J. Vankeirsbilck, Venu Babu Thati, Jonas Van Waes, H. Hallez, J. Boydens
{"title":"Control flow aware software-implemented fault injection for embedded CPUs","authors":"J. Vankeirsbilck, Venu Babu Thati, Jonas Van Waes, H. Hallez, J. Boydens","doi":"10.1109/ET.2017.8124402","DOIUrl":null,"url":null,"abstract":"Fault injection is a highly used technique to test fault-tolerant embedded systems. We present a new software-implemented fault injection process to deterministically inject control flow errors in embedded CPUs. The proposed process analyses the disassembly file of the program acting on the embedded CPUs to construct the correct control flow. Once known, this information is used to deterministically inject intra-block, inter-block and out-of-function errors. To conclude, we discuss how our process can aid in performing a vulnerability analysis for a target algorithm.","PeriodicalId":127983,"journal":{"name":"2017 XXVI International Scientific Conference Electronics (ET)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 XXVI International Scientific Conference Electronics (ET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ET.2017.8124402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Fault injection is a highly used technique to test fault-tolerant embedded systems. We present a new software-implemented fault injection process to deterministically inject control flow errors in embedded CPUs. The proposed process analyses the disassembly file of the program acting on the embedded CPUs to construct the correct control flow. Once known, this information is used to deterministically inject intra-block, inter-block and out-of-function errors. To conclude, we discuss how our process can aid in performing a vulnerability analysis for a target algorithm.