2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)最新文献

筛选
英文 中文
Common Safety Method for Risk Evaluation and Assessment (CSM-RA) and Hazard Analysis Tutorial: Managing Effectively Significant Changes in a Railway System 风险评估和评估的共同安全方法(cms - ra)和危害分析教程:有效管理铁路系统的重大变化
Francisco Moreira, N. Silva
{"title":"Common Safety Method for Risk Evaluation and Assessment (CSM-RA) and Hazard Analysis Tutorial: Managing Effectively Significant Changes in a Railway System","authors":"Francisco Moreira, N. Silva","doi":"10.1109/DSN-W.2016.53","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.53","url":null,"abstract":"Common Safety Method for Risk Evaluation andAssessment (CSM-RA) and Hazard Analysis Tutorial: Managing Effectively Significant Changes in a Railway System.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122158255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Activating Protection and Exercising Recovery Against Large-Scale Outages on the Cloud 针对云上的大规模中断,激活保护并执行恢复
Long Wang, H. Ramasamy, R. Mahindru, R. Harper
{"title":"Activating Protection and Exercising Recovery Against Large-Scale Outages on the Cloud","authors":"Long Wang, H. Ramasamy, R. Mahindru, R. Harper","doi":"10.1109/DSN-W.2016.55","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.55","url":null,"abstract":"Cloud computing provides rapid provisioning, convenient deployment, and simplified management of computing resources and applications with pay-as-you-go pricing models [1]. As more and more workloads are created on the cloud or migrated to the cloud for economic and flexibility reasons, it is important for developers, users, and service providers alike to understand the challenges, opportunities, complexities, and benefits of building dependable systems and applications on the cloud. In this tutorial, we give participants first-hand experience in protecting and recovering against large-scale cloud outages, e.g., failure of an entire cloud site. The tutorial is organized as a full-day activity and is designed to be hands-on. The content is targeted towards a broad audience of users, developers, practitioners, and researchers in the area of cloud computing. The content level is beginner-to-intermediate, suited for anyone with an undergraduate background in computer science (or equivalent) and basic programming skills. In the theory part of the tutorial, we introduce terminology, concepts, and metrics for providing resiliency on a cloud platform. We catalog factors that make building resilient applications on the cloud easy in some cases and particularly complicated in other cases. We present a reference architecture and a standard set of use cases for resiliency on the cloud. The bulk of the tutorial focuses on educating the audience with a series of hands-on exercises. We use an example set of cloud requirements as the starting point, and then guide the participants through the process of creating a protection and recovery plan. The plan covers details such as how to prioritize different workloads based on their criticality during recovery, what protection and recovery technologies should be used, and whether they should be used at the server level or application level. During the hands-on exercises, participants form teams or work individually to access a pre-created cloud virtual infrastructure and applications hosted on the IBM Softlayer cloud [2], which is geographically distributed across multiple continents. Replication and recovery orchestration form the backbone of many cloud resiliency solutions. We guide the participants through the entire life cycle of a cloud resiliency solution: 1) activation of protection on a set of workloads, 2) recovery of protected workloads upon a large-scale outage, 3) failback of protected workloads from the recovery site to the original site upon restoration of the original site, and 4) test of the implemented protection and recovery solution to ensure the implementation conforms to the requirements. Using a real-world orchestration technology, participants activate protection against outages at multiple levels of the cloud stack, orchestrate recovery procedure for a simulated site-level outage, and orchestrate failback to the primary cloud site (simulating the reconstruction of that site). We perform exercis","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture 无人机攻击场景与可信修复架构
Kate Highnam, K. Angstadt, Kevin Leach, Westley Weimer, Aaron M. Paulos, P. Hurley
{"title":"An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture","authors":"Kate Highnam, K. Angstadt, Kevin Leach, Westley Weimer, Aaron M. Paulos, P. Hurley","doi":"10.1109/DSN-W.2016.63","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.63","url":null,"abstract":"With the growing ubiquity of uncrewed aerial vehicles (UAVs), mitigating emergent threats in such systems has become increasingly important. In this short paper, we discuss an indicative class of UAVs and a potential attack scenario in which a benign UAV completing a mission can be compromised by a malicious attacker with an antenna and a commodity computer with open-source ground station software. We attest to the relevance of such a scenario for both enterprise and defense applications. We describe a system architecture for resiliency and trustworthiness in the face of these attacks. Our system is based on the quantitative assessment of trust from domain-specific telemetry data and the application of program repair techniques to UAV flight plans. We conclude with a discussion of restoring trust in post-repair UAV mission integrity.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116524608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Evaluation of EEE Reliability Prediction Models for Space Applications 空间应用EEE可靠性预测模型的评估
S. Bourbouse, J. Blanquart, J. Gajewski, C. Lahorgue
{"title":"Evaluation of EEE Reliability Prediction Models for Space Applications","authors":"S. Bourbouse, J. Blanquart, J. Gajewski, C. Lahorgue","doi":"10.1109/DSN-W.2016.36","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.36","url":null,"abstract":"The purpose of this paper is to report on a one-year study granted early 2015 by ESA/ESTEC to Airbus Defence and Space to identify and analyse the main reliability models available for evaluating the failure rate of each EEE component used in space systems, in order to assess their suitability in the space context for developing an improved reliability prediction approach.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hierarchical Model and Sensitivity Analysis for a Cloud-Based VoD Streaming Service 基于云的VoD流媒体服务的层次模型和灵敏度分析
J. Dantas, Rúbens de Souza Matos Júnior, J. Araujo, Danilo Oliveira, Andre Oliveira, P. Maciel
{"title":"Hierarchical Model and Sensitivity Analysis for a Cloud-Based VoD Streaming Service","authors":"J. Dantas, Rúbens de Souza Matos Júnior, J. Araujo, Danilo Oliveira, Andre Oliveira, P. Maciel","doi":"10.1109/DSN-W.2016.23","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.23","url":null,"abstract":"Cloud computing environments provide storage capacity, processing power, and other computational resources in a flexible way, enabling fast adaptation to highly dynamic workloads. Multimedia services, such as video streaming, are examples of applications that can use cloud computing to leverage their provisioning capacity. This way, it is possible to offer a large variety of multimedia content in many formats, so the users will be able to watch videos as they wish, with a proper resolution and quality, according to his preferences and connection speed. Private infrastructures for Video on Demand (VoD) and live video streaming are especially useful for e-learning on large corporations, universities, and governments. Analytical models are effective tools to evaluate the availability of software, hardware, and other computational resources. In this paper, we study a VoD service hosted in a private cloud computing environment. We present availability models considering the VoD streaming server components that are necessary for viewers access. Hierarchical modeling techniques are used to deal with the complexity of representing such system. Sensitivity analysis is used to determine the parameters that cause greatest impact on the availability, identifying which components require attention when attempting to achieve increased availability in a system. The proposed models are useful for planning private cloud infrastructures for VoD services.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133197827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Error Monitoring for Legacy Mission-Critical Systems 遗留关键任务系统的错误监控
M. Cinque, Raffaele Della Corte, S. Russo
{"title":"Error Monitoring for Legacy Mission-Critical Systems","authors":"M. Cinque, Raffaele Della Corte, S. Russo","doi":"10.1109/DSN-W.2016.41","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.41","url":null,"abstract":"Error data collected at runtime play a key role for dependability analysis and improvement of software systems. The use of monitoring frameworks for legacy mission-critical systems is hindered by limited intervention degree and low intrusiveness requirements. We present the design and experimentation of an error monitoring service for a legacy large-scale critical system in the Air Traffic Control (ATC) domain. We describe the details of the API realized to collect both direct data (event logs, execution traces) and indirect data (system resources' utilization). We present experiments with the ATC industrial case study, showing the efficacy of combining different data sources for error detection and propagation analysis, with an acceptable overhead at high monitoring rates for such a class of systems.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133479838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-Vehicle Real-Time Fog Computing 车载实时雾计算
H. Kopetz, S. Poledna
{"title":"In-Vehicle Real-Time Fog Computing","authors":"H. Kopetz, S. Poledna","doi":"10.1109/DSN-W.2016.15","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.15","url":null,"abstract":"Considering the technical advances and economicadvantages of integrated architectures and cloud computing we conjecture that the realization of a real-time cloud, called a fog that provides reliable electronic services with temporalguarantees on board a vehicle efficiently and flexibly will be thelogical next step in the development of an automotive electronic architecture. In this paper we introduce the concept of a time-triggered virtual machine (TTVM) that provides a precisely specified virtual interface between a real-time software component and its underlying hardware infrastructure. The flexible allocation of TTVMs on different node computers provides the means to implement fault-tolerance, evolution and on-line validation effectively in such a time-triggered distributed architecture. In this paper this new architecture and the associated design methodology are explained by referring to an example of a driver assistance system onboard a car.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132202743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Use of Similarity Measure to Suggest the Existence of Duplicate User Stories in the Srum Process 使用相似度度量来建议在scrum过程中存在重复的用户故事
R. Barbosa, A. E. Silva, Regina L. O. Moraes
{"title":"Use of Similarity Measure to Suggest the Existence of Duplicate User Stories in the Srum Process","authors":"R. Barbosa, A. E. Silva, Regina L. O. Moraes","doi":"10.1109/DSN-W.2016.27","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.27","url":null,"abstract":"In the Scrum process, Product Backlog consists of a prioritized list of desired software functionalities recorded in the form of user stories. As the software product is developed, new functionalities are discovered and included in the Product Backlog. However, in large-scale projects, duplicate stories may arise because of the large number of generated stories, the lack of communication among team members, and due to the speed of development imposed by the Scrum process. In this case, it is important to detect such story as being duplicate, in order to avoid the rework of the software feature. This paper presents an approach that uses semantic similarity measures to suggest possible cases of duplication between user stories. This alert can help Product Owners and Scrum Masters in the decision about excluding duplicate user stories from the Product Backlog.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114443170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Code Change History and Software Vulnerabilities 代码变更历史和软件漏洞
Marcus Pianco, B. Neto, Nuno Antunes
{"title":"Code Change History and Software Vulnerabilities","authors":"Marcus Pianco, B. Neto, Nuno Antunes","doi":"10.1109/DSN-W.2016.50","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.50","url":null,"abstract":"Usually, the most critical modules of the system receive extra attention. But even these modules might be too large to be thoroughly inspected so it is useful to know where to apply the majority of the efforts. Thus, knowing which code changes are more prone to contain vulnerabilities may allow security experts to concentrate on a smaller subset of submitted code changes. In this paper we discuss the change history of functions and its impact on the existence of vulnerabilities. For this, we analyzed the commit history of two software projects widely exposed to attacks (Mozilla and Linux Kernel). Starting from security bugs, we analyzed more than 95k functions (with and without vulnerabilities), and systematized the changes in each function according to a subset of the patterns described in the Orthogonal Defects Classification. The results show that the frequency of changes can allow to distinguish functions more prone to have vulnerabilities.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ground Control to Major Faults: Towards a Fault Tolerant and Adaptive SDN Control Network 主要故障的地面控制:迈向一个容错和自适应的SDN控制网络
Liron Schiff, S. Schmid, M. Canini
{"title":"Ground Control to Major Faults: Towards a Fault Tolerant and Adaptive SDN Control Network","authors":"Liron Schiff, S. Schmid, M. Canini","doi":"10.1109/DSN-W.2016.48","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.48","url":null,"abstract":"To provide high availability and fault-tolerance, SDN control planes should be distributed. However, distributed control planes are challenging to design and bootstrap, especially if to be done in-band, without dedicated control network, and without relying on legacy protocols. This paper promotes a distributed systems approach to build and maintain connectivity between a distributed control plane and the data plane. In particular, we make the case for a self-stabilizing distributed control plane, where from any initial configuration, controllers self-organize, and quickly establish a communication channel among themselves. Given the resulting managed control plane, arbitrary network services can be implemented on top. This paper presents a model for the design of such self-stabilizing control planes, and identifies fundamental challenges. Subsequently, we present techniques which can be used to solve these challenges, and implement a plug & play distributed control plane which supports automatic topology discovery and management, as well as flexible controller membership: controllers can be added and removed dynamically. Interestingly, we argue that our approach can readily be implemented in today's OpenFlow protocol. Moreover, our approach comes with interesting security features.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133775903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信