{"title":"Multi-objective Optimization Research and Applied in Cloud Computing","authors":"Guang Peng","doi":"10.1109/ISSREW.2019.00051","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00051","url":null,"abstract":"In many real-life applications, a decision maker often needs to handle different conflicting objectives. Problems with more than one conflicting objective are called multi-objective optimization problems (MOPs). Multi-objective evolutionary algorithms (MOEAs) have been developed for solving MOPs. MOEAs have been shown to perform well on some MOPs with two or three objectives; however, MOEAs have substantial difficulties for tackling MOPs with more than three objectives, often referred to as many-objective problems (MaOPs) nowadays. In my thesis, first, I plan to propose an efficient multi-objective artificial bee colony algorithm based on decomposition for solving MOPs. Then, another effective adaptive many-objective evolutionary algorithm is designed to deal with MaOPs. What's more, based on defining a multi-objective optimization model of task scheduling in cloud computing, I use an improved particle swarm optimization algorithm to solve the model. Finally, I try to establish a many-objective optimization model of offloading in mobile edge computing, and find a suitable many-objective evolutionary algorithm for solving it. The proposed algorithms are compared to several state-of-the-art algorithms on these models. The experimental results will show the efficiency and effectiveness of the proposed algorithms.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"20 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the WoSAR 2019 Workshop Chairs","authors":"","doi":"10.1109/issrew.2019.00016","DOIUrl":"https://doi.org/10.1109/issrew.2019.00016","url":null,"abstract":"","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131835778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Nurminen, Tuomas Halvari, Juha Harviainen, Juha Mylläri, Antti Röyskö, Juuso Silvennoinen, T. Mikkonen
{"title":"Software Framework for Data Fault Injection to Test Machine Learning Systems","authors":"J. Nurminen, Tuomas Halvari, Juha Harviainen, Juha Mylläri, Antti Röyskö, Juuso Silvennoinen, T. Mikkonen","doi":"10.1109/ISSREW.2019.00087","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00087","url":null,"abstract":"Data-intensive systems are sensitive to the quality of data. Data often has problems due to faulty sensors or network problems, for instance. In this work, we develop a software framework to emulate faults in data and use it to study how machine learning (ML) systems work when the data has problems. We aim for flexibility: users can use predefined or their own dedicated fault models. Likewise, different kind of data (e.g. text, time series, video) can be used and the system under test can vary from a single ML model to a complicated software system. Our goal is to show how data faults can be emulated and how that can be used in the study and development of ML solutions.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functionality and Safety Weaknesses in Integration of Physics-Based Models on Critical Embedded Systems","authors":"Philipp Göttlich, H. Reuss","doi":"10.1109/ISSREW.2019.00045","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00045","url":null,"abstract":"Embedded automotive software is currently showing trends towards model predictive control (MPC), virtual sensors or model-based diagnosis, mainly used in advanced driver assistance systems (ADAS) and automated driving. Such applications use physical models in the control algorithms. The integration of physical models is a risky task, since weaknesses, such as the need for floating-point arithmetic and discretization or model properties, such as discontinuities and nonlinearities, quickly bring a project to a standstill or establish errors in the final product. The use of known verification and validation methods is often not possible or offers false safety guarantees. This article is intended to help developers understand and identify safety weaknesses and develop new verification and validation methods specifically adapted for physics-based, critical, embedded code. For this purpose, corresponding weaknesses in current industrial projects with physics-based systems have been identified and categorized. In this article, these are described and illustrated with examples from applications in order to get an idea of their relevance in the current context. On this basis, approaches for the analysis and diagnosis of potentially faulty code are proposed to motivate testers and quality managers to find new methods for error identification and validation of critical, physics-based, embedded code.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"446 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123380786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the IWSF 2019 Workshop Chairs","authors":"","doi":"10.1109/issrew.2019.00028","DOIUrl":"https://doi.org/10.1109/issrew.2019.00028","url":null,"abstract":"","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114943996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposal for Security Assessment of Trustzone-M Based Software","authors":"Antonio Ken Iannillo, R. State","doi":"10.1109/ISSREW.2019.00110","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00110","url":null,"abstract":"With the advent of the Internet of Things (IoT) paradigm, computing and networking capabilities are extending to devices that are not considered as computers, enabling them to interact with the physical world or other software entities with minimal or no human input. This fast abstract proposes a methodology for the security assessment of software based on TrustZone-M, the ARM hardware security extension for microcontrollers. The methodology consists of the exploitation of a verification and validation framework to automatically test TrustZone-M based software.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127615139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending Automated FLTL Test Oracles with Diagnostic Support","authors":"Ingo Pill, F. Wotawa","doi":"10.1109/ISSREW.2019.00096","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00096","url":null,"abstract":"Testing is a versatile and in practice also dominant technique when it comes to verifying whether a system meets our expectations. After executing a test case, we use test oracles to judge whether the execution should be considered to have failed or passed. Fully automated oracles considering properties in temporal logics like FLTL allow us to derive such a verdict in a fully automated process. In this manuscript, we will show how to extend such an oracle with diagnostic support. In particular, drawing on model-based diagnosis (MBD), we will isolate exactly which parts of the property were violated for a failed test case. Such data are orthogonal to MBD focusing on the system itself and where we isolate faulty system components. With our diagnoses, we thus provide valuable information for the subsequent debugging and repair process in respect of how the test execution violated the property. We show that a corresponding polynomially sized SAT model for deriving our diagnoses can be derived easily.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sean Rivera, S. Lagraa, Antonio Ken Iannillo, R. State
{"title":"Auto-Encoding Robot State Against Sensor Spoofing Attacks","authors":"Sean Rivera, S. Lagraa, Antonio Ken Iannillo, R. State","doi":"10.1109/ISSREW.2019.00080","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00080","url":null,"abstract":"In robotic systems, the physical world is highly coupled with cyberspace. New threats affect cyber-physical systems as they rely on several sensors to perform critical operations. The most sensitive targets are their location systems, where spoofing attacks can force robots to behave incorrectly. In this paper, we propose a novel anomaly detection approach for sensor spoofing attacks, based on an auto-encoder architecture. After initial training, the detection algorithm works directly on the compressed data by computing the reconstruction errors. We focus on spoofing attacks on Light Detection and Ranging (LiDAR) systems. We tested our anomaly detection approach against several types of spoofing attacks comparing four different compression rates for the auto-encoder. Our approach has a 99% True Positive rate and a 10% False Negative rate for the 83% compression rate. However, a compression rate of 41% could handle almost all of the same attacks while using half the data.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114843274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Philippe Marcotte, Frédéric Grégoire, Fábio Petrillo
{"title":"Multiple Fault-Tolerance Mechanisms in Cloud Systems: A Systematic Review","authors":"Philippe Marcotte, Frédéric Grégoire, Fábio Petrillo","doi":"10.1109/ISSREW.2019.00104","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00104","url":null,"abstract":"Cloud systems are progressively taking over today's software market. These typically require constant operations with a minimum of failure. Multiple fault-tolerance mechanisms have been developed to maximize the availability of cloud systems. In this paper, we propose a systematic review of the literature on fault-tolerance mechanisms. We discussed the current trends, and we found that migration, checkpointing and replication are the most widely used based on the number of references. In contrast, some mechanism like task resubmission and n-version programming seems to incur less research.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Adler, Mohammed Naveed Akram, Patrik Feth, Takeshi Fukuda, Tasuku Ishigooka, Satoshi Otsuka, D. Schneider, Kentaro Yoshimura
{"title":"Engineering and Hardening of Functional Fail-Operational Architectures for Highly Automated Driving","authors":"R. Adler, Mohammed Naveed Akram, Patrik Feth, Takeshi Fukuda, Tasuku Ishigooka, Satoshi Otsuka, D. Schneider, Kentaro Yoshimura","doi":"10.1109/ISSREW.2019.00038","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00038","url":null,"abstract":"Rising automation levels in the automotive domain demand a shift from the fail-safe to the fail-operational paradigm. Fail-operational architectures and behaviors are inherently more complex and thus require special diligence from a safety engineering point of view. In this work, we present how we tailored and applied a methodology that facilitates the design of fail-operational architectures from early design stages on by enabling informed judgment regarding the gradually evolved architecture's fitness for purpose. The method specifically considers resilience regarding dynamic changes in environmental conditions, including V2X aspects and internal capabilities. In this paper, we summarize our experiences in applying the methodology in a highway pilot case study. Furthermore, we present essential extensions of the methodology for modeling and evaluating the operational design domain.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116762471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}