J
J. Ohlsson
Researcher at Chalmers University of Technology
Publications - 5
Citations - 637
J. Ohlsson is an academic researcher from Chalmers University of Technology. The author has contributed to research in topics: Fault injection & VHDL. The author has an hindex of 5, co-authored 5 publications receiving 622 citations.
Papers
More filters
Book ChapterDOI
Fault injection into VHDL models: the MEFISTO tool
TL;DR: This paper focuses on the integration of the fault injection methodology within the design process of fault-tolerant systems, and the main features of the MEFISTO environment aimed at supporting these techniques.
Proceedings ArticleDOI
A study of the effects of transient fault injection into a 32-bit RISC with built-in watchdog
J. Ohlsson,M. Rimen,U. Gunneflo +2 more
TL;DR: An error-detecting 32-b reduced instruction set computer (RISC) designed in a 1.2- mu m CMOS technology with an on-chip watchdog using embedded signature monitoring using VHDL description language is presented.
Proceedings ArticleDOI
Implicit signature checking
J. Ohlsson,M. Rimen +1 more
TL;DR: A control flow checking method that assigns unique initial signatures to each basic block in a program by using the block's start address, which results in a short error detection latency (2-5 instructions).
Proceedings ArticleDOI
On microprocessor error behavior modeling
M. Rimen,J. Ohlsson,Jan Torin +2 more
TL;DR: A microprocessor error behavior function (EBF) is introduced, mapping faults into errors on the functional level, and the results of the emulated bit-flip errors corresponded well to the real results obtained using bit-Flip faults, thus indicating that the injected errors are good approximations of the faults.
Proceedings ArticleDOI
Fault Injection Into VHDL Models: A Fault Injection Tool And Some Preliminary Experimental Results
TL;DR: Two main trends characterize recent work on fault injection: (i) apply fault injection as early as possible in the design process of fault-tolerant systems and (ii) when dealing with the implementation of the target fault-Tolerant system, favor software-implemented fault injection, i.e., based on the mutation of the executing software or the data.