Proceedings of the 21st Annual Symposium on Integrated Circuits and System Design 2008
DOI: 10.1145/1404371.1404388
|View full text |Cite
|
Sign up to set email alerts
|

A comparative analysis of fault injection methods via enhanced on-chip debug infrastructures

Abstract: On-chip debug (OCD) features are frequently available in modern microprocessors. Their contribution to shorten the time-to-market justifies the industry investment in this area, where a number of competing or complementary proposals are available or under development, e.g. NEXUS, CJTAG, IJTAG. The controllability and observability features provided by OCD infrastructures provide a valuable toolbox that can be used well beyond the debugging arena, improving the return on investment rate by diluting its cost acr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Research in performing fault injections by utilizing Nexus OCD capabilities was generally focused in two different areas: implementing intrusive additional OCD hardware circuitry on the system under test [2,13,14]; and using COTS fault injectors controlled by host computers [14]- [17].…”
Section: Ieee-isto 5001-2003 Standardmentioning
confidence: 99%
See 1 more Smart Citation
“…Research in performing fault injections by utilizing Nexus OCD capabilities was generally focused in two different areas: implementing intrusive additional OCD hardware circuitry on the system under test [2,13,14]; and using COTS fault injectors controlled by host computers [14]- [17].…”
Section: Ieee-isto 5001-2003 Standardmentioning
confidence: 99%
“…OCD circuitry allows for access to internal CPU resources by means of software debugging and development tools. These interfaces are increasingly common [2] and can be used to modify registers and memory contents, providing a useful mechanism to inject faults in processors when a circuit description is not available [3], which allows for faults to be injected into commercial safety grade systems.…”
Section: Introductionmentioning
confidence: 99%
“…It consists of adding one or more modules to an existing system part, for instance, a kernel module into an operating system or a fault injection module into a built-in debug and test infrastructure. It is suitable for those hierarchical mission-critical designs whose components are not easily inspectable [Steininger et al 2003;Zenha-Rela et al 2006;Fidalgo et al 2008]; -simulated fault injection, which exploits a model of the embedded system, where faults can be injected while the system is being simulated using, for instance, a Hardware Description Language (HDL) simulator [Jenn et al 1994;Boue et al 1998] or emulated by means of field programmable gate array (FPGA) devices [Antoni et al 2000;Civera et al 2001]. …”
Section: Related Workmentioning
confidence: 99%