2018 14th European Dependable Computing Conference (EDCC)最新文献

筛选
英文 中文
Hardware Runtime Verification of a RTOS Kernel: Evaluation Using Fault Injection RTOS内核的硬件运行时验证:使用故障注入的评估
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00016
Dimitry Solet, Jean-Luc Béchennec, M. Briday, S. Faucou, S. Pillement
{"title":"Hardware Runtime Verification of a RTOS Kernel: Evaluation Using Fault Injection","authors":"Dimitry Solet, Jean-Luc Béchennec, M. Briday, S. Faucou, S. Pillement","doi":"10.1109/EDCC.2018.00016","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00016","url":null,"abstract":"Nowadays complete systems can be built on a System-on-a-Programmable-Chip that integrates a microcontroller and a FPGA fabric into a single chip. Beside its traditional use to implement hardware accelerators, the FPGA can be used to monitor the software running on the microcontroller with a very small overhead. In this work, we investigate the case of monitoring safety properties. We have synthesized a runtime verification system to verify a part of the behavior of a real-time operating system. The paper presents the coverage provided by this approach with regards to transient hardware faults. The evaluation is based on an ISA-level fault injection campaign.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from WBD 2018 Workshop Organizers WBD 2018研讨会主办方寄语
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/edcc.2018.00012
{"title":"Message from WBD 2018 Workshop Organizers","authors":"","doi":"10.1109/edcc.2018.00012","DOIUrl":"https://doi.org/10.1109/edcc.2018.00012","url":null,"abstract":"","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120966663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Formal Approach to Analysing Security of Safety-Critical Systems 对安全关键系统的安全分析的正式方法
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00040
Inna Vistbakka, E. Troubitsyna
{"title":"Towards a Formal Approach to Analysing Security of Safety-Critical Systems","authors":"Inna Vistbakka, E. Troubitsyna","doi":"10.1109/EDCC.2018.00040","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00040","url":null,"abstract":"Since safety-critical control systems become increasingly interconnected, there is a clear need for the techniques that enable an integrated analysis of safety and security requirements. In this paper, we propose an integrated approach to systematically deriving and formalising safety and security requirements. To facilitate requirements elicitation, we propose to adapt and integrate traditional safety and security analysis techniques. To formally specify and verify the requirements, we rely on Event-B framework. By relying on refinement and proofs, the framework allows us to specify and verify system behaviour in presence of both accidental faults and security attacks and analyse mutual interdependencies between safety and security requirements.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Message-Passing Based Algorithm for k-Terminal Reliability 基于消息传递的k-终端可靠性算法
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00022
Minh Lê, J. Weidendorfer
{"title":"A Message-Passing Based Algorithm for k-Terminal Reliability","authors":"Minh Lê, J. Weidendorfer","doi":"10.1109/EDCC.2018.00022","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00022","url":null,"abstract":"As the exact computation of the k-terminal reliability is an NP-Complete problem, runtime and memory requirements grow exponentially with the input size. Shared memory parallelization algorithms were developed for reducing runtime. However, even a relatively high amount of memory can already be exhausted within a short period of time. A message-passing based algorithm is proposed in order to circumvent the memory limitation of shared memory implementations. It is the first message-passing based algorithm for the k-terminal problem. The new algorithm is designed for the currently most efficient BDD-based method. New data structures such as the distributed BDD and a distributed hash table lead to good speedup results and load-balanced task distributions. Now the size of computable inputs are limited to the memory carried along by the available cores. The two-terminal reliability of a 17 node complete network was computed on 1024 cores of the SuperMUC within 7 minutes, using 1.28 Terabyte of memory and resulting in more than 6 billion BDD nodes.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132994015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum 评估以太坊矿工激励的智能合约性能基准
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00034
A. Aldweesh, Maher Alharby, E. Solaiman, A. Moorsel
{"title":"Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum","authors":"A. Aldweesh, Maher Alharby, E. Solaiman, A. Moorsel","doi":"10.1109/EDCC.2018.00034","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00034","url":null,"abstract":"A defining feature of the Ethereum blockchain is its ability to execute smart contracts, providing a Turing complete programming model for distributed applications in non-trusted environments. The successful operation of the Ethereum blockchain depends on whether the miners' incentives (in the form of fees) to execute contracts is proportional to the miners' cost (in terms of energy usage, and thus CPU usage). In general, if the received fee is not proportional to the computational cost, miners would prefer some tasks over others, thus potentially adversely affecting the continuing dependable operation of the blockchain. In this paper we design a benchmark to compare smart contract execution time with the award a miner would receive, to determine if incentives align. We present the design of the benchmarking approach and provide initial results for the Python Ethereum client running on a Mac. The results indicate that for functions in Ethereum's most popular contracts the difference of reward per CPU second can be up to a factor of almost 50. In addition, contract creation, which is done once for each new contract, can be up to 6 times more lucrative than the regular execution of contract functions. Potentially, these discrepancies result in misaligned incentives that impact the dependable operation of the blockchain.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"10 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Evaluating the Inherent Sensitivity of Programming Languages to Soft Errors 评估程序设计语言对软错误的固有敏感性
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00021
F. Cerveira, Alcides Fonseca, R. Barbosa, H. Madeira
{"title":"Evaluating the Inherent Sensitivity of Programming Languages to Soft Errors","authors":"F. Cerveira, Alcides Fonseca, R. Barbosa, H. Madeira","doi":"10.1109/EDCC.2018.00021","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00021","url":null,"abstract":"The choice of programming language depends on a number of factors, such as efficiency and maintainability. With the predicted increase of the soft error rate in coming years due to technological improvements and the popularization of energy-saving techniques, the responsibility of tolerating transient hardware faults is no longer solely on the hardware-side, but is becoming more and more a software problem. Therefore choices taken throughout the software development and compilation process, such as the used programming language, are now a factor that should be taken into account. This paper evaluates the impact of the programming language in the sensitivity and vulnerability to soft errors of an application, through extensive fault injection campaigns that cover 5 benchmarks over 7 programming languages, considering the most common implementation. The results show that both the programming language and workload have a significant correlation with the occurrence of failures due to soft errors. Furthermore, since execution time varied noticeably across programming languages, applications developed in less-efficient languages showed a higher vulnerability time window in which they may be affected by soft errors.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fault-Tolerance Evaluation of a New SQL Database 一种新型SQL数据库的容错评估
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00023
Ainhoa Azqueta-Alzúaz, M. Patiño-Martínez, V. Vianello, R. Jiménez-Peris
{"title":"Fault-Tolerance Evaluation of a New SQL Database","authors":"Ainhoa Azqueta-Alzúaz, M. Patiño-Martínez, V. Vianello, R. Jiménez-Peris","doi":"10.1109/EDCC.2018.00023","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00023","url":null,"abstract":"The need of systems able to deal with large amounts of data is increasing in the big data era. These systems run on top of a distributed system where failures will happen. In the last decade a large number of data stores have been developed for providing scalability. These systems avoid some of the properties traditional relational databases provided in order to achieve scalability producing a variety of data stores known as NoSQL data stores. In the last years, NewSQL systems have been developed in order to meet the best of both worlds: transactional processing and SQL language and scalability. In this paper we present a practical experience on how failures affect the regular operation of a scalable fault-tolerant relational database (NewSQL), CumuloNimbo. The paper evaluates the performance of CumuloNimbo using the TPC-C benchmark varying the number of nodes where the database runs under different failure scenarios.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115952979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting Network Threats using OSINT Knowledge-Based IDS 使用OSINT基于知识的IDS检测网络威胁
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00031
Ivo Vacas, Ibéria Medeiros, N. Neves
{"title":"Detecting Network Threats using OSINT Knowledge-Based IDS","authors":"Ivo Vacas, Ibéria Medeiros, N. Neves","doi":"10.1109/EDCC.2018.00031","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00031","url":null,"abstract":"Cybercrime has steadily increased over the last years, being nowadays the greatest security concern of most enterprises. Institutions often protect themselves from attacks by employing intrusion detection systems (IDS) that analyze the payload of packets to find matches with rules representing threats. However, the accuracy of these systems is as good as the knowledge they have about the threats. Nowadays, with the continuous flow of novel forms of sophisticated attacks and their variants, it is a challenge to keep an IDS updated. Open Source Intelligence (OSINT) could be explored to effectively obtain this knowledge, by retrieving information from diverse sources. This paper proposes a fully automated approach to update the IDS knowledge, covering the full cycle from OSINT data feed collection until the installation of new rules and blacklists. The approach was implemented as the IDSoSint system and was assessed with 49 OSINT feeds and production traffic. It was able to identify in real time various forms of malicious activities, including botnet C&C servers communications, remote access applications, brute-force attacks, and phishing events.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Simulation of Stochastic Blockchain Models 随机区块链模型的仿真
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00035
Pierre-Yves Piriou, J. Dumas
{"title":"Simulation of Stochastic Blockchain Models","authors":"Pierre-Yves Piriou, J. Dumas","doi":"10.1109/EDCC.2018.00035","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00035","url":null,"abstract":"This paper build the foundations of a simulation tool for blockchain-based applications. It takes advantage of the huge expressiveness and extensibility of PyCATSHOO framework to deal with the important variability of blockchain implémentations and properties of interest. A simple stochastic model of generic blockchain-style distributed consensus system and associated performance indicators are proposed (performance in terms of consistency and ability to discard double-spending attacks). Monte Carlo simulations are applied to assess the indicators and determine their sensitivity to the variation of input parameters.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Systematic Process for Applying the CHESS Methodology in the Creation of Certifiable Evidence 国际象棋方法论在可证明证据创设中的系统应用
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00019
Lucas Bressan, A. L. Oliveira, Leonardo Montecchi, B. Gallina
{"title":"A Systematic Process for Applying the CHESS Methodology in the Creation of Certifiable Evidence","authors":"Lucas Bressan, A. L. Oliveira, Leonardo Montecchi, B. Gallina","doi":"10.1109/EDCC.2018.00019","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00019","url":null,"abstract":"CHESS is an open source methodology and toolset for the development of safety-critical systems. More specifically, CHESS is a model-based methodology, which supports the design, dependability analysis, and code generation for critical systems. Despite its rather mature level in terms of technology readiness, systematic guidance needs to be developed to promote its usage for certification purposes. In this paper, we present a systematic process to guide designers and analysts in the usage of the CHESS toolset for model-based dependability analysis of safety-critical systems in compliance with ISO 26262 Parts 3 and 4, SAE ARP 4754A safety process, and DO-331 model-based development principles. We also have applied our process to a real world automotive hybrid braking system. The proposed process can be used to guide analysts in using CHESS methodology to support both system design and dependability analysis. Finally, we draw our conclusion and sketch future work.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132999467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信