Formal Fault Tolerance Analysis of Algorithms for Redundant Systems in Early Design Stages

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8785)


Redundant techniques, that use voting principles, are often used to increase the reliability of systems by ensuring fault tolerance. In order to increase the efficiency of these redundancy strategies we propose to exploit the inherent fault masking properties of software-algorithms at application-level. An important step in early development stages is to choose from a class of algorithms that achieve the same goal in different ways, one or more that should be executed redundantly. In order to evaluate the resilience of the algorithm variants, there is a great need for a quantitative reasoning about the algorithms fault tolerance in early design stages.

Here, we propose an approach of analyzing the vulnerability of given algorithm variants to hardware faults in redundant designs by applying a model checker and fault injection modelling. The method is capable of automatically identifying all input and fault combinations that remain undetected by a voting system. This leads to a better understanding of algorithm-specific resilience characteristics.


fault tolerance redundancy MooN systems model checker fault injection fault masking 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Baarir, S., Braunstein, C., Encrenaz, E., Ilié, J.: Feasibility Analysis for MEU Robustness Quantification by Symbolic Model checking. Formal Methods in System Design (2011)Google Scholar
  2. 2.
    Bozzano, M., Villafiorita, A.: The FSAP/NuSMV-SA safety analysis platform. Journal on Software Tools for Technology Transfer (2007)Google Scholar
  3. 3.
    Campetelli, A., Hölzl, F., Neubeck, P.: User-friendly model checking integration in model-based development. In: CAINE (2011)Google Scholar
  4. 4.
    Cavada, R., Cimatti, A., Jochim, C., Keighren, G., Olivetti, E., Pistore, M., Roveri, M., Tchaltsev, A.: Nusmv 2.4 User Manual. ITCIRST (2005)Google Scholar
  5. 5.
    Ezekiel, J., Lomuscio, A.: Combining fault injection and model checking to verify fault tolerance in multi-agent systems. In: AAMAS (2009)Google Scholar
  6. 6.
    Henkel, J., Bauer, L., Zhang, H.: Multi-layer dependability: From microarchitecture to application level. In: DAC (2014)Google Scholar
  7. 7.
    Höller, A., Krieg, A., Preschern, C., Steger, C., Bock, H., Haid, J., Kreiner, C.: Automatized high-level evaluation of security properties for RTL hardware designs. In: 8th Workshop on Embedded Systems Security (2013)Google Scholar
  8. 8.
    Huang, et al.: A simulator for evaluating redundancy analysis algorithms of repairable embedded memories. In: Workshop on Memory Technology, Design and Testing (2002)Google Scholar
  9. 9.
    Huth, M., Ryan, M.: Logic in Computer Science: Modelling and reasoning about systems. Cambridge University Press (2006)Google Scholar
  10. 10.
    IEC/EN 61508: Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems (1999-2002)Google Scholar
  11. 11.
    ISO 26262: Road vehicles - Functional Safety Standard (2009)Google Scholar
  12. 12.
    Krautz, et al.: Evaluating coverage of error detection logic for soft errors using formal methods. In: DATE (2006)Google Scholar
  13. 13.
    Krieg, et al.: Power and Fault Emulation for Software Verification and System Stability Testing in Safety Critical Environments. IEEE Transactions on Industrial Informatics (2013)Google Scholar
  14. 14.
    Kuznetsova, Y.: Analysis and Evaluation of Sequential Redundancy Identification Algorithms. Ph.D. thesis (2011)Google Scholar
  15. 15.
    Latif-Shabgahi, G., Bass, J.M., Bennett, S.: A taxonomy for software voting algorithms used in safety-critical systems. IEEE Transactions on Reliability (2004)Google Scholar
  16. 16.
    Maniatakos, M., Michael, M.K., Makris, Y.: Investigating the limits of AVF analysis in the presence of multiple bit errors. In: International On-Line Testing Symposium (2013)Google Scholar
  17. 17.
    Peters, A.J., Sindrilaru, E.A., Zigann, P.: Evaluation of software based redundancy algorithms for the EOS storage system at CERN. Journal of Physics: Conference Series (2012)Google Scholar
  18. 18.
    Rafe, V., Rahmani, M., Rashidi, K.: A Survey on Coping with the State Space Explosion Problem in Model Checking. International Research Journal of Applied and Basic Sciences (2013)Google Scholar
  19. 19.
    Seshia, S.A., Li, W., Mitra, S.: Verification-guided soft error resilience. In: DATE (2007)Google Scholar
  20. 20.
    Sharma, V., Haran, A., Rakamaric, Z., Gopalakrishnan, G.: Towards Formal Approaches to System Resilience. In: Pacific Rim International Symposium on Dependable Computing (2013)Google Scholar
  21. 21.
    Voelter, et al.: Mbeddr: Instantiating a Language Workbench in the Embedded Software Domain. Automated Software Engineering (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Institute of Technical InformaticsGraz University of TechnologyAustria

Personalised recommendations