2019 15th European Dependable Computing Conference (EDCC)最新文献

筛选
英文 中文
Transforming Byzantine Faults using a Trusted Execution Environment 使用可信执行环境转换拜占庭错误
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00022
Mads Frederik Madsen, Mikkel Gaub, Malthe Ettrup Kirkbro, S. Debois
{"title":"Transforming Byzantine Faults using a Trusted Execution Environment","authors":"Mads Frederik Madsen, Mikkel Gaub, Malthe Ettrup Kirkbro, S. Debois","doi":"10.1109/EDCC.2019.00022","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00022","url":null,"abstract":"We present a general transformation of general omission resilient distributed algorithms into byzantine fault ones. The transformation uses the guarantees of integrity and confidentiality provided by a trusted execution environment to implement a byzantine failure detector. Correct processes in a transformed algorithm will operate as if byzantine faulty processes have crashed or their messages were dropped. The transformation adds no additional messages between processes, except for a pre-compute step, and the increase in states of the algorithm is linearly bounded: it is a 1-round, n=f+1 translation, making no assumptions of determinism.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"107 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134194949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Discovering Hidden Errors from Application Log Traces with Process Mining 使用过程挖掘从应用程序日志跟踪中发现隐藏错误
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00034
M. Cinque, Raffaele Della Corte, A. Pecchia
{"title":"Discovering Hidden Errors from Application Log Traces with Process Mining","authors":"M. Cinque, Raffaele Della Corte, A. Pecchia","doi":"10.1109/EDCC.2019.00034","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00034","url":null,"abstract":"Over the past decades logs have been widely used for detecting and analyzing failures of computer applications. Nevertheless, it is widely accepted by the scientific community that failures might go undetected in the logs. This paper proposes a measurement study with a dataset of 3,794 log traces obtained from normative and failure runs of the Apache web server. We use process mining (i) to infer a model of the normative log behavior, e.g., presence and ordering of messages in the traces, and (ii) to detect failures within arbitrary traces by looking for deviations from the model (conformance checking). Analysis is done with the Integer Linear Programming (ILP) Miner, Inductive Miner and Alpha++ Miner algorithms. Our measurements indicate that, although only around 18% failure traces contain explicit error keywords and phrases, conformance checking allows detecting up to 87% failures at high precision, which means that most of the errors are hidden across the traces.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"35 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantitative Cross-Layer Evaluation of Transient-Fault Injection Techniques for Algorithm Comparison 用于算法比较的瞬态故障注入技术的定量跨层评价
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00016
Horst Schirmeier, Mark Breddemann
{"title":"Quantitative Cross-Layer Evaluation of Transient-Fault Injection Techniques for Algorithm Comparison","authors":"Horst Schirmeier, Mark Breddemann","doi":"10.1109/EDCC.2019.00016","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00016","url":null,"abstract":"In the wake of the soft-error problem, fault injection (FI) is a standard methodology to measure fault resilience of programs and to compare algorithm variants. As detailed, e.g. gate-level machine models are often unavailable or too slow to simulate, FI is usually carried out in fast simulators based on abstracted system models, using e.g. ISA-level register injection. However, the literature deems such injection techniques too inaccurate and yielding wrong conclusions about analyzed programs. In this paper, we empirically challenge this assumption by applying gate-, flip-flop-and ISA-level FI techniques on an Arm® Cortex®-M0 processor. Analyzing FI results from 18 benchmark programs, we initially confirm related work by reporting SDC-rate discrepancies of up to an order of magnitude between a gate-level baseline and injection techniques on higher machine-model levels, suggesting gate-level injection should be used e.g. to select a specific sorting algorithm. We discuss why these discrepancies are, however, to be expected, and show that the extrapolated absolute failure-count metric combined with relative inter-benchmark measurements yield a significantly better cross-layer alignment of algorithm-resilience rankings. Our results indicate that ISA-level injection techniques suffice for evaluating and selecting program and algorithm variants on low-end processors.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites 用于检测恶意网站的HTTP头特征的综合评估
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00025
IV JohnMcGahagan, Darshan Bhansali, Margaret Gratian, M. Cukier
{"title":"A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites","authors":"IV JohnMcGahagan, Darshan Bhansali, Margaret Gratian, M. Cukier","doi":"10.1109/EDCC.2019.00025","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00025","url":null,"abstract":"Security researchers have used website features including the URL, webpage content, HTTP headers, and others to detect malicious websites. In prior research, features derived from HTTP headers have shown promise for malicious website detection. This paper includes a comprehensive evaluation of HTTP header features to assess whether additional HTTP header features improve malicious website detection. We analyze HTTP headers from 6,021 malicious and 39,853 benign websites. We define malicious websites as those identified by Cisco Talos Threat Intelligence Group for association with phishing, drive-by downloads, and command and control infrastructure. Benign websites consist of popular websites from the Alexa Traffic Rank. We collect 672 HTTP header features from these websites and identify 22 for further analysis. Among these, 11 have been studied in prior research while the other 11 are new and identified in our research. From these 22 features, eight features, three identified by our study, consistently rank as the most important features and represent 80% of the total feature importance. We build eight models with supervised learning techniques and observe that the detection performance metrics for the 22 features are consistently better than for the 11 previously studied features. We also apply two feature transformation techniques and find that performing Principal Component Analysis on the features identified increases detection ability. From our results, we postulate that use of additional HTTP header features will lead to more accurate detection of malicious websites.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Linux for the Development of Mixed-Criticality Embedded Systems Based on Multi-Core Devices 面向Linux的多核混合临界嵌入式系统开发
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00020
Imanol Allende, Nicholas Mc Guire, Jon Pérez, L. G. Monsalve, Nerea Uriarte, R. Obermaisser
{"title":"Towards Linux for the Development of Mixed-Criticality Embedded Systems Based on Multi-Core Devices","authors":"Imanol Allende, Nicholas Mc Guire, Jon Pérez, L. G. Monsalve, Nerea Uriarte, R. Obermaisser","doi":"10.1109/EDCC.2019.00020","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00020","url":null,"abstract":"As the complexity of several safety-critical systems continues to increase (e.g. autonomous driving), the need for a safety operating system to run complex algorithms and software has arisen. Although GNU/Linux is a widely used operating system, including high-performance systems, it was not designed for safety critical systems. This paper presents a novel isolation concept in order to support a defined independence level in mixed-criticality systems. This novel isolation concept is integrated with the architecture proposed by SIL2LinuxMP. Finally, a simple case study is used to guide the definition of safety techniques and the identification of challenges to be addressed.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124029474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Extraction of CIM-Based Distribution Grid Topology Information for Observability 基于cim的配电网格拓扑信息可观测性提取
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00040
Kamal Shahid, Enrico Schiavone, Domagoj Drenjanac, Rasmus Pedersen Bæklund, R. Olsen, H. Schwefel
{"title":"Extraction of CIM-Based Distribution Grid Topology Information for Observability","authors":"Kamal Shahid, Enrico Schiavone, Domagoj Drenjanac, Rasmus Pedersen Bæklund, R. Olsen, H. Schwefel","doi":"10.1109/EDCC.2019.00040","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00040","url":null,"abstract":"In order to implement fault-detection and diagnosis applications in Low Voltage (LV) grids, the data from customer connections needs to be processed jointly with measurements from the distribution grid by other Distribution System Operator (DSO) systems and in addition correlated to the LV grid topology. In practical DSO systems, the LV grid topology data is included in asset management databases and may use the Common Information Model (CIM) as data model. This grid topology information plays an important role in fault-detection and diagnosis. Thus, this paper presents an architecture and a concrete implementation to extract relevant grid topology information for use in fault detection and diagnosis from a CIM based asset management database. The approach is demonstrated and validated via CIM-based grid topology model from a real medium-sized distribution grid operator.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On-Line Error Detection and Mitigation for Time-Series Data of Cyber-Physical Systems using Deep Learning Based Methods 基于深度学习方法的网络物理系统时间序列数据在线错误检测与缓解
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00015
K. Ding, Sheng Ding, A. Morozov, T. Fabarisov, K. Janschek
{"title":"On-Line Error Detection and Mitigation for Time-Series Data of Cyber-Physical Systems using Deep Learning Based Methods","authors":"K. Ding, Sheng Ding, A. Morozov, T. Fabarisov, K. Janschek","doi":"10.1109/EDCC.2019.00015","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00015","url":null,"abstract":"A cyber-physical system consists of sensors, micro-controller, networks, and actuators that interact with each other, generate a substantial amount of data, and form extremely complex system operational profiles. These heterogeneous components are subject to errors, e.g. spikes, off-sets, or delays, that may result in system failures. As the complexity of modern systems increases, it becomes a challenge to apply traditional fault detection and isolation methods to such complex systems. Deep learning based methods have surpassed traditional methods in terms of performance as the data size and complexity increase. The signals of cyber-physical systems are mainly time-series data. In this paper, we propose a new on-line error detection and mitigation approach for common sensor, computing hardware, and network errors of cyber-physical systems using deep learning based methods. More specifically, we train a Long Short-Term Memory (LSTM) network as a single step prediction model for the detection and mitigation of errors, like spikes, or offsets. In order to detect the long-duration errors that show no sharp change (a sudden drop or rise) between two successive data samples when errors occurred, e.g. network delays, we train an LSTM encoder-decoder as a multi-step prediction model. We also introduce the on-line error mitigation approach. Automatic recovery is achieved by replacing the detected errors with the predicted values. Finally, we demonstrate on-line error detection and mitigation capabilities of the trained single step and multi-step predictors using representative case studies.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions 利用物理访问日志识别尾随:限制和解决方案
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00032
C. Cheh, Uttam Thakore, Binbin Chen, W. G. Temple, W. Sanders
{"title":"Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions","authors":"C. Cheh, Uttam Thakore, Binbin Chen, W. G. Temple, W. Sanders","doi":"10.1109/EDCC.2019.00032","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00032","url":null,"abstract":"Critical infrastructure facilities use physical access systems to control movement in their facilities. However, the cyber logs collected from such systems are not representative of all human movement in real life, including \"tailgating\", which is an important problem because it potentially allows unauthorized physical access to critical equipment. In this paper, we identify physical constraints on human movement and use those constraints to motivate several approaches for inferring tailgating from card tap logs. In particular, using our approach, we found 3,999 instances of tailgating in a railway station during a 17-month period. However, certain movement scenarios are not visible in card tap logs. We overcome that limitation by leveraging additional physical data sources to provide information regarding the physical presence of people within a space. We support our findings with an observation experiment that we conducted in a railway station.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Experimental Study of Software Aging and Rejuvenation in Dockerd Dockerd软件老化与返老还童的实验研究
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00014
Matheus Torquato, M. Vieira
{"title":"An Experimental Study of Software Aging and Rejuvenation in Dockerd","authors":"Matheus Torquato, M. Vieira","doi":"10.1109/EDCC.2019.00014","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00014","url":null,"abstract":"Virtualized containers are being extensively used to host applications as they substantially reduce the overhead caused by conventional virtualization techniques. Therefore, as containers adoption grows, the need for dependability also increases. Dockerd, the process that is in charge of Docker containers management, is supposed to support long-running systems, which makes it prone to the well-known problem of software aging. This paper presents an experimental study of software aging and rejuvenation targeting the dockerd daemon. We used the SWARE approach to conduct the experimentation, which encompasses three phases: i) stress - stress environment with the accelerated workload to induce bugs activation; ii) wait - stop the workload submission to observe possible accumulated effects and; iii) rejuvenation - submit a rejuvenation action to perceive changes in the internal software state. The experiment runs for 26 days, and results show that dockerd suffers from software aging effects after the stress phase. The accumulated effects remain in the system until a complete cleanup, comprising removing all the containers and rebooting the operating system.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126707783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Fast Local VM Migration Against Hypervisor Corruption 针对虚拟化环境损坏的本地虚拟机快速迁移
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00028
F. Cerveira, R. Barbosa, H. Madeira
{"title":"Fast Local VM Migration Against Hypervisor Corruption","authors":"F. Cerveira, R. Barbosa, H. Madeira","doi":"10.1109/EDCC.2019.00028","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00028","url":null,"abstract":"Virtual machine migration is an established technique for tolerating hardware faults affecting the virtualization infrastructure. Normally migration is performed between different physical hosts and hypervisors, which requires the memory state to be eventually sent over the network, thereby causing performance degradation in the migrated and co-located virtual machines, particularly when the migrated VMs are running IO-and memory-heavy workloads. Since most of the hardware faults are transient and can be recovered from by refreshing the affected component, we propose and evaluate a technique for migrating virtual machines over the same physical host almost instantly and with no overhead, by avoiding memory copy and taking advantage of Intel EPT's inner workings. This technique can be employed for refreshing the VMs' state held by the hypervisor with a lower VM downtime and performance overhead than what would be possible using traditional live migration.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信