نتایج جستجو برای: fault injection

تعداد نتایج: 219704  

2008
Ashish Darbari Bashir M. Al-Hashimi

Using formal verification for designing hardware designs free from logic design bugs has been an active area of research since the last 15 years. Technology has matured and we have a choice of formal tools such as model checkers, equivalence checkers, and a range of theorem provers. Hardware reliability and fault tolerance has been studied for a long time as well, and some good solutions in the...

Journal: :IACR Cryptology ePrint Archive 2015
Christophe Clavier Julien Francq Antoine Wurcker

In this paper we study a parity check based countermeasure proposed by Chen et al. that thwarts their attack by detecting byte fault injection during the AES key schedule process. We provide a generalization of their approach that allows to derive parity equations for every AES sizes not given by the authors. We analyze why Chen et al. countermeasure does not properly works. Doing so we are abl...

2000
Timothy K. Tsai Navjot Singh

The DTS (Dependability Test Suite) fault injection tool can be used to (1) obtain fault injection-based evaluation of system reliability, (2) compare the reliability of different applications, fault tolerance middleware, and platforms, and (3) provide feedback to improve the reliability of the target applications, fault tolerance middleware, and platforms. This paper describes the architecture ...

2013
Andreas Heinig Ingo Korb Florian Schmoll Peter Marwedel Michael Engel

In order to assess the robustness of software-based fault-tolerance methods, extensive tests have to be performed that inject faults, such as bit flips, into hardware components of a running system. Fault injection commonly uses either system simulations, resulting in execution times orders of magnitude longer than on real systems, or exposes a real system to error sources like radiation. This ...

1998
Johan Karlsson

Techniques for error detection and fault tolerance for distributed real-time systems using fixed priority scheduling will be developed and studied. Specifically, techniques for node-level transient fault tolerance, and system-level replica determinism will be considered. Error detection and fault tolerance mechanisms will be implemented in a small real-time kernel and evaluated using both VHDL-...

2008
S. Mir A. Bounceur F. Cenni M. Dubois R. Khereddine L. Kupka L. Lizarraga I. Mansouri J. Muller N. Nguyen L. Rufer E. Simeu H. Stratigopoulos

A Computer-Aided-Test (CAT) platform has been integrated in the Cadence Design Framework Environment for the evaluation of analogue/mixed-signal/RF Built-In-Self-Test (BIST) techniques. It comprises tools for statistical modelling of circuit performances, fault simulation, test generation and test optimization. The fault modelling and fault injection tools are simulator-independent, thus they a...

2009
Zhiqiang Wang

An accurate fuel injection advance angle is an important parameter to obtain better fuel combustion index and emission index. Fuel injection advance angle is always deranged because of the wear of the injection nozzle matching parts, which has serious impact on diesel engine performance. How to measure the fuel injection advance angle easily and accurately is a problem for fault diagnosis of hi...

2009

Semiconductor transient faults (soft errors) are a critical design concern in the reliability of computer systems. Most recent architecture research is focused on using performance models to provide Architecture Vulnerability Factor (AVF) estimates of processor reliability rather than deploying detailed fault injection into hardware RTL models. While AVF analysis provides support for investigat...

2002
Matthias Jacob Dan Boneh Edward W. Felten

We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack where during program execution an attacker injects errors into the program environment. By observing how the program fails under certain errors the attacker can deduc...

Journal: :Proceedings of the Institute for System Programming of RAS 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید