2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2020
DOI: 10.1109/dsn48063.2020.00052
|View full text |Cite
|
Sign up to set email alerts
|

ProFIPy: Programmable Software Fault Injection as-a-Service

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…We developed an automated tool to scan the source code of Nova, Cinder, and Neutron to find all the injectable API calls, and to introduce faults by mutating the calls [52]. For each workload, we identified the injectable locations that were covered by the workload itself, and we performed one fault injection test per covered location.…”
Section: Methodsmentioning
confidence: 99%
“…We developed an automated tool to scan the source code of Nova, Cinder, and Neutron to find all the injectable API calls, and to introduce faults by mutating the calls [52]. For each workload, we identified the injectable locations that were covered by the workload itself, and we performed one fault injection test per covered location.…”
Section: Methodsmentioning
confidence: 99%
“…The authors use a tool which generates an Abstract Syntax Tree and inject faults in the tree, converting the result back to source code and place their focus on understanding failures. The authors have recently further developed their work in Cotroneo et al (2020) to propose a fault injection tool offered as a service, which supports the user through the definition of some of the key steps of a fault injection campaign (e.g., workload and faultload definition, failure data analysis).…”
Section: Background and Related Workmentioning
confidence: 99%
“…A requirement we set for our experiments was that the software fault should only be activated while the workload (i.e., Solr) is being executed, thus after any preparatory steps (e.g., creating base save files) have been completed. This was reached by encompassing the software fault inside an if whose activation depends on a variable (a similar practice has been used in other works [53], [54]) that is manipulated by the microvisor using VMI. When the value of the variable is false, the non-faulty code is executed.…”
Section: Fault Injectionmentioning
confidence: 99%