Proceedings of IEEE 24th International Symposium on Fault- Tolerant Computing
DOI: 10.1109/ftcs.1994.315656
|View full text |Cite
|
Sign up to set email alerts
|

Fault injection into VHDL models: the MEFISTO tool

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
110
0
7

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 283 publications
(125 citation statements)
references
References 9 publications
0
110
0
7
Order By: Relevance
“…The simulation-based fault injection technique uses the VHDL model as the target system, and it usually includes two implementation methods: modifying the VHDL model and altering the value of signals and variables defined in the prototype [9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The simulation-based fault injection technique uses the VHDL model as the target system, and it usually includes two implementation methods: modifying the VHDL model and altering the value of signals and variables defined in the prototype [9].…”
Section: Related Workmentioning
confidence: 99%
“…It is necessary to add two kinds of dedicated components called "saboteur" and "mutant" which are usually inactive during normal system operation and activated only to inject faults [7], [8], [9], [10]. A saboteur is a special VHDL component added to the original model.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to some fault injection campaigns [4][5], we are basing our description of design error models on three basic characteristics: i) the activation criteria, ii) the consequence of activation, and iii) error injection. Multiple design errors are simulated concurrently; therefore each design error has a unique identification number.…”
Section: Abstract Design-error Modelsmentioning
confidence: 99%
“…Several fault injection techniques have been proposed in the past decades; they can be categorized into simulationbased techniques [4] [5] [6] [7] [8], software-implemented techniques [9] [10] [11] [12], hardware-based techniques [13] [14] [15], and test port-based techniques [8] [12] [16] [17].…”
Section: Introductionmentioning
confidence: 99%