scispace - formally typeset
J

J. Ohlsson

Researcher at Chalmers University of Technology

Publications -  5
Citations -  637

J. Ohlsson is an academic researcher from Chalmers University of Technology. The author has contributed to research in topics: Fault injection & VHDL. The author has an hindex of 5, co-authored 5 publications receiving 622 citations.

Papers
More filters
Book ChapterDOI

Fault injection into VHDL models: the MEFISTO tool

TL;DR: This paper focuses on the integration of the fault injection methodology within the design process of fault-tolerant systems, and the main features of the MEFISTO environment aimed at supporting these techniques.
Proceedings ArticleDOI

A study of the effects of transient fault injection into a 32-bit RISC with built-in watchdog

TL;DR: An error-detecting 32-b reduced instruction set computer (RISC) designed in a 1.2- mu m CMOS technology with an on-chip watchdog using embedded signature monitoring using VHDL description language is presented.
Proceedings ArticleDOI

Implicit signature checking

TL;DR: A control flow checking method that assigns unique initial signatures to each basic block in a program by using the block's start address, which results in a short error detection latency (2-5 instructions).
Proceedings ArticleDOI

On microprocessor error behavior modeling

TL;DR: A microprocessor error behavior function (EBF) is introduced, mapping faults into errors on the functional level, and the results of the emulated bit-flip errors corresponded well to the real results obtained using bit-Flip faults, thus indicating that the injected errors are good approximations of the faults.
Proceedings ArticleDOI

Fault Injection Into VHDL Models: A Fault Injection Tool And Some Preliminary Experimental Results

TL;DR: Two main trends characterize recent work on fault injection: (i) apply fault injection as early as possible in the design process of fault-tolerant systems and (ii) when dealing with the implementation of the target fault-Tolerant system, favor software-implemented fault injection, i.e., based on the mutation of the executing software or the data.