Skip to main content

2015 | OriginalPaper | Buchkapitel

Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics

verfasst von : Georgios Stefanakis, Vijay Nagarajan, Marcelo Cintra

Erschienen in: Computer Safety, Reliability, and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, the results of an experimental study on the error sensitivities of application data are presented. We develop a portable software-implemented fault-injection (SWIFI) tool that, on top of performing single-bit flip fault injections and capturing their effects on application behavior, is also data-level aware and tracks the corrupted application data to report their high-level characteristics (usage type, size, user, memory space location). After extensive testing of NPB-serial (7.8M fault injections), we are able to characterize the sensitivities of data based on their high-level characteristics. Moreover, we conclude that application data are error sensitive in parts; depending on their type, they have distinct and wide less-sensitive bit ranges either at the MSBs or LSBs. Among other uses, such insight could drive the development of sensitivity-aware protection mechanisms of application data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sorin, D.J.: Fault tolerant computer architecture. Synth. Lect. Comput. Archit. 4, 1–104 (2009)CrossRef Sorin, D.J.: Fault tolerant computer architecture. Synth. Lect. Comput. Archit. 4, 1–104 (2009)CrossRef
2.
Zurück zum Zitat Kanawati, G., et al.: FERRARI: a flexible software-based fault and error injection system. Trans. Comput. 44(2), 248–260 (1995)CrossRefMATH Kanawati, G., et al.: FERRARI: a flexible software-based fault and error injection system. Trans. Comput. 44(2), 248–260 (1995)CrossRefMATH
3.
Zurück zum Zitat Skarin, D., et al.: GOOFI-2: a tool for experimental dependability assessment. In: DSN (2010) Skarin, D., et al.: GOOFI-2: a tool for experimental dependability assessment. In: DSN (2010)
4.
Zurück zum Zitat Stott, D., et al.: NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors. In: IPDS (2000) Stott, D., et al.: NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors. In: IPDS (2000)
5.
Zurück zum Zitat Carreira, J., et al.: Xception: a technique for the experimental evaluation of dependability in modern computers. Trans. Softw. Eng. 24(2), 125–136 (1998)CrossRef Carreira, J., et al.: Xception: a technique for the experimental evaluation of dependability in modern computers. Trans. Softw. Eng. 24(2), 125–136 (1998)CrossRef
6.
Zurück zum Zitat Segall, Z., et al.: FIAT-fault injection based automated testing environment. In: FTCS (1988) Segall, Z., et al.: FIAT-fault injection based automated testing environment. In: FTCS (1988)
7.
Zurück zum Zitat Mukherjee, S.S., et al.: A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor. In: MICRO (2003) Mukherjee, S.S., et al.: A systematic methodology to compute the architectural vulnerability factors for a high-performance microprocessor. In: MICRO (2003)
8.
Zurück zum Zitat Ayatolahi, F., Sangchoolie, B., Johansson, R., Karlsson, J.: A study of the impact of single bit-flip and double bit-flip errors on program execution. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds.) SAFECOMP. LNCS, vol. 8153, pp. 265–276. Springer, Heidelberg (2013) CrossRef Ayatolahi, F., Sangchoolie, B., Johansson, R., Karlsson, J.: A study of the impact of single bit-flip and double bit-flip errors on program execution. In: Bitsch, F., Guiochet, J., Kaâniche, M. (eds.) SAFECOMP. LNCS, vol. 8153, pp. 265–276. Springer, Heidelberg (2013) CrossRef
9.
Zurück zum Zitat Luk, C.K., et al.: Pin: Building customized program analysis tools with dynamic instrumentation. In: PLDI (2005) Luk, C.K., et al.: Pin: Building customized program analysis tools with dynamic instrumentation. In: PLDI (2005)
10.
Zurück zum Zitat Zhu, Y., et al.: Privacy scope: a precise information flow tracking system for finding application leaks. Technical report (2009) Zhu, Y., et al.: Privacy scope: a precise information flow tracking system for finding application leaks. Technical report (2009)
11.
Zurück zum Zitat Bailey, D., et al.: The NAS parallel benchmarks. Intern J. High Perform. Comput. Appl. 5(3), 63–73 (1991)CrossRef Bailey, D., et al.: The NAS parallel benchmarks. Intern J. High Perform. Comput. Appl. 5(3), 63–73 (1991)CrossRef
12.
Zurück zum Zitat Arlat, J., et al.: Comparison of physical and software-implemented fault injection techniques. Trans. Comput. 52(9), 1115–1133 (2003)CrossRef Arlat, J., et al.: Comparison of physical and software-implemented fault injection techniques. Trans. Comput. 52(9), 1115–1133 (2003)CrossRef
13.
Zurück zum Zitat Hiller, M., et al.: PROPANE: an environment for examining the propagation of errors in software. In: ISSTA (2002) Hiller, M., et al.: PROPANE: an environment for examining the propagation of errors in software. In: ISSTA (2002)
14.
Zurück zum Zitat Gerardin, J.P.: The DEF-Injecto test instrument, assistance in the design of reliable and safe systems. Comput. Ind. 11(4), 311–319 (1989)CrossRef Gerardin, J.P.: The DEF-Injecto test instrument, assistance in the design of reliable and safe systems. Comput. Ind. 11(4), 311–319 (1989)CrossRef
15.
Zurück zum Zitat Greskamp, B., et al.: BlueShift: designing processors for timing speculation from the ground up. In: HPCA (2009) Greskamp, B., et al.: BlueShift: designing processors for timing speculation from the ground up. In: HPCA (2009)
16.
Zurück zum Zitat Ernst, D., et al.: Razor: a low-power pipeline based on circuit-level timing speculation. In: MICRO (2003) Ernst, D., et al.: Razor: a low-power pipeline based on circuit-level timing speculation. In: MICRO (2003)
17.
Zurück zum Zitat Zhang, W., et al.: Performance, energy, and reliability tradeoffs in replicating hot cache lines. In: CASES (2003) Zhang, W., et al.: Performance, energy, and reliability tradeoffs in replicating hot cache lines. In: CASES (2003)
18.
Zurück zum Zitat de Kruijf, M., et al.: Relax: an architectural framework for software recovery of hardware faults. In: ISCA (2010) de Kruijf, M., et al.: Relax: an architectural framework for software recovery of hardware faults. In: ISCA (2010)
19.
Zurück zum Zitat Reis, G.A., et al.: SWIFT: software implemented fault tolerance. In: CGO (2005) Reis, G.A., et al.: SWIFT: software implemented fault tolerance. In: CGO (2005)
20.
Zurück zum Zitat Borodin, D., et al.: Instruction-level fault tolerance configurability. J. Sig. Process. Syst. 57(1), 89–105 (2009)CrossRef Borodin, D., et al.: Instruction-level fault tolerance configurability. J. Sig. Process. Syst. 57(1), 89–105 (2009)CrossRef
21.
Zurück zum Zitat Feng, S., et al.: Shoestring: probabilistic soft error reliability on the cheap. In: ASPLOS (2010) Feng, S., et al.: Shoestring: probabilistic soft error reliability on the cheap. In: ASPLOS (2010)
22.
Zurück zum Zitat Mehrara, M., Austin, T.: Exploiting selective placement for low-cost memory protection. TACO 5(3), 1–24 (2008)CrossRef Mehrara, M., Austin, T.: Exploiting selective placement for low-cost memory protection. TACO 5(3), 1–24 (2008)CrossRef
23.
Zurück zum Zitat Lee, K., et al.: Partially protected caches to reduce failures due to soft errors in multimedia applications. Trans. VLSI Syst. 17(9), 1343–1347 (2009)CrossRef Lee, K., et al.: Partially protected caches to reduce failures due to soft errors in multimedia applications. Trans. VLSI Syst. 17(9), 1343–1347 (2009)CrossRef
24.
Zurück zum Zitat Sampson, A., et al.: EnerJ: approximate data types for safe and general low-power computation. In: PLDI (2011) Sampson, A., et al.: EnerJ: approximate data types for safe and general low-power computation. In: PLDI (2011)
25.
Zurück zum Zitat Chang, J., et al.: Automatic instruction-level software-only recovery. In: DSN (2006) Chang, J., et al.: Automatic instruction-level software-only recovery. In: DSN (2006)
Metadaten
Titel
Understanding the Effects of Data Corruption on Application Behavior Based on Data Characteristics
verfasst von
Georgios Stefanakis
Vijay Nagarajan
Marcelo Cintra
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-24255-2_12