2018 14th European Dependable Computing Conference (EDCC)最新文献

筛选
英文 中文
Accurate Robustness Assessment of HDL Models Through Iterative Statistical Fault Injection 基于迭代统计故障注入的HDL模型鲁棒性准确评估
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00013
I. Tuzov, D. Andrés, J. Ruiz
{"title":"Accurate Robustness Assessment of HDL Models Through Iterative Statistical Fault Injection","authors":"I. Tuzov, D. Andrés, J. Ruiz","doi":"10.1109/EDCC.2018.00013","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00013","url":null,"abstract":"Simulation-based fault injection is commonly used to assess the robustness of hardware components modelled using Hardware Description Languages (HDL). The current complexity of modern circuits usually makes not feasible the consideration of all possible combinations of fault models, targets, and times. By assuming a confidence interval and error margin, statistical fault injection exploits the principle of statistical sampling to reduce the number of experiments while keeping the results representative of the whole population of fault injections. Since the percentage of injected faults leading to failure is a priori unknown, such number of experiments is usually determined by selecting the value maximizing the sample size. This paper argues that this conservative assumption leads to a worst-case scenario that can be improved. The proposal relies on an iterative algorithm that progressively adjust the number of experiments by estimating the percentage of those leading to failure and the error of the estimation. The considered case study illustrates the feasibility and usefulness of the proposal through the robustness assessment of the LEON3 microprocessor model. Beyond that example, this research provides new means to decide when to stop a fault injection campaign and to estimate the error existing in the results finally reported.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123564321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Runtime Verification of Ethereum Smart Contracts 以太坊智能合约的运行时验证
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00036
J. Ellul, Gordon J. Pace
{"title":"Runtime Verification of Ethereum Smart Contracts","authors":"J. Ellul, Gordon J. Pace","doi":"10.1109/EDCC.2018.00036","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00036","url":null,"abstract":"The notion of smart contracts in distributed ledger systems have been hailed as a safe way of enforcing contracts between participating parties. However, unlike legal contracts, which talk about ideal behaviour and consequences of not adhering to such behaviour, smart contracts are by their very nature executable code, giving explicit instructions on how to achieve compliance. Executable specification languages, particularly Turing complete ones, are notoriously known for the difficulty of ensuring correctness, and recent incidents which led to huge financial losses due to bugs in smart contracts, have highlighted this issue. In this paper we show how standard techniques from runtime verification can be used in the domain of smart contracts, including a novel stake-based instrumentation technique which ensures that the violating party provides insurance for correct behaviour. The techniques we describe have been partially implemented in a proof-of-concept tool ContractLarva, which we discuss in this paper.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123565805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
A Study of the Interplay Between Safety and Security Using Model-Implemented Fault Injection 基于模型实现的故障注入的安全性与安全性相互作用研究
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00018
B. Sangchoolie, P. Folkesson, J. Vinter
{"title":"A Study of the Interplay Between Safety and Security Using Model-Implemented Fault Injection","authors":"B. Sangchoolie, P. Folkesson, J. Vinter","doi":"10.1109/EDCC.2018.00018","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00018","url":null,"abstract":"The combination of high mobility and wireless communication in many safety-critical systems have increased their exposure to malicious security threats. Consequently, many works in the past have proposed solutions to ensure safety and security of these systems. However, not much attention has been given to the interplay between these two groups of non-functional requirements. This is a concern as safety solutions may negatively impact system security and vice versa. This paper addresses the interplay between safety and security by proposing an attack injection framework, based on model-implemented fault injection, suitable for model-based design. The framework enables us to study and evaluate the impact of cybersecurity attacks on system safety early in the development process. To this end, we have implemented six attack injection models and conducted experiments on Simulink models of a CAN bus and a brake-by-wire controller. The results show that the security attacks modeled could successfully impact the system safety by violating our defined safety requirements.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Assessing Containerized REST Services Performance in the Presence of Operator Faults 在操作员故障情况下评估容器化REST服务的性能
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00025
Mariana Cunha, N. Laranjeiro
{"title":"Assessing Containerized REST Services Performance in the Presence of Operator Faults","authors":"Mariana Cunha, N. Laranjeiro","doi":"10.1109/EDCC.2018.00025","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00025","url":null,"abstract":"Service applications are increasingly being deployed in virtualized environments, such as virtual machines (VMs) as a means to provide elasticity and to allow fast recovery from failures. The recent trend is now to deploy applications in containers (e.g., Docker or RKT containers), which allow, among many other benefits, to further reduce recovery time, since containers are much more lightweight than VMs. Although several performance benchmarks exist for web services (e.g., TPC-App and SPEC SPECjEnterprise2010) or even virtualized environments (e.g., SPEC Cloud IaaS 2016, TPCx-V), understanding the behavior of containerized services in the presence of faults has been generally disregarded. This paper proposes an experimental approach for evaluating the performance of containerized services in presence of operator faults. The approach is based on the injection of a simple set of operator faults targeting the containers and middleware. Results show noticeable differences regarding the impact of operator faults in Docker and RKT, with the latter one allowing for faster recovery, despite showing the lowest throughput.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 微服务系统零配置监控的探索性研究
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00028
M. Cinque, Raffaele Della Corte, Raffaele Iorio, A. Pecchia
{"title":"An Exploratory Study on Zeroconf Monitoring of Microservices Systems","authors":"M. Cinque, Raffaele Della Corte, Raffaele Iorio, A. Pecchia","doi":"10.1109/EDCC.2018.00028","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00028","url":null,"abstract":"This paper presents an explorative study on microservices monitoring. The study paves the way for MetroFunnel, our novel application-transparent and zeroconf monitoring tool, which aims to cope with the flexibility of microservices systems. MetroFunnel generates a tracelog of microservices' invocations based on the REST request-response communication model. We present an overview of MetroFunnel and its assessment within the well-consolidated Clearwater IMS.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from Program Chair 项目主席致辞
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/edcc.2018.00006
{"title":"Message from Program Chair","authors":"","doi":"10.1109/edcc.2018.00006","DOIUrl":"https://doi.org/10.1109/edcc.2018.00006","url":null,"abstract":"","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Verification for Feature-Based Composition of Workflows 基于特征的工作流组合的形式化验证
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00039
Stephan Adelsberger, Bashar Igried, Markus Moser, V. Savenkov, A. Setzer
{"title":"Formal Verification for Feature-Based Composition of Workflows","authors":"Stephan Adelsberger, Bashar Igried, Markus Moser, V. Savenkov, A. Setzer","doi":"10.1109/EDCC.2018.00039","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00039","url":null,"abstract":"We present FeatureAgda, a framework for specifying and proving properties of feature-based composition of workflows implemented in the Feature-Oriented Software Production Lines paradigm. The resulting workflows allow for adaptation at runtime by changing the set of enabled features. Our framework is based on Agda, which is both a theorem prover and a programming language. It relies on dependent types to support the modular definition of features. While promoting the separation of concerns, we obtain a single artefact written entirely in Agda, allowing family-level formal verification. As a practical application of our approach, we demonstrate a case study from the healthcare domain implementing a complex medication prescription workflow. Our setting allows the workflow to be changed to accommodate the needs of a particular doctor or clinic while having trustworthiness through formal verification.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Proactive Q-Learning Approach for Autoscaling Heterogeneous Cloud Servers 异构云服务器自动扩展的主动q -学习方法
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00038
Federico Lombardi
{"title":"A Proactive Q-Learning Approach for Autoscaling Heterogeneous Cloud Servers","authors":"Federico Lombardi","doi":"10.1109/EDCC.2018.00038","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00038","url":null,"abstract":"Cloud providers offer different physical or virtual machine (VM) types that have different computational power and cost. Choosing the right configuration in a such heterogeneous environment able to sustain a workload while minimising costs is a challenging key aspect. Furthermore, turning-on/off a VM does not come for free, but introduce a reconfiguration overhead that might bring additional costs (e.g. time for moving to the new state and wasted resources for reconfiguration process). In this paper, we aim to find at run time a configuration s.t. (i) is able to sustain an input workload, (ii) does not over-provide resources, and that (iii) is as close as possible to the current one, to minimise the number of involved VMs in the reconfiguration, and thus, minimise the reconfiguration overhead. We propose here a Q-Learning approach to automatically learn the best policy to move from a configuration to another according to a predicted workload. We defined two reward functions which respectively look for (i) a configuration which perfectly fits the requested workload and (ii) a configuration which arrives close to the requested workload, to minimise the reconfiguration overhead. We compared the results with the two reward functions in term of average number of VMs involved in a reconfiguration and we show as with the first reward function we need to change in average 2.3 VM/reconfiguration while with the second reward function we can reduce such number up to 1 VM per reconfiguration with some over-provisioning.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Safety-Awareness and Dynamic Safety Management 迈向安全意识与动态安全管理
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00027
M. Trapp, D. Schneider, Gereon Weiss
{"title":"Towards Safety-Awareness and Dynamic Safety Management","authors":"M. Trapp, D. Schneider, Gereon Weiss","doi":"10.1109/EDCC.2018.00027","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00027","url":null,"abstract":"Future safety-critical systems will be highly automated or even autonomous and they will dynamically cooperate with other systems as part of a comprehensive ecosystem. This together with increasing utilization of artificial intelligence introduces uncertainties on different levels, which detriment the application of established safety engineering methods and standards. These uncertainties might be tackled by making systems safety-aware and enabling them to manage themselves accordingly. This paper introduces a corresponding conceptual dynamic safety management framework incorporating monitoring facilities and runtime safety-models to create safety-awareness. Based on this, planning and execution of safe system optimizations can be carried out by means of self-adaptation. We illustrate our approach by applying it for the dynamic safety assurance of a single car.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131669450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Detection of Integrity Attacks to Smart Grids using Process Mining and Time-Evolving Graphs 基于过程挖掘和时间演化图的智能电网完整性攻击检测
2018 14th European Dependable Computing Conference (EDCC) Pub Date : 2018-09-01 DOI: 10.1109/EDCC.2018.00032
Simona Bernardi, Raquel Trillo Lado, J. Merseguer
{"title":"Detection of Integrity Attacks to Smart Grids using Process Mining and Time-Evolving Graphs","authors":"Simona Bernardi, Raquel Trillo Lado, J. Merseguer","doi":"10.1109/EDCC.2018.00032","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00032","url":null,"abstract":"In this paper, we present a work-in-progress approach to detect integrity attacks to Smart Grids by analyzing the readings from smart meters. Our approach is based on process mining and time-evolving graphs. In particular, process mining is used to discover graphs, from the dataset collecting the readings over a time period, that represent the behaviour of a customer. The time-evolving graphs are then compared in order to detect anomalous behavior of a customer. To evaluate the feasibility of our approach, we have conducted preliminary experiments by using the dataset provided by the Ireland's Commission for Energy Regulation (CER).","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信