نتایج جستجو برای: fault injection

تعداد نتایج: 219704  

2004
Oliver Tschäche

Dependability benchmarking is meant to measure system characteristics like availability, reliablity, data integrity etc. Todays systems are working at high levels of these characteristics. Evaluation of these characteristics demands to inject faults forcing fault tolerant mechanisms to exercise their tasks. Observing the response of the system leads to measurements assessing the quality of thes...

2003
Gergely PINTÉR András PATARICZA

This paper presents a method and environment for embedding the high-level manifestation of low-level (physical) faults into the behavioral software model in the form of in abstract reusable fault models. The main focus is on the application of intelligent data processing methods for extracting important phenomena from the observations in fault injection experiments.

Journal: :IEEE Trans. Computers 2000
Cristian Constantinescu

ÐIntel Corporation developed the Teraflops supercomputer for the US Department of Energy (DOE) as part of the Accelerated Strategic Computing Initiative (ASCI). This is the most powerful computing machine available today, performing over two trillion floating point operations per second with the aid of more than 9,000 Intel processors. The Teraflops machine employs complex hardware and software...

Journal: :IACR Cryptology ePrint Archive 2010
Yang Li Shigeto Gomisawa Kazuo Sakiyama Kazuo Ohta

Differential Fault Analysis against AES has been actively studied these years. Based on similar assumptions of the fault injection, different DFA attacks against AES have been proposed. However, it is difficult to understand how different attack results are obtained for the same fault injection. It is also difficult to understand the relationship between similar assumptions of fault injection a...

Journal: :IACR Cryptology ePrint Archive 2013
Yuseop Lee Kitae Jeong Jaechul Sung Seokhie Hong

In [15], Li et al. firstly proposed a differential fault analysis on ARIA-128. This attack requires average 45 random byte fault injections. In 2012, Park et al. proposed the improve DFA by using 33 random byte fault injection. Also Kim proposed differential fault analysis based on multi byte fault model. In this model, the number of fault injections is reduce to 13 and If access to the decrypt...

1994
Richard A. DeMillo Tsanchi Li Aditya P. Mathur

The need for fault tolerant software has grown signiicantly with the need for providing computer-based continuous service in a variety of areas that include telecommunications , air and ground transportation, and defense. TAMER (a Testing, Analysis, and Measurement Environment for Robustness) is a tool designed to assess the dependability of such systems. Three key ideas make TAMER diierent fro...

2011
Yu-ichi Hayashi Naofumi Homma Takeshi Sugawara Takaaki Mizuki Takafumi Aoki

This paper presents a new type of fault injection method based on intentional electromagnetic interference (IEMI), which causes information leakage from cryptographic devices without disrupting their operations or damaging their physical structures. The basic principle is to transmit a sinusoidal EM wave via a power/communication cable or an antenna. The IEMI-based fault injection method is per...

Journal: :Comput. J. 1995
Scott Dawson Farnam Jahanian

Ensuring that a distributed system with strict dependability constraints meets its prescribed speciication is a growing challenge that confronts software developers and system engineers. This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols. The proposed technique, called script-driven probing and fault injection, can be used for studying the be...

1994
Scott Dawson

Ensuring that a distributed system with strict dependability constraints meets its prescribed speciication is a growing challenge that confronts software developers and system engineers. This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols. The proposed technique, called script-driven probing and fault injection, can be used for studying the be...

1995
Scott Dawson Farnam Jahanian

Ensuring that a distributed system with strict dependability constraints meets its prescribed speciication is a growing challenge that confronts software developers and system engineers. This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols. The proposed technique, called script-driven probing and fault injection, can be used for studying the be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید