing speculation. In: MICRO (2003)
Zhang, W., et al.: Performance, energy, and reliability tradeoffs in replicating hot cache lines. In: CASES (2003)
de Kruijf, M., et al.: Relax: an architectural framework for software recovery of hardware faults. In: ISCA (2010)
Reis, G.A., et al.: SWIFT: software implemented fault tolerance. In: CGO (2005)
Borodin, D., et al.: Instruction-level fault tolerance configurability. J. Sig. Process. Syst. 57(1), 89–105 (2009)
Feng, S., et al.: Shoestring: probabilistic soft error reliability on the cheap. In: ASPLOS (2010)
Mehrara, M., Austin, T.: Exploiting selective placement for low-cost memory protection. TACO 5(3), 1–24 (2008)
Lee, K., et al.: Partially protected caches to reduce failures due to soft errors in multimedia applications. Trans. VLSI Syst. 17(9), 1343–1347 (2009)
Sampson, A., et al.: EnerJ: approximate data types for safe and general low-power computation. In: PLDI (2011)
Chang, J., et al.: Automatic instruction-level software-only recovery. In: DSN (2006)
Acknowledgements
We thank the reviewers for their valuable comments and suggestions. This work is supported by EPSRC grant EP/M00113X/1 to the University of Edinburgh.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Stefanakis, G., Nagarajan, V., Cintra, M. (2015). Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9337. Springer, Cham. https://doi.org/10.1007/978-3-319-24255-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-24255-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24254-5
Online ISBN: 978-3-319-24255-2
eBook Packages: Computer ScienceComputer Science (R0)