2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

筛选
英文 中文
Flexible Soft Error Mitigation Strategy for Memories in Mixed-Critical Systems 混合关键系统中存储器的柔性软错误缓解策略
Amer Kajmakovic, K. Diwold, N. Kajtazovic, Robert Zupanc, Georg Macher
{"title":"Flexible Soft Error Mitigation Strategy for Memories in Mixed-Critical Systems","authors":"Amer Kajmakovic, K. Diwold, N. Kajtazovic, Robert Zupanc, Georg Macher","doi":"10.1109/ISSREW.2019.00108","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00108","url":null,"abstract":"As memories are becoming a ubiquitous and indispensable part of electronic devices across all industrial domains, the importance of their reliability and fault-tolerance increases. This especially holds for safety-critical applications, which exhibit different levels of data criticality. As a consequence, recent research aims to proactively engage environmentally induced soft errors, by developing new methods for error detection, mitigation, and data recovery in the mixed-critical memories. This article presents a flexible soft error correction strategy called Redundant Parity (RP), designed to enhance existing 1oo2 architectures. RP extends a 1oo2 system's ability of fault detection by enabling the recovery of faulty data utilizing the parity bit concept. An initial evaluation of the strategy in terms of its runtime performance and memory overhead is performed and compared with other software-based mitigation strategies. The preliminary results suggest that RP is indeed a suitable soft error mitigation strategy in existing 1oo2 fail-safe systems.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122927158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Rust for Critical Systems 面向关键系统的Rust
André Pinho, L. Couto, José Oliveira
{"title":"Towards Rust for Critical Systems","authors":"André Pinho, L. Couto, José Oliveira","doi":"10.1109/ISSREW.2019.00036","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00036","url":null,"abstract":"The programming language landscape in software development for aerospace and other safety-critical domains is comprised of low-level languages such as C which require a heavy verification effort, and languages such as Ada which have higher safety guarantees but are often seen as unpopular with developers. The industry has struggled to adopt newer languages with more modern features that can increase quality, productivity and enjoyment for developers. Rust is a promising new language, that attempts to combine user friendliness with strong safety support, while also delivering modern convenience features. In this paper we present an analysis of the potential benefits of the adoption of Rust for safety critical systems through an analysis of safety coding guidelines for C that Rust would alleviate. This paper presents an initial understanding of the potential benefits of Rust, to enable clearer evaluation of the value proposition of using Rust in safety critical domains.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response 企业云中异构监控数据的事件响应协调分析
Uttam Thakore, H. Ramasamy, W. Sanders
{"title":"Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response","authors":"Uttam Thakore, H. Ramasamy, W. Sanders","doi":"10.1109/ISSREW.2019.00042","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00042","url":null,"abstract":"During incident analysis and response, enterprise cloud administrators want to use as much of their generated monitor data as possible. However, the reality is that decisions are often dictated by the tools actually available to automatically process the monitor data, rather than by an understanding of the relevance of the data for incident response. The significant manual effort and domain expertise required to process diverse cloud monitors means that much monitor data remain unexamined. We propose a framework for simplifying the complexity of data analysis for incident response. Our framework enables coordinated analysis of both metric (numerical) data and log (semi-structured, textual) data and exposes salient features within those data. As a foundation for the framework, we define a taxonomy for fields within monitor data based on insights gained from analyzing logs and metrics collected from all levels of an experimental platform-as-a-service (PaaS) cloud (EPC). Using the taxonomy, we lay out a method for semi-automated feature extraction and discovery across heterogeneous monitors. We then describe a method for feature clustering to promote effective analysis of the data, and to remove redundant and uninformative features. We discuss the application of our framework for incident response within the EPC, including root cause analysis.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129227697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile App to SGX Enclave Secure Channel 移动应用程序到新交所Enclave安全通道
Fernando Kaway Carvalho Ota, J. Meira, C. Cassagnes, R. State
{"title":"Mobile App to SGX Enclave Secure Channel","authors":"Fernando Kaway Carvalho Ota, J. Meira, C. Cassagnes, R. State","doi":"10.1109/ISSREW.2019.00081","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00081","url":null,"abstract":"The current challenge for several applications is to guarantee the user's privacy when using personal data. The broader problem is to transfer and process the data without exposing the sensitive content to anyone, including the service provider(s). In this paper, we address this challenge by proposing a protocol to combine secure frameworks in order to exchange and process sensitive data, i.e. respecting user's privacy. Our contribution is a protocol to perform a secure exchange of data between a mobile application and a trusted execution environment. In our experiments we show independent implementations of our protocol using three different encryption modes (i.e., CBC, ECB, GCM encryption). Our results support the feasibility and importance of an end-to-end secure channel protocol.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128659217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design for Testability of ERMTS Applications ERMTS应用的可测试性设计
Andrea Riboni, Luca Guglielmo, Matteo Orrù, Pietro Braione, G. Denaro
{"title":"Design for Testability of ERMTS Applications","authors":"Andrea Riboni, Luca Guglielmo, Matteo Orrù, Pietro Braione, G. Denaro","doi":"10.1109/ISSREW.2019.00062","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00062","url":null,"abstract":"The European Rail Traffic Management System (ERTMS) represents a class of embedded software-intensive systems of systems for the management of the European rail traffic, in a scenario where interoperability between different European rail traffic infrastructures must be maintained. Due to the intrinsically safety-critical nature of ERTMS, software testing must meet the strict prescriptions imposed by the certification authorities, which often require the availability of the entire system. This potentially leads to perform the tests at a late stage of development, even though the best practices suggest that it would be more convenient to test the system incrementally since the early stages of development. This paper deals with the solution we devised to address this issue in a recent ERTMS project. We adopted a design-for-testability pattern which purposely enhances the observability and the controllability of the software under test to make it testable at any stage of development, allowing the exploitation of system tests even during component and integration testing.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Stochastic Model for Availability Analysis of Service Function Chains using Rejuvenation and Live Migration 基于回春和动态迁移的服务功能链可用性分析随机模型
Erico A. C. Guedes, P. Maciel
{"title":"Stochastic Model for Availability Analysis of Service Function Chains using Rejuvenation and Live Migration","authors":"Erico A. C. Guedes, P. Maciel","doi":"10.1109/ISSREW.2019.00074","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00074","url":null,"abstract":"Service function chains aim to replace proprietary and expensive appliances by similar ones provided through virtual services running over some virtualization technique. Such a replacement put pressure over availability because proprietary devices are hardware-based, i.e., more reliable. To tackle this issue, we propose a modeling approach to produce recommendations of high available cloud infrastructures responsible for the provision of VNF chains. Our proposal is based on rejuvenation of both cloud infrastructure and SFC adopting conditional virtual machines live migration. We performed SFC migration experiments in an assembled high available private cloud based on openstack to measure live migration times and inject these values into proposed models. The results of the presented case studies show that so-called five 9's availability can be reached in a 2N redundant environment.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117041429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IDEAR 2019 Workshop Keynote IDEAR 2019研讨会主题演讲
{"title":"IDEAR 2019 Workshop Keynote","authors":"","doi":"10.1109/issrew.2019.00027","DOIUrl":"https://doi.org/10.1109/issrew.2019.00027","url":null,"abstract":"","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Resource Adaptations via Test-Based Software Minimization: Application, Challenges, and Opportunities 通过基于测试的软件最小化构建资源适应性:应用、挑战和机遇
Arpit Christi, Alex Groce, A. Wellman
{"title":"Building Resource Adaptations via Test-Based Software Minimization: Application, Challenges, and Opportunities","authors":"Arpit Christi, Alex Groce, A. Wellman","doi":"10.1109/ISSREW.2019.00046","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00046","url":null,"abstract":"Building resource adaptive software systems is a challenging problem. Researchers have proposed many techniques and tools to build such systems. We previously proposed a technique called Test-based Software Minimization (TBSM) that relies on using tests to define functionality that can be sacrificed to achieve resource gain. We demonstrate easy-applicability, usability, and effectiveness of TBSM by building resource adaptations for two real-world scenarios. We also discover significant challenges associated with the practical application of TBSM. Based on our attempt to overcome the challenges for two scenarios, we summarize possible solutions to the challenges, and note that these solutions are synergistic with a larger goal of improving software quality.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114764653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Concurrency Defect Localization in Embedded Systems using Static Code Analysis: An Evaluation 基于静态代码分析的嵌入式系统并发缺陷定位研究
Bjarne Johansson, A. Papadopoulos, T. Nolte
{"title":"Concurrency Defect Localization in Embedded Systems using Static Code Analysis: An Evaluation","authors":"Bjarne Johansson, A. Papadopoulos, T. Nolte","doi":"10.1109/ISSREW.2019.00034","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00034","url":null,"abstract":"Defects with low manifestation probability, such as concurrency defects, are difficult to find during testing. When such a defect manifests into an error, the low likelihood can make it time-consuming to reproduce the error and find the root cause. Static Code Analysis (SCA) tools have been used in the industry for decades, mostly for compliance checking towards guidelines such as MISRA. Today, these tools are capable of sophisticated data and execution flow analysis. Our work, presented in this paper, evaluates the feasibility of using SCA tools for concurrency defect detection and localization. Earlier research has categorized concurrency defects. We use this categorization and develop an object-oriented C++ based test suite containing defects from each category. Secondly, we use known and real defects in existing products' source code. With these two approaches, we perform the evaluation, using tools from some of the largest commercial actors in the field. Based on our results, we provide a discussion about how to use static code analysis tools for concurrency defect detection in complex embedded real-time systems.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127587653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension 一种支持程序理解的三因素跟踪分割方法
R. Khoury, A. Hamou-Lhadj, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo
{"title":"TRIADE A Three-Factor Trace Segmentation Method to Support Program Comprehension","authors":"R. Khoury, A. Hamou-Lhadj, Mohamed Ilyes Rahim, Sylvain Hallé, Fábio Petrillo","doi":"10.1109/ISSREW.2019.00103","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00103","url":null,"abstract":"Trace analysis allows software engineers to gain insights into the behavior of the systems they maintain, and thus serves as an essential tool to aid in multiple tasks that require an understanding of complex systems, including security analysis, debugging and maintenance. However, the considerable size of execution traces can hinder the effectiveness of trace analysis. There exist techniques that extract higher level abstractions from a lengthy trace by automatically segmenting a trace into a number of cohesive segments, allowing software engineers to focus only on the segments of interest. In this paper, we improve on related work on segmenting traces of method calls by considering three factors: method names, method calling relationship, and method parameters. We show experimentally that this approach is more effective for the purpose of dividing a trace in a manner concordant with the underlying behavior of the program than existing algorithms. We also examine the issue of key element extraction from a trace, and again demonstrate experimentally that traces segmented using our method can more readily be subjected to this analysis","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信