{"title":"An Effective Two-Level Redundancy Approach for FlexRay Network Systems","authors":"Yung-Yuan Chen, K. Leu","doi":"10.1109/DSN-W.2016.14","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.14","url":null,"abstract":"FlexRay, as a communication protocol for automotive control systems, is developed to fulfill the increasing demand for implementing vehicle electronics with higher safety and more comfort. The applications of FlexRay drive-by-wire systems are often associated with human life, so the reliability issue of FlexRay network systems should be carefully studied. In this paper, we propose an effective two-level redundancy approach for safety-critical FlexRay network systems. The proposed approach demonstrates how to employ the backup nodes, mirrored tasks and task migration to sustain the operation of system when ECUs fail. We then perform the redundancy analysis and develop the analytical reliability models for the assessment of fault-tolerant FlexRay network systems in early design phase. The reliability analysis with various numbers of backup nodes, system sizes and ECU failure rates are conducted and the reliability results are provided and discussed. The contribution of this study is to propose a comprehensive fault-robust methodology with the analytical reliability model to support the development of safety-critical FlexRay network systems with an efficient manner.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129196318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Westley Weimer, S. Forrest, Miryung Kim, Claire Le Goues, P. Hurley
{"title":"Trusted Software Repair for System Resiliency","authors":"Westley Weimer, S. Forrest, Miryung Kim, Claire Le Goues, P. Hurley","doi":"10.1109/DSN-W.2016.64","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.64","url":null,"abstract":"We describe ongoing work to increase trust in resilient software systems. Automated software repair techniques promise to increase system resiliency, allowing missions to continue in the face of software defects. While a number of program repair approaches have been proposed, the most scalable and applicable of those techniques can be the most difficult to trust. Using approximate solutions to the oracle problem, we consider three approaches by which trust can be re-established in a post-repair system. Each approach learns or infers a different form of partial model of correct behavior from pre-repair observations; post-repair systems are evaluated with respect to those models. We focus on partial oracles modeled from external execution signals, derived from similar code fragment behavior, and inferred from invariant relations over local variables. We believe these three approaches can provide an expanded assessment of trust in a repaired, resilient system.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131798003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mikel Iturbe, J. Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria
{"title":"On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process Control","authors":"Mikel Iturbe, J. Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria","doi":"10.1109/DSN-W.2016.32","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.32","url":null,"abstract":"Process Control Systems (PCSs) are the operating core of Critical Infrastructures (CIs). As such, anomaly detection has been an active research field to ensure CI normal operation. Previous approaches have leveraged network level data for anomaly detection, or have disregarded the existence of process disturbances, thus opening the possibility of mislabelling disturbances as attacks and vice versa. In this paper we present an anomaly detection and diagnostic system based on Multivariate Statistical Process Control (MSPC), that aims to distinguish between attacks and disturbances. For this end, we expand traditional MSPC to monitor process level and controller level data. We evaluate our approach using the Tennessee-Eastman process. Results show that our approach can be used to distinguish disturbances from intrusions to a certain extent and we conclude that the proposed approach can be extended with other sources of data for improving results.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Koosha Marashi, Sahra Sedigh Sarvestani, A. Hurson
{"title":"Quantification and Analysis of Interdependency in Cyber-Physical Systems","authors":"Koosha Marashi, Sahra Sedigh Sarvestani, A. Hurson","doi":"10.1109/DSN-W.2016.47","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.47","url":null,"abstract":"Cyber-physical systems are differentiated from other real-time embedded systems based on the tight intertwining of the cyber infrastructure with the physical components upon which it exerts control. This close interaction manifests as interdependence in operation and failure. This paper aims to determine and quantify the type and extent of dependency in a cyber-physical system using a method inspired by the analytic network process. The method incorporates several steps, namely, identification of failures sequences, and graph-theoretical representation of functional dependencies between components, and finally, calculating dependency indices. We illustrate the proposed approach through application to the IEEE 14-bus power system.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"125 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ariadne Carvalho, Nuno Antunes, A. Ceccarelli, A. Zentai
{"title":"Introduction to RADIANCE 2016","authors":"Ariadne Carvalho, Nuno Antunes, A. Ceccarelli, A. Zentai","doi":"10.1109/DSN-W.2016.68","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.68","url":null,"abstract":"Recent Advances in the DependabIlity AssessmeNt of Complex systEms workshop description.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126760495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Frederic Sala, Henry Duwe, L. Dolecek, Rakesh Kumar
{"title":"A Unified Framework for Error Correction in On-chip Memories","authors":"Frederic Sala, Henry Duwe, L. Dolecek, Rakesh Kumar","doi":"10.1109/DSN-W.2016.65","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.65","url":null,"abstract":"Many techniques have been proposed to improve the reliability of on-chip memories (e.g., caches). These techniques can be broadly characterized as being based on either errorcorrecting codes, side-information from built-in self test (BIST) routines, or hybrid combinations of the two. Although each proposal has been shown to be favorable under a certain set of assumptions and parameters, it is difficult to determine the suitability of such techniques in the overall design space. In this paper, we seek to resolve this problem by introducing a unified general framework representing such schemes. The framework, composed of storage, decoders, costs, and error rates, allows a full exploration of the design space of reliability techniques. We show how existing schemes can be represented in this framework and we use the framework to examine performance in the practical case of high overall and moderate BIST-undetectable fault rates. We show that erasure-based sideinformation schemes are less sensitive to BIST-undetectable errors compared to other techniques.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130335015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety Engineering for Autonomous Vehicles","authors":"R. Adler, Patrik Feth, D. Schneider","doi":"10.1109/DSN-W.2016.30","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.30","url":null,"abstract":"In safety engineering for non-autonomous vehicles, it is generally assumed that safety is achieved if the vehicle appropriately follows certain control commands from humans such as steering or acceleration commands. This fundamental assumption becomes problematic if we consider autonomous vehicles that decide on their own which behavior is most reasonable in which situation. Safety criticality extends to the decision-making process and the related perception of the environment. These, however, are so complex that they require the application of concepts for intelligence that do not harmonize with traditional safety engineering. In this paper, we investigate these problems and propose a solution.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to DISN 2016","authors":"E. P. Duarte, M. Hiltunen, R. Soulé","doi":"10.1109/DSN-W.2016.70","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.70","url":null,"abstract":"The 2nd Workshop on Dependability Issues on SDN and NFV description.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116834468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Marconato, Jean-Aimé Maxa, D. F. Pigatto, A. R. Pinto, N. Larrieu, K. Branco
{"title":"IEEE 802.11n vs. IEEE 802.15.4: A Study on Communication QoS to Provide Safe FANETs","authors":"E. Marconato, Jean-Aimé Maxa, D. F. Pigatto, A. R. Pinto, N. Larrieu, K. Branco","doi":"10.1109/DSN-W.2016.35","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.35","url":null,"abstract":"Flying Ad hoc Network (FANET) is an infrastructure-less multi-hop radio ad hoc network in which Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS) collaborates to forward data traffic. Compared to the standard Mobile Ad hoc NETworks (MANETs), the FANET architecture has some specific features (3D mobility, low UAV density, intermittent network connectivity) that bring challenges to the communication protocol design. Such routing protocol must provide safety by finding an accurate and reliable route between UAVs. This safety can be obtained through the use of agile method during software based routing protocol development (for instance the use of Model Driven Development) by mapping each FANET safety requirement into the routing design process. This process must be completed with a sequential safety validation testing with formal verification tools, standardized simulator (by using real simulation environment) and real-world experiments. In this paper, we considered FANET communication safety by presenting design methodologies and evaluations of FANET routing protocols. We use the LARISSA architecture to guarantee the efficiency and accuracy of the whole system. We also use the model driven development methodology to provide model and code consistency through the use of formal verification tools. To complete the FANET safety validation, OMNeT++ simulations (using real UAVs mobility traces) and real FANET outdoor experiments have been carried out. We confront both results to evaluate routing protocol performances and conclude about its safety consideration.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116143374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Feldmann, P. Heyder, M. Kreutzer, S. Schmid, Jean-Pierre Seifert, Haya Schulmann, K. Thimmaraju, M. Waidner, J. Sieberg
{"title":"NetCo: Reliable Routing With Unreliable Routers","authors":"A. Feldmann, P. Heyder, M. Kreutzer, S. Schmid, Jean-Pierre Seifert, Haya Schulmann, K. Thimmaraju, M. Waidner, J. Sieberg","doi":"10.1109/DSN-W.2016.38","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.38","url":null,"abstract":"Software-Defined Networks (SDNs) are typically designed and operated under the assumption that the underlying routers (and switches) are trustworthy. Recent incidents, however, suggest that this assumption is questionable. The possibility of incorrect or even malicious router behavior introduces a wide range of security problems. The problem is exacerbated by the fact that governments and companies do not have the expertise nor budget to build their own trusted high-performance routing hardware. This paper presents NetCo, an approach to build secure routing using insecure routers. NetCo is inspired by the robust combiner concept known from cryptography, and leverages redundancy to compile a secure whole from insecure parts. We present the basic design of NetCo, and report on a prototype implementation in OpenFlow.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126851495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}