{"title":"Assessing the Impact of Virtualization on the Generation of Failure Prediction Data","authors":"Ivano Irrera, J. Durães, H. Madeira, M. Vieira","doi":"10.1109/LADC.2013.24","DOIUrl":"https://doi.org/10.1109/LADC.2013.24","url":null,"abstract":"Fault injection has been successfully used in the past to support the generation of realistic failure data for offline training of failure prediction algorithms. However, runtime computer systems evolution requires the online generation of training data. The problem is that using fault injection in a production environment is unacceptable. Virtualization is a cheap sand boxing solution that may be used to run multiple copies of a system, over which fault injection can be safely applied. Nevertheless, there is no guarantee that the data generated in the virtualized environment can be used for training the algorithms that will run in the original system. In this work we study the similarity of failure data obtained in the two scenarios, considering different virtualized environments. Results show that the data share key characteristics, suggesting virtualization as a viable solution to be further researched.","PeriodicalId":243515,"journal":{"name":"2013 Sixth Latin-American Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122209159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automated Approach to Generate Web Applications Attack Scenarios","authors":"E. Alata, M. Kaâniche, V. Nicomette, R. Akrout","doi":"10.1109/LADC.2013.22","DOIUrl":"https://doi.org/10.1109/LADC.2013.22","url":null,"abstract":"Web applications have become one of the most popular targets of attacks during the last years. Therefore it is important to identify the vulnerabilities of such applications and to remove them to prevent potential attacks. This paper presents an approach that is aimed at the vulnerability assessment of Web applications following a black-box approach. The objective is to detect vulnerabilities in Web applications and their dependencies and to generate attack scenarios that reflect such dependencies. Our approach aims to move a step forward toward the automation of this process. The paper presents the main concepts behind the proposed approach and an example that illustrates the main steps of the algorithm leading to the identification of the vulnerabilities of a Web application and their dependencies.","PeriodicalId":243515,"journal":{"name":"2013 Sixth Latin-American Symposium on Dependable Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatically Tolerating Arbitrary Faults in Non-malicious Settings","authors":"Diogo Behrens, Stefan Weigert, C. Fetzer","doi":"10.1109/LADC.2013.26","DOIUrl":"https://doi.org/10.1109/LADC.2013.26","url":null,"abstract":"Arbitrary faults such as bit flips have been often observed in commodity-hardware data centers and have disrupted large services. Benign faults, such as crashes and message omissions, are nevertheless the standard assumption in practical fault-tolerant distributed systems. Algorithms tolerant to arbitrary faults are harder to understand and more expensive to deploy (requiring more machines). In this work, we introduce a non-malicious arbitrary fault model including transient and permanent arbitrary faults, such as bit flips and hardware-design errors, but no malicious faults, typically caused by security breaches. We then present a compiler-based framework that allows benign fault-tolerant algorithms to automatically tolerate arbitrary faults in non-malicious settings. Finally, we experimentally evaluate two fundamental algorithms: Paxos and leader election. At expense of CPU cycles, transformed algorithms use the same number of processes as their benign fault-tolerant counterparts, and have virtually no network overhead, while reducing the probability of failing arbitrarily by two orders of magnitude.","PeriodicalId":243515,"journal":{"name":"2013 Sixth Latin-American Symposium on Dependable Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Center Fault-Tolerant Routing and Forwarding: An Approach Based on Encoded Paths","authors":"R. M. Ramos, M. Martinello, C. E. Rothenberg","doi":"10.1109/LADC.2013.18","DOIUrl":"https://doi.org/10.1109/LADC.2013.18","url":null,"abstract":"Traditional layer 2 and layer 3 network designs face some limitations on data center networks such as lack of scalability, difficult management and inflexible communication. We observe that data center networks are often managed as a single logical network fabric with a well-controlled baseline topology and growth model. This paper describes a data center networking approach based on encoded paths carried in the packet header. We present an Open Flow-based test bed implementation of a data center architecture governed by a logically centralized Network Manager, which is responsible to transparently provide the networking and support functions to operate the data center network. We evaluate the proposal in terms of fail recovery time, state requirements, and load balancing capabilities. The results of the experiments show that our proposal improves the fail recovery time, while preserving scalability requirements.","PeriodicalId":243515,"journal":{"name":"2013 Sixth Latin-American Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131540357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Gracia, D. Gil, L. J. Saiz, J. Baraza-Calvo, P. Gil
{"title":"Defining a Representative and Low Cost Fault Model Set for Intermittent Faults in Microprocessor Buses","authors":"J. Gracia, D. Gil, L. J. Saiz, J. Baraza-Calvo, P. Gil","doi":"10.1109/LADC.2013.19","DOIUrl":"https://doi.org/10.1109/LADC.2013.19","url":null,"abstract":"The reduction of transistor size dimensions in new technologies has provoked the apparition of new fault types. In this way, intermittent faults present a great challenge, as they are expected to be more and more common. In this work, the effects of intermittent faults in the behavior of a Fault-Tolerant microprocessor are studied. To carry out this analysis, a VHDL-based fault injection technique based on saboteurs, which allows the injection of complex fault models, has been used. Microprocessor buses have been perturbed as they are critical locations, sensitive to intermittent faults. Thus, a representative and low cost intermittent fault model set is proposed by comparing the impact and the feasibility of different intermittent fault models.","PeriodicalId":243515,"journal":{"name":"2013 Sixth Latin-American Symposium on Dependable Computing","volume":"221 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120878117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}