2015 IEEE International Conference on Dependable Systems and Networks Workshops最新文献

筛选
英文 中文
Service Deterioration Analysis (SDA): An Early Development Phase Dependability Analysis Method 服务劣化分析(SDA):一种早期开发阶段可靠性分析方法
Georg Macher, Andrea Höller, H. Sporer, E. Armengaud, Christian Kreiner
{"title":"Service Deterioration Analysis (SDA): An Early Development Phase Dependability Analysis Method","authors":"Georg Macher, Andrea Höller, H. Sporer, E. Armengaud, Christian Kreiner","doi":"10.1109/DSN-W.2015.13","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.13","url":null,"abstract":"Dependability is a super ordinate concept regrouping different system attributes such as reliability, safety, security, or availability and a key selling point of modern embedded systems. Dependable systems rely on mature quality management and development methods such as requirements / systems engineering and system analyses. In the automotive domain analysis methods for safety and security attributes at early development phases are well known and partially mandatory by domain standards. Nevertheless, approaches for analysis of serviceability attributes (the combination of reliability and maintainability) at early development phases are not yet available. Aim of the paper is to present a novel analysis method to quantify the impact of individual system parts on the overall system serviceability at early development phases. This approach bases on the concepts of state-of-the-art methods for safety and security analysis and extends their scope of application to serviceability feature quantification, thus enables consistent identification of system dependability target attributes. This, in turn, is a pre-requisite for ensuring a certain level of system dependability from start of development. In the second part of the document the application of the novel approach is demonstrated on an automotive training example of a battery management system.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantifying the Impact of External Attacks on a Distributed Automatic Track Warning System 量化外部攻击对分布式自动航迹预警系统的影响
Leonardo Montecchi, P. Lollini, A. Bondavalli
{"title":"Quantifying the Impact of External Attacks on a Distributed Automatic Track Warning System","authors":"Leonardo Montecchi, P. Lollini, A. Bondavalli","doi":"10.1109/DSN-W.2015.22","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.22","url":null,"abstract":"For several years, the vulnerability of Critical Infrastructures (CIs) to cyber-threats has been limited, since they were mostly isolated systems, using proprietary protocols. Nowadays, CIs are increasingly threatened by external attacks: the use of off-the-shelf components is common, they have become interconnected, and sometimes also connected to the Internet. This problem is exacerbated by the recent trend towards the adoption of wireless connectivity and mobile devices, which is gaining interest also in this domain. One of the main challenges is to quantify the impact that external attacks may have on the infrastructure, and ensure that its dependability and safety requirements can still be fulfilled. In this paper we focus on the ALARP system, which protects workers on the railway infrastructure using distributed mobile terminals, and evaluate the impact of two attacks to the communication infrastructure. In performing such analysis, we experiment with a new method, which combines a stochastic model of the system with a model of the attacker, and quantifies the impact of specific attacks on precise safety and availability metrics.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semi-automatic Generation of Extended Finite State Machines from Natural Language Standard Documents 从自然语言标准文档中半自动生成扩展有限状态机
J. Greghi, E. Martins, Ariadne Carvalho
{"title":"Semi-automatic Generation of Extended Finite State Machines from Natural Language Standard Documents","authors":"J. Greghi, E. Martins, Ariadne Carvalho","doi":"10.1109/DSN-W.2015.17","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.17","url":null,"abstract":"Many requirement documents are written in natural language and, therefore, may contain problems such as inconsistencies and ambiguities. To minimize these problems, there is a trend in Software Engineering to use models to represent systems. These models are obtained from textual requirements. However, manual modelling is a complex task and, in order to do it semi-automatically, one has to deal with problems such as the kind of model to be generated, the automation degree to be achieved, and the quality of the document that must be processed. We propose a methodology to semi-automatically generate Extended Finite State Machines (EFSMs) from natural language standard documents. We used Natural Language Processing (NLP) techniques and tools to extract information from the document, and implemented a prototype which generates EFSMs. The generated EFSMs were validated with a model checking tool, and manually evaluated by comparing them with the manually generated models.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System 基于资产的洪水预警系统可用性和安全性分析方法
F. Machida, Jianwen Xiang, Kumiko Tadano, S. Hosono
{"title":"An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System","authors":"F. Machida, Jianwen Xiang, Kumiko Tadano, S. Hosono","doi":"10.1109/DSN-W.2015.12","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.12","url":null,"abstract":"Dependability design of IT services including safety and availability analysis requires expertise and often takes long time to carry out. Efficient analysis of system dependability is thus a key to increase the productivity and quality of system development project in service provider. In this paper, we propose an approach to improve the process of system dependability analysis through asset-based development concept in which safety constraints, system designs, availability models, parameter values and empirical data are incorporated into project asset on the premise of reuse. A structure of asset for dependability analysis along with other software artifacts is presented. Through an example of availability and safety analysis of a flood alert system, we characterize the effectiveness of the asset-based approach.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115498659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Use of a Graphic Processing Unit (GPU) in a Real Time Visual Odometry Application 图形处理单元(GPU)在实时视觉里程计应用中的使用
Jaime Armando Delgado Vargas, P. Kurka
{"title":"The Use of a Graphic Processing Unit (GPU) in a Real Time Visual Odometry Application","authors":"Jaime Armando Delgado Vargas, P. Kurka","doi":"10.1109/DSN-W.2015.32","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.32","url":null,"abstract":"This paper presents a practical application of visual odometry (VO). Visual odometry applications are computationally expensive due to the frequent and large number of required data processing. In the present work the application is implemented in a graphics processing unit card (GPU) using compute unified device architecture CUDA and OpenCV libraries, allowing real time processing with a speed of 30 frames per second. The algorithm begins with the capture and processing of stereoscopic images to find invariant interest points (keypoints) using the GPU-OpenCV speed-up robust features (SURF) library implementation. Stereoscopic image points are projected in the Euclidean space to yield 3-D estimates of the robot's translation and rotation movements. The real time VO algorithm is applied in a practical odometry estimation in a robot's outdoors navigation experiment.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116013133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Studying the Propagation of Failures in SOAs 研究soa中的故障传播
Cristiana Areias, J. Cunha, M. Vieira
{"title":"Studying the Propagation of Failures in SOAs","authors":"Cristiana Areias, J. Cunha, M. Vieira","doi":"10.1109/DSN-W.2015.18","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.18","url":null,"abstract":"Although Service Oriented Architectures (SOAs) are being increasingly used in business-critical scenarios, the applicability of Verification and Validation (V&V) is still very limited. The problem is that V&V activities have to be implemented at runtime to fit the characteristics of SOA. Recent proposals of runtime V&V techniques specific to SOA domain are far from being complete and a key issue lies in understanding how the \"failures propagate\" in a dynamic system and how to continuously verify its evolving elements. This paper introduces an approach to deal with the propagation of failures in a SOA environment. The proposed technique is based on three key steps: estimating the failure rate of the individual services, using fault injection to find the exposure of each service to failures from the invoked services, and estimating the impact of each service in the overall architecture. The overall approach is presented with a brief demonstration of its application.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114813190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Virtual Fault Injection Framework for Reliability-Aware Software Development 面向可靠性感知软件开发的虚拟故障注入框架
Andrea Höller, Georg Macher, T. Rauter, Johannes Iber, Christian Kreiner
{"title":"A Virtual Fault Injection Framework for Reliability-Aware Software Development","authors":"Andrea Höller, Georg Macher, T. Rauter, Johannes Iber, Christian Kreiner","doi":"10.1109/DSN-W.2015.16","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.16","url":null,"abstract":"Ever more dependable embedded systems are built with commercial off-the-shelf hardware components that are not intended for highly reliable applications. Consequently, software-based fault tolerance techniques have to maintain a safe operation despite underlying hardware faults. In order to efficiently develop fault tolerant software, fault injection is needed in early development stages. However, common fault injection approaches require manufactured products or detailed hardware models. Thus, these techniques are typically not applicable if software and hardware providers are separate vendors. Additionally, the rise of third-party OTS software components limits the means to inject faults. In this paper, we present a virtual fault injection framework that simulates safety-standard aligned fault models and supports OTS software components as well as widely-used embedded processors such as ARM cores. Additionally, we show how to integrate the framework into various software development stages. Finally, we illustrate the practicability of the approach by exemplifying the integration of the framework in the development of an industrial safety-critical system.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124821240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
An Approach to Clustering and Sequencing of Textual Requirements 一种文本需求的聚类和排序方法
R. Barbosa, Daniele Januario, A. E. Silva, Regina L. O. Moraes, Paulo S. Martins
{"title":"An Approach to Clustering and Sequencing of Textual Requirements","authors":"R. Barbosa, Daniele Januario, A. E. Silva, Regina L. O. Moraes, Paulo S. Martins","doi":"10.1109/DSN-W.2015.20","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.20","url":null,"abstract":"Natural language is often used to write software systems requirements. However, it may be prone to misunderstandings due to its ambiguities. Moreover, it is not easy to modularize these requirements and then find all related ones. In order to find out the impact of requirements in one another, it is necessary to look at every requirement rather than just a group of related requirements. When presented in large numbers, the understanding, organization and sequencing of requirements requires substantial time and effort. In this work, we introduce an approach based both on the clustering of textual requirements and on a data dictionary to organize them, as well as suggest a sequence for their implementation. A case study based on User Stories from Agile processes is introduced to illustrate the approach.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues 复杂集成空间系统缺陷类型影响评估:基于ODC和ISVV问题的分析
N. Silva, M. Vieira, D. Ricci, Domenico Cotroneo
{"title":"Assessment of Defect Type influence in Complex and Integrated Space Systems: Analysis Based on ODC and ISVV Issues","authors":"N. Silva, M. Vieira, D. Ricci, Domenico Cotroneo","doi":"10.1109/DSN-W.2015.19","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.19","url":null,"abstract":"Safety or mission critical systems are those where failures should be avoided at all costs. Engineering processes, techniques and tools are, however, not perfect, and lead to software and systems with flaws. This paper presents an analysis of the impact of late found issues versus the fault types for critical aerospace systems. These issues are the independently detected faults that remain once the engineering processes that are required by European space standards have been applied and the engineering teams have performed their verification and validation activities. This study presents the analysis of the fault impact versus fault type distribution according to the detection phases and to the issues severity/type and presents recommendations to improve space systems engineering.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123037727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cost Prediction for V&V and Certification Processes V&V和认证过程的成本预测
F. Brancati, A. Pataricza, N. Silva, Ábel Hegedüs, László Gönczy, A. Bondavalli, R. Esposito
{"title":"Cost Prediction for V&V and Certification Processes","authors":"F. Brancati, A. Pataricza, N. Silva, Ábel Hegedüs, László Gönczy, A. Bondavalli, R. Esposito","doi":"10.1109/DSN-W.2015.15","DOIUrl":"https://doi.org/10.1109/DSN-W.2015.15","url":null,"abstract":"Cost (time and effort) estimation is fundamental in system and software management. The software related research, together with industries, elaborated and currently use a large number of different cost estimators (CE). While expert judgment is still the most widely used estimation practice in industry, these estimators take a representative calibration set of projects and use a best matching extrapolation curve to predict the costs of further projects. The approach has proven its usefulness in predicting system and software development cost with the breakdown granularity of the main phases of the workflow (specification, implementation, testing etc.). However, there is no such CE for the broad application field of safety critical applications which would be fine granular enough to predict the costs related to Verification and Validation (V&V) and certification. The paper presents an ongoing work for creating such a V&V specific CE. The usefulness of the approach is illustrated by a \"what-if\" analysis example on the impacts of introducing sophisticated formal methods into the V&V workflow instead of the traditional methodology.","PeriodicalId":202329,"journal":{"name":"2015 IEEE International Conference on Dependable Systems and Networks Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信