{"title":"Accurate Robustness Assessment of HDL Models Through Iterative Statistical Fault Injection","authors":"I. Tuzov, D. Andrés, J. Ruiz","doi":"10.1109/EDCC.2018.00013","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00013","url":null,"abstract":"Simulation-based fault injection is commonly used to assess the robustness of hardware components modelled using Hardware Description Languages (HDL). The current complexity of modern circuits usually makes not feasible the consideration of all possible combinations of fault models, targets, and times. By assuming a confidence interval and error margin, statistical fault injection exploits the principle of statistical sampling to reduce the number of experiments while keeping the results representative of the whole population of fault injections. Since the percentage of injected faults leading to failure is a priori unknown, such number of experiments is usually determined by selecting the value maximizing the sample size. This paper argues that this conservative assumption leads to a worst-case scenario that can be improved. The proposal relies on an iterative algorithm that progressively adjust the number of experiments by estimating the percentage of those leading to failure and the error of the estimation. The considered case study illustrates the feasibility and usefulness of the proposal through the robustness assessment of the LEON3 microprocessor model. Beyond that example, this research provides new means to decide when to stop a fault injection campaign and to estimate the error existing in the results finally reported.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123564321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Runtime Verification of Ethereum Smart Contracts","authors":"J. Ellul, Gordon J. Pace","doi":"10.1109/EDCC.2018.00036","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00036","url":null,"abstract":"The notion of smart contracts in distributed ledger systems have been hailed as a safe way of enforcing contracts between participating parties. However, unlike legal contracts, which talk about ideal behaviour and consequences of not adhering to such behaviour, smart contracts are by their very nature executable code, giving explicit instructions on how to achieve compliance. Executable specification languages, particularly Turing complete ones, are notoriously known for the difficulty of ensuring correctness, and recent incidents which led to huge financial losses due to bugs in smart contracts, have highlighted this issue. In this paper we show how standard techniques from runtime verification can be used in the domain of smart contracts, including a novel stake-based instrumentation technique which ensures that the violating party provides insurance for correct behaviour. The techniques we describe have been partially implemented in a proof-of-concept tool ContractLarva, which we discuss in this paper.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123565805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of the Interplay Between Safety and Security Using Model-Implemented Fault Injection","authors":"B. Sangchoolie, P. Folkesson, J. Vinter","doi":"10.1109/EDCC.2018.00018","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00018","url":null,"abstract":"The combination of high mobility and wireless communication in many safety-critical systems have increased their exposure to malicious security threats. Consequently, many works in the past have proposed solutions to ensure safety and security of these systems. However, not much attention has been given to the interplay between these two groups of non-functional requirements. This is a concern as safety solutions may negatively impact system security and vice versa. This paper addresses the interplay between safety and security by proposing an attack injection framework, based on model-implemented fault injection, suitable for model-based design. The framework enables us to study and evaluate the impact of cybersecurity attacks on system safety early in the development process. To this end, we have implemented six attack injection models and conducted experiments on Simulink models of a CAN bus and a brake-by-wire controller. The results show that the security attacks modeled could successfully impact the system safety by violating our defined safety requirements.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing Containerized REST Services Performance in the Presence of Operator Faults","authors":"Mariana Cunha, N. Laranjeiro","doi":"10.1109/EDCC.2018.00025","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00025","url":null,"abstract":"Service applications are increasingly being deployed in virtualized environments, such as virtual machines (VMs) as a means to provide elasticity and to allow fast recovery from failures. The recent trend is now to deploy applications in containers (e.g., Docker or RKT containers), which allow, among many other benefits, to further reduce recovery time, since containers are much more lightweight than VMs. Although several performance benchmarks exist for web services (e.g., TPC-App and SPEC SPECjEnterprise2010) or even virtualized environments (e.g., SPEC Cloud IaaS 2016, TPCx-V), understanding the behavior of containerized services in the presence of faults has been generally disregarded. This paper proposes an experimental approach for evaluating the performance of containerized services in presence of operator faults. The approach is based on the injection of a simple set of operator faults targeting the containers and middleware. Results show noticeable differences regarding the impact of operator faults in Docker and RKT, with the latter one allowing for faster recovery, despite showing the lowest throughput.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Cinque, Raffaele Della Corte, Raffaele Iorio, A. Pecchia
{"title":"An Exploratory Study on Zeroconf Monitoring of Microservices Systems","authors":"M. Cinque, Raffaele Della Corte, Raffaele Iorio, A. Pecchia","doi":"10.1109/EDCC.2018.00028","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00028","url":null,"abstract":"This paper presents an explorative study on microservices monitoring. The study paves the way for MetroFunnel, our novel application-transparent and zeroconf monitoring tool, which aims to cope with the flexibility of microservices systems. MetroFunnel generates a tracelog of microservices' invocations based on the REST request-response communication model. We present an overview of MetroFunnel and its assessment within the well-consolidated Clearwater IMS.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from Program Chair","authors":"","doi":"10.1109/edcc.2018.00006","DOIUrl":"https://doi.org/10.1109/edcc.2018.00006","url":null,"abstract":"","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stephan Adelsberger, Bashar Igried, Markus Moser, V. Savenkov, A. Setzer
{"title":"Formal Verification for Feature-Based Composition of Workflows","authors":"Stephan Adelsberger, Bashar Igried, Markus Moser, V. Savenkov, A. Setzer","doi":"10.1109/EDCC.2018.00039","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00039","url":null,"abstract":"We present FeatureAgda, a framework for specifying and proving properties of feature-based composition of workflows implemented in the Feature-Oriented Software Production Lines paradigm. The resulting workflows allow for adaptation at runtime by changing the set of enabled features. Our framework is based on Agda, which is both a theorem prover and a programming language. It relies on dependent types to support the modular definition of features. While promoting the separation of concerns, we obtain a single artefact written entirely in Agda, allowing family-level formal verification. As a practical application of our approach, we demonstrate a case study from the healthcare domain implementing a complex medication prescription workflow. Our setting allows the workflow to be changed to accommodate the needs of a particular doctor or clinic while having trustworthiness through formal verification.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proactive Q-Learning Approach for Autoscaling Heterogeneous Cloud Servers","authors":"Federico Lombardi","doi":"10.1109/EDCC.2018.00038","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00038","url":null,"abstract":"Cloud providers offer different physical or virtual machine (VM) types that have different computational power and cost. Choosing the right configuration in a such heterogeneous environment able to sustain a workload while minimising costs is a challenging key aspect. Furthermore, turning-on/off a VM does not come for free, but introduce a reconfiguration overhead that might bring additional costs (e.g. time for moving to the new state and wasted resources for reconfiguration process). In this paper, we aim to find at run time a configuration s.t. (i) is able to sustain an input workload, (ii) does not over-provide resources, and that (iii) is as close as possible to the current one, to minimise the number of involved VMs in the reconfiguration, and thus, minimise the reconfiguration overhead. We propose here a Q-Learning approach to automatically learn the best policy to move from a configuration to another according to a predicted workload. We defined two reward functions which respectively look for (i) a configuration which perfectly fits the requested workload and (ii) a configuration which arrives close to the requested workload, to minimise the reconfiguration overhead. We compared the results with the two reward functions in term of average number of VMs involved in a reconfiguration and we show as with the first reward function we need to change in average 2.3 VM/reconfiguration while with the second reward function we can reduce such number up to 1 VM per reconfiguration with some over-provisioning.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Safety-Awareness and Dynamic Safety Management","authors":"M. Trapp, D. Schneider, Gereon Weiss","doi":"10.1109/EDCC.2018.00027","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00027","url":null,"abstract":"Future safety-critical systems will be highly automated or even autonomous and they will dynamically cooperate with other systems as part of a comprehensive ecosystem. This together with increasing utilization of artificial intelligence introduces uncertainties on different levels, which detriment the application of established safety engineering methods and standards. These uncertainties might be tackled by making systems safety-aware and enabling them to manage themselves accordingly. This paper introduces a corresponding conceptual dynamic safety management framework incorporating monitoring facilities and runtime safety-models to create safety-awareness. Based on this, planning and execution of safe system optimizations can be carried out by means of self-adaptation. We illustrate our approach by applying it for the dynamic safety assurance of a single car.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131669450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Integrity Attacks to Smart Grids using Process Mining and Time-Evolving Graphs","authors":"Simona Bernardi, Raquel Trillo Lado, J. Merseguer","doi":"10.1109/EDCC.2018.00032","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00032","url":null,"abstract":"In this paper, we present a work-in-progress approach to detect integrity attacks to Smart Grids by analyzing the readings from smart meters. Our approach is based on process mining and time-evolving graphs. In particular, process mining is used to discover graphs, from the dataset collecting the readings over a time period, that represent the behaviour of a customer. The time-evolving graphs are then compared in order to detect anomalous behavior of a customer. To evaluate the feasibility of our approach, we have conducted preliminary experiments by using the dataset provided by the Ireland's Commission for Energy Regulation (CER).","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}