M. Oriol, Thomas Gamer, Thijmen de Gooijer, M. Wahler, E. Ferranti
{"title":"Fault-tolerant fault tolerance for component-based automation systems","authors":"M. Oriol, Thomas Gamer, Thijmen de Gooijer, M. Wahler, E. Ferranti","doi":"10.1145/2465470.2465471","DOIUrl":"https://doi.org/10.1145/2465470.2465471","url":null,"abstract":"To guarantee high availability, automation systems must be fault-tolerant. To this end, they must provide redundant solutions for the critical parts of the system. Classical fault tolerance patterns such as standby or N-modular redundancy provide system stability in the case of a fault. Fault tolerance is subsequently degraded or, depending on the number of deployed replicas, often even unavailable until the system has been repaired.\u0000 We introduce a combination of a component-based framework, redundancy patterns, and a runtime manager, which is able to provide fault tolerance, to detect host failures, and to trigger a reconfiguration of the system at runtime. This combined solution maintains system operation in case a fault occurs and automatically restores fault tolerance. The proposed solution is validated using a case study of an industrial distributed automation system. The validation shows how our solution quickly restores fault tolerance without the need for operator intervention or immediate hardware replacement while limiting the impact on other applications.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126617450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiwei Xu, Q. Lu, Liming Zhu, J. Li, S. Sakr, H. Wada, I. Weber
{"title":"Availability analysis for deployment of in-cloud applications","authors":"Xiwei Xu, Q. Lu, Liming Zhu, J. Li, S. Sakr, H. Wada, I. Weber","doi":"10.1145/2465470.2465472","DOIUrl":"https://doi.org/10.1145/2465470.2465472","url":null,"abstract":"Deploying critical applications in the cloud introduces uncertainties for availability that have traditionally been under the direct control of the application owner. The cloud infrastructure impact to availability is due to dynamic resource sharing as well as limited visibility/control of the underlying infrastructure and its quality of service. It is important to assess the availability of the critical application considering the weak availability guarantees provided by the cloud infrastructures under a broad range of scenarios, including rare scenarios like infrastructure failures and disasters. In this paper, we propose a deployment architecture-driven availability analysis model that considers uncertain rare events explicitly and bridges the gap of weak infrastructure availability and critical application availability. The models require initial calibration and validation, which is achieved by using data from commercial products and industry best practices. We use the proposed models to reevaluate the industry best practice under rare infrastructure events.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"204 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127033190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of machine learning algorithms for proactive hard disk drive failure detection","authors":"Teerat Pitakrat, A. Hoorn, Lars Grunske","doi":"10.1145/2465470.2465473","DOIUrl":"https://doi.org/10.1145/2465470.2465473","url":null,"abstract":"Failures or unexpected events are inevitable in critical and complex systems. Proactive failure detection is an approach that aims to detect such events in advance so that preventative or recovery measures can be planned, thus improving system availability. Machine learning techniques have been successfully applied to learn patterns from available datasets and to classify or predict to which class a new instance of data belongs. In this paper, we evaluate and compare the performance of 21 machine learning algorithms by using them for proactive hard disk drive failure detection. For this comparison, we use WEKA as an experimentation platform and benchmark publicly available datasets of hard disk drives that are used to predict imminent failures before the actual failures occur. The results show that different algorithms are suitable for different applications based on the desired prediction quality and the tolerated training and prediction time.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116932522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LIDAR: a layered intrusion detection and remediationframework for smartphones","authors":"R. Roshandel, P. Arabshahi, R. Poovendran","doi":"10.1145/2465470.2465475","DOIUrl":"https://doi.org/10.1145/2465470.2465475","url":null,"abstract":"Given the advanced set of capabilities offered by smartphone and tablet computing devices, they have become the platform of choice for many users for day-to-day work and leisure. There is however a fundamental difference in the attitude of a typical user when it comes to using their mobile device as compared to their personal computers. While the use of anti-virus software on PCs to protect our security and privacy is ubiquitous today, there is little by the way of security and privacy protection available on these mobile computing platforms. Our work focuses on developing a Layered Intrusion Detection and Remediation framework (LIDAR) to automatically detect, analyze, protect, and remediate security threats in this domain. We have focused on Android devices and have developed several algorithms that would help detect abnormal behavior in the operation of Android smartphone and tablets that could potentially detect presence of malware. In this paper, we present a high-level overview of our approach and briefly summarize a suite of algorithms developed to identify certain types of malicious behavior.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Castellanos, T. Vergnaud, Etienne Borde, Thomas Derive, L. Pautet
{"title":"Formalization of design patterns for security anddependability","authors":"C. Castellanos, T. Vergnaud, Etienne Borde, Thomas Derive, L. Pautet","doi":"10.1145/2465470.2465476","DOIUrl":"https://doi.org/10.1145/2465470.2465476","url":null,"abstract":"In critical systems, failures or attacks based on software misconceptions can have catastrophic consequences. In order to avoid those situations, such systems need security and dependability (S&D) constraints. Usually S&D design patterns shape S&D mechanisms. Security and dependability experts identify S&D mechanisms to reach S&D objectives and manually apply them to the system architecture. Our contribution consists in studying S&D design patterns application. We formalize these S&D design patterns as model transformations, preconditions and postconditions to automate their integration. Finally, we illustrate this process with a Software Defined Radio case study to which we apply the red/black (R/B) architecture security design pattern.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validating reconfigurations of reo circuits in an e-Banking scenario","authors":"M. T. Beek, F. Gadducci, Francesco Santini","doi":"10.1145/2465470.2465474","DOIUrl":"https://doi.org/10.1145/2465470.2465474","url":null,"abstract":"We formalize dynamic reconfiguration of Reo circuits (which can be thought of as multi-party communication infrastructures built from primitive channels) through graph transformation, and apply it to a scenario from the Finance domain: a critical infrastructure controlling the business process of an e-banking system. In this scenario, reconfiguration is triggered as soon as the communication buffers reach specific predefined thresholds of congestion. These constraints are implemented inside the Reo model by associating suitable predicates to channels, thus extending previous results on the use of graph transformation for the reconfiguration of Reo's graphical structures.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety concerns regarding the use of visual programming in civilian avionics software","authors":"Marc Ronell","doi":"10.1145/2465470.2465477","DOIUrl":"https://doi.org/10.1145/2465470.2465477","url":null,"abstract":"The paper examines the regulatory oversight of flight critical avionic software using Visual Programming Languages (VPLs) as a specific example and points out shortcomings with the Federal Aviation Administration's (FAA's) process of verifying software. VPLs and environments are being applied in conjunction with Automatic Generated Code (AGC) to create software for safety critical avionics systems which will control the fate of commercial vehicles and their passengers. There are no empirical, statistically significant studies which demonstrate that using VPLs to generate source code has any real advantage over text based programming languages. The paper describes the need for empirical software development studies.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring and diagnosing cloud infrastructure","authors":"W. Kozaczynski","doi":"10.1145/2465470.2491490","DOIUrl":"https://doi.org/10.1145/2465470.2491490","url":null,"abstract":"At the foundation of any cloud, a public cloud like Azure or Amazon EC2, or a private cloud like the one in Bing or Google, is the cloud infrastructure. It starts with the physical assets like server racks, physical servers, power units, network switches and storage devices. Then it extends to the layer that includes, among other things, hypervisors, virtual switches and networks, and storage clusters. It is not until the infrastructure works that the cloud management software can create and manage cloud services and virtual machines for the cloud tenants, which is the primary goal of any cloud.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116927442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault-tolerant techniques and security mechanisms for model-based performance prediction of critical systems","authors":"R. Rodríguez, Catia Trubiani, J. Merseguer","doi":"10.1145/2304656.2304660","DOIUrl":"https://doi.org/10.1145/2304656.2304660","url":null,"abstract":"Security attacks aim to system vulnerabilities that may lead to operational failures. In order to react to attacks software designers use to introduce Fault-Tolerant Techniques (FTTs), such as recovery procedures, and/or Security Mechanisms (SMs), such as encryption of data. FTTs and SMs inevitably consume system resources, hence they influence the system performance, even affecting its full operability.\u0000 The goal of this paper is to provide a model-based methodology able to quantitatively estimate the performance degradation due to the introduction of FTTs and/or SMs aimed at protecting critical systems. Such a methodology is able to inform software designers about the performance degradation the system may incur, thus supporting them to find appropriate security strategies while meeting performance requirements. This approach has been applied to a case study in the E-commerce domain, whose experimental results demonstrate its effectiveness.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating identity management architectures","authors":"Christopher Staite, R. Bahsoon","doi":"10.1145/2304656.2304659","DOIUrl":"https://doi.org/10.1145/2304656.2304659","url":null,"abstract":"Developments in the area of identity management have been subject to very little critique. Many implementations have gathered little general following, and larger scale adoption, such as OpenID, has been limited to internal systems and large identity providers.\u0000 Previous evaluation has focussed on specific areas and does little to describe the trade off performed in the use of new identity management architectures. Furthermore, these evaluations have not equally considered user vs service provider perspective. This paper looks to derive a method for evaluation which encapsulates metrics from past work and areas which have not been considered. This method produces a holistic evaluation and comparison of identity management architectures.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123656668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}