Dimitry Solet, Jean-Luc Béchennec, M. Briday, S. Faucou, S. Pillement
{"title":"Hardware Runtime Verification of a RTOS Kernel: Evaluation Using Fault Injection","authors":"Dimitry Solet, Jean-Luc Béchennec, M. Briday, S. Faucou, S. Pillement","doi":"10.1109/EDCC.2018.00016","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00016","url":null,"abstract":"Nowadays complete systems can be built on a System-on-a-Programmable-Chip that integrates a microcontroller and a FPGA fabric into a single chip. Beside its traditional use to implement hardware accelerators, the FPGA can be used to monitor the software running on the microcontroller with a very small overhead. In this work, we investigate the case of monitoring safety properties. We have synthesized a runtime verification system to verify a part of the behavior of a real-time operating system. The paper presents the coverage provided by this approach with regards to transient hardware faults. The evaluation is based on an ISA-level fault injection campaign.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Formal Approach to Analysing Security of Safety-Critical Systems","authors":"Inna Vistbakka, E. Troubitsyna","doi":"10.1109/EDCC.2018.00040","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00040","url":null,"abstract":"Since safety-critical control systems become increasingly interconnected, there is a clear need for the techniques that enable an integrated analysis of safety and security requirements. In this paper, we propose an integrated approach to systematically deriving and formalising safety and security requirements. To facilitate requirements elicitation, we propose to adapt and integrate traditional safety and security analysis techniques. To formally specify and verify the requirements, we rely on Event-B framework. By relying on refinement and proofs, the framework allows us to specify and verify system behaviour in presence of both accidental faults and security attacks and analyse mutual interdependencies between safety and security requirements.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Message-Passing Based Algorithm for k-Terminal Reliability","authors":"Minh Lê, J. Weidendorfer","doi":"10.1109/EDCC.2018.00022","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00022","url":null,"abstract":"As the exact computation of the k-terminal reliability is an NP-Complete problem, runtime and memory requirements grow exponentially with the input size. Shared memory parallelization algorithms were developed for reducing runtime. However, even a relatively high amount of memory can already be exhausted within a short period of time. A message-passing based algorithm is proposed in order to circumvent the memory limitation of shared memory implementations. It is the first message-passing based algorithm for the k-terminal problem. The new algorithm is designed for the currently most efficient BDD-based method. New data structures such as the distributed BDD and a distributed hash table lead to good speedup results and load-balanced task distributions. Now the size of computable inputs are limited to the memory carried along by the available cores. The two-terminal reliability of a 17 node complete network was computed on 1024 cores of the SuperMUC within 7 minutes, using 1.28 Terabyte of memory and resulting in more than 6 billion BDD nodes.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132994015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Aldweesh, Maher Alharby, E. Solaiman, A. Moorsel
{"title":"Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum","authors":"A. Aldweesh, Maher Alharby, E. Solaiman, A. Moorsel","doi":"10.1109/EDCC.2018.00034","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00034","url":null,"abstract":"A defining feature of the Ethereum blockchain is its ability to execute smart contracts, providing a Turing complete programming model for distributed applications in non-trusted environments. The successful operation of the Ethereum blockchain depends on whether the miners' incentives (in the form of fees) to execute contracts is proportional to the miners' cost (in terms of energy usage, and thus CPU usage). In general, if the received fee is not proportional to the computational cost, miners would prefer some tasks over others, thus potentially adversely affecting the continuing dependable operation of the blockchain. In this paper we design a benchmark to compare smart contract execution time with the award a miner would receive, to determine if incentives align. We present the design of the benchmarking approach and provide initial results for the Python Ethereum client running on a Mac. The results indicate that for functions in Ethereum's most popular contracts the difference of reward per CPU second can be up to a factor of almost 50. In addition, contract creation, which is done once for each new contract, can be up to 6 times more lucrative than the regular execution of contract functions. Potentially, these discrepancies result in misaligned incentives that impact the dependable operation of the blockchain.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"10 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Cerveira, Alcides Fonseca, R. Barbosa, H. Madeira
{"title":"Evaluating the Inherent Sensitivity of Programming Languages to Soft Errors","authors":"F. Cerveira, Alcides Fonseca, R. Barbosa, H. Madeira","doi":"10.1109/EDCC.2018.00021","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00021","url":null,"abstract":"The choice of programming language depends on a number of factors, such as efficiency and maintainability. With the predicted increase of the soft error rate in coming years due to technological improvements and the popularization of energy-saving techniques, the responsibility of tolerating transient hardware faults is no longer solely on the hardware-side, but is becoming more and more a software problem. Therefore choices taken throughout the software development and compilation process, such as the used programming language, are now a factor that should be taken into account. This paper evaluates the impact of the programming language in the sensitivity and vulnerability to soft errors of an application, through extensive fault injection campaigns that cover 5 benchmarks over 7 programming languages, considering the most common implementation. The results show that both the programming language and workload have a significant correlation with the occurrence of failures due to soft errors. Furthermore, since execution time varied noticeably across programming languages, applications developed in less-efficient languages showed a higher vulnerability time window in which they may be affected by soft errors.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ainhoa Azqueta-Alzúaz, M. Patiño-Martínez, V. Vianello, R. Jiménez-Peris
{"title":"Fault-Tolerance Evaluation of a New SQL Database","authors":"Ainhoa Azqueta-Alzúaz, M. Patiño-Martínez, V. Vianello, R. Jiménez-Peris","doi":"10.1109/EDCC.2018.00023","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00023","url":null,"abstract":"The need of systems able to deal with large amounts of data is increasing in the big data era. These systems run on top of a distributed system where failures will happen. In the last decade a large number of data stores have been developed for providing scalability. These systems avoid some of the properties traditional relational databases provided in order to achieve scalability producing a variety of data stores known as NoSQL data stores. In the last years, NewSQL systems have been developed in order to meet the best of both worlds: transactional processing and SQL language and scalability. In this paper we present a practical experience on how failures affect the regular operation of a scalable fault-tolerant relational database (NewSQL), CumuloNimbo. The paper evaluates the performance of CumuloNimbo using the TPC-C benchmark varying the number of nodes where the database runs under different failure scenarios.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115952979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Network Threats using OSINT Knowledge-Based IDS","authors":"Ivo Vacas, Ibéria Medeiros, N. Neves","doi":"10.1109/EDCC.2018.00031","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00031","url":null,"abstract":"Cybercrime has steadily increased over the last years, being nowadays the greatest security concern of most enterprises. Institutions often protect themselves from attacks by employing intrusion detection systems (IDS) that analyze the payload of packets to find matches with rules representing threats. However, the accuracy of these systems is as good as the knowledge they have about the threats. Nowadays, with the continuous flow of novel forms of sophisticated attacks and their variants, it is a challenge to keep an IDS updated. Open Source Intelligence (OSINT) could be explored to effectively obtain this knowledge, by retrieving information from diverse sources. This paper proposes a fully automated approach to update the IDS knowledge, covering the full cycle from OSINT data feed collection until the installation of new rules and blacklists. The approach was implemented as the IDSoSint system and was assessed with 49 OSINT feeds and production traffic. It was able to identify in real time various forms of malicious activities, including botnet C&C servers communications, remote access applications, brute-force attacks, and phishing events.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Stochastic Blockchain Models","authors":"Pierre-Yves Piriou, J. Dumas","doi":"10.1109/EDCC.2018.00035","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00035","url":null,"abstract":"This paper build the foundations of a simulation tool for blockchain-based applications. It takes advantage of the huge expressiveness and extensibility of PyCATSHOO framework to deal with the important variability of blockchain implémentations and properties of interest. A simple stochastic model of generic blockchain-style distributed consensus system and associated performance indicators are proposed (performance in terms of consistency and ability to discard double-spending attacks). Monte Carlo simulations are applied to assess the indicators and determine their sensitivity to the variation of input parameters.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lucas Bressan, A. L. Oliveira, Leonardo Montecchi, B. Gallina
{"title":"A Systematic Process for Applying the CHESS Methodology in the Creation of Certifiable Evidence","authors":"Lucas Bressan, A. L. Oliveira, Leonardo Montecchi, B. Gallina","doi":"10.1109/EDCC.2018.00019","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00019","url":null,"abstract":"CHESS is an open source methodology and toolset for the development of safety-critical systems. More specifically, CHESS is a model-based methodology, which supports the design, dependability analysis, and code generation for critical systems. Despite its rather mature level in terms of technology readiness, systematic guidance needs to be developed to promote its usage for certification purposes. In this paper, we present a systematic process to guide designers and analysts in the usage of the CHESS toolset for model-based dependability analysis of safety-critical systems in compliance with ISO 26262 Parts 3 and 4, SAE ARP 4754A safety process, and DO-331 model-based development principles. We also have applied our process to a real world automotive hybrid braking system. The proposed process can be used to guide analysts in using CHESS methodology to support both system design and dependability analysis. Finally, we draw our conclusion and sketch future work.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132999467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}