Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,627 papers from all fields of science
Search
Sign In
Create Free Account
Fault injection
Known as:
Injection
In software testing, fault injection is a technique for improving the coverage of a test by introducing faults to test code paths, in particular…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Bebugging
Black-box testing
Code coverage
Communications protocol
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults
Jiesheng Wei
,
Anna Thomas
,
Guanpeng Li
,
K. Pattabiraman
44th Annual IEEE/IFIP International Conference on…
2014
Corpus ID: 4394775
Hardware errors are on the rise with reducing feature sizes, however tolerating them in hardware is expensive. Researchers have…
Expand
Highly Cited
2014
Highly Cited
2014
Efficiency of a glitch detector against electromagnetic fault injection
Loïc Zussa
,
Amine Dehbaoui
,
+5 authors
A. Tria
Design, Automation and Test in Europe
2014
Corpus ID: 7170887
The use of electromagnetic glitches has recently emerged as an effective fault injection technique for the purpose of conducting…
Expand
Review
2007
Review
2007
Faults, Injection Methods, and Fault Attacks
Chong Hee Kim
,
J. Quisquater
IEEE Design & Test of Computers
2007
Corpus ID: 26160856
An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to…
Expand
Highly Cited
2005
Highly Cited
2005
Studying the fault-detection effectiveness of GUI test cases for rapidly evolving software
A. Memon
,
Qing Xie
IEEE Transactions on Software Engineering
2005
Corpus ID: 14584475
Software is increasingly being developed/maintained by multiple, often geographically distributed developers working concurrently…
Expand
Highly Cited
2004
Highly Cited
2004
A method for modeling and quantifying the security attributes of intrusion tolerant systems
B. Madan
,
K. Goseva-Popstojanova
,
K. Vaidyanathan
,
K. Trivedi
Performance evaluation (Print)
2004
Corpus ID: 8446916
Highly Cited
2001
Highly Cited
2001
Dependability analysis in the early phases of UML-based system design
A. Bondavalli
,
M. D. Cin
,
D. Latella
,
I. Majzik
,
A. Pataricza
,
G. Savoia
Computer systems science and engineering
2001
Corpus ID: 7739649
A thorough system specification is insufficient to guarantee that a computer system will adequately perform its tasks during its…
Expand
Highly Cited
2000
Highly Cited
2000
On the emulation of software faults by software fault injection
H. Madeira
,
D. Costa
,
M. Vieira
Proceeding International Conference on Dependable…
2000
Corpus ID: 8349381
This paper presents an experimental study on the emulation of software faults by fault injection. In a first experiment, a set of…
Expand
Highly Cited
2000
Highly Cited
2000
Software reliability and dependability: a roadmap
B. Littlewood
,
L. Strigini
International Conference on Software Engineering
2000
Corpus ID: 11449197
Software's increasing role creates both requirements for being able to trust it more than before, and for more people to know how…
Expand
Highly Cited
1995
Highly Cited
1995
DOCTOR: an integrated software fault injection environment for distributed real-time systems
Seungjae Han
,
K. Shin
,
H. Rosenberg
Proceedings of IEEE International Computer…
1995
Corpus ID: 62746217
The paper presents an integrated software fault injection environment (DOCTOR) which is capable of (1) generating synthetic…
Expand
Highly Cited
1993
Highly Cited
1993
Fault Injection and Dependability Evaluation of Fault-Tolerant Systems
J. Arlat
,
A. Costes
,
Y. Crouzet
,
J. Laprie
,
D. Powell
IEEE Trans. Computers
1993
Corpus ID: 6218146
The authors describe a dependability evaluation method based on fault injection that establishes the link between the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE