2016
DOI: 10.1016/j.infsof.2016.01.018
|View full text |Cite
|
Sign up to set email alerts
|

Mining and checking paired functions in device drivers using characteristic fault injection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(19 citation statements)
references
References 28 publications
0
19
0
Order By: Relevance
“…An important problem here is how to inject faults to effectively cover as much error handling code as possible. Previous SFI-based approaches for device drivers often inject random faults [21] or perform single fault injection [16], but these strategies still miss much error handling code. To solve this problem, we propose to "fuzz" injected faults according to the runtime information of the driver.…”
Section: A Basic Ideamentioning
confidence: 99%
See 4 more Smart Citations
“…An important problem here is how to inject faults to effectively cover as much error handling code as possible. Previous SFI-based approaches for device drivers often inject random faults [21] or perform single fault injection [16], but these strategies still miss much error handling code. To solve this problem, we propose to "fuzz" injected faults according to the runtime information of the driver.…”
Section: A Basic Ideamentioning
confidence: 99%
“…Note that the mutation method only mutates the executed error sites. Indeed, most segments of error handling code require the failure of only single error site to trigger, and then make the driver abnormally exit without executing other error sites [16]. Thus, only mutating executed error sites can avoid generating many unnecessary error-site sequences.…”
Section: Runtime Informationmentioning
confidence: 99%
See 3 more Smart Citations