Mads Frederik Madsen, Mikkel Gaub, Malthe Ettrup Kirkbro, S. Debois
{"title":"Transforming Byzantine Faults using a Trusted Execution Environment","authors":"Mads Frederik Madsen, Mikkel Gaub, Malthe Ettrup Kirkbro, S. Debois","doi":"10.1109/EDCC.2019.00022","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00022","url":null,"abstract":"We present a general transformation of general omission resilient distributed algorithms into byzantine fault ones. The transformation uses the guarantees of integrity and confidentiality provided by a trusted execution environment to implement a byzantine failure detector. Correct processes in a transformed algorithm will operate as if byzantine faulty processes have crashed or their messages were dropped. The transformation adds no additional messages between processes, except for a pre-compute step, and the increase in states of the algorithm is linearly bounded: it is a 1-round, n=f+1 translation, making no assumptions of determinism.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"107 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134194949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering Hidden Errors from Application Log Traces with Process Mining","authors":"M. Cinque, Raffaele Della Corte, A. Pecchia","doi":"10.1109/EDCC.2019.00034","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00034","url":null,"abstract":"Over the past decades logs have been widely used for detecting and analyzing failures of computer applications. Nevertheless, it is widely accepted by the scientific community that failures might go undetected in the logs. This paper proposes a measurement study with a dataset of 3,794 log traces obtained from normative and failure runs of the Apache web server. We use process mining (i) to infer a model of the normative log behavior, e.g., presence and ordering of messages in the traces, and (ii) to detect failures within arbitrary traces by looking for deviations from the model (conformance checking). Analysis is done with the Integer Linear Programming (ILP) Miner, Inductive Miner and Alpha++ Miner algorithms. Our measurements indicate that, although only around 18% failure traces contain explicit error keywords and phrases, conformance checking allows detecting up to 87% failures at high precision, which means that most of the errors are hidden across the traces.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"35 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantitative Cross-Layer Evaluation of Transient-Fault Injection Techniques for Algorithm Comparison","authors":"Horst Schirmeier, Mark Breddemann","doi":"10.1109/EDCC.2019.00016","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00016","url":null,"abstract":"In the wake of the soft-error problem, fault injection (FI) is a standard methodology to measure fault resilience of programs and to compare algorithm variants. As detailed, e.g. gate-level machine models are often unavailable or too slow to simulate, FI is usually carried out in fast simulators based on abstracted system models, using e.g. ISA-level register injection. However, the literature deems such injection techniques too inaccurate and yielding wrong conclusions about analyzed programs. In this paper, we empirically challenge this assumption by applying gate-, flip-flop-and ISA-level FI techniques on an Arm® Cortex®-M0 processor. Analyzing FI results from 18 benchmark programs, we initially confirm related work by reporting SDC-rate discrepancies of up to an order of magnitude between a gate-level baseline and injection techniques on higher machine-model levels, suggesting gate-level injection should be used e.g. to select a specific sorting algorithm. We discuss why these discrepancies are, however, to be expected, and show that the extrapolated absolute failure-count metric combined with relative inter-benchmark measurements yield a significantly better cross-layer alignment of algorithm-resilience rankings. Our results indicate that ISA-level injection techniques suffice for evaluating and selecting program and algorithm variants on low-end processors.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IV JohnMcGahagan, Darshan Bhansali, Margaret Gratian, M. Cukier
{"title":"A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites","authors":"IV JohnMcGahagan, Darshan Bhansali, Margaret Gratian, M. Cukier","doi":"10.1109/EDCC.2019.00025","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00025","url":null,"abstract":"Security researchers have used website features including the URL, webpage content, HTTP headers, and others to detect malicious websites. In prior research, features derived from HTTP headers have shown promise for malicious website detection. This paper includes a comprehensive evaluation of HTTP header features to assess whether additional HTTP header features improve malicious website detection. We analyze HTTP headers from 6,021 malicious and 39,853 benign websites. We define malicious websites as those identified by Cisco Talos Threat Intelligence Group for association with phishing, drive-by downloads, and command and control infrastructure. Benign websites consist of popular websites from the Alexa Traffic Rank. We collect 672 HTTP header features from these websites and identify 22 for further analysis. Among these, 11 have been studied in prior research while the other 11 are new and identified in our research. From these 22 features, eight features, three identified by our study, consistently rank as the most important features and represent 80% of the total feature importance. We build eight models with supervised learning techniques and observe that the detection performance metrics for the 22 features are consistently better than for the 11 previously studied features. We also apply two feature transformation techniques and find that performing Principal Component Analysis on the features identified increases detection ability. From our results, we postulate that use of additional HTTP header features will lead to more accurate detection of malicious websites.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imanol Allende, Nicholas Mc Guire, Jon Pérez, L. G. Monsalve, Nerea Uriarte, R. Obermaisser
{"title":"Towards Linux for the Development of Mixed-Criticality Embedded Systems Based on Multi-Core Devices","authors":"Imanol Allende, Nicholas Mc Guire, Jon Pérez, L. G. Monsalve, Nerea Uriarte, R. Obermaisser","doi":"10.1109/EDCC.2019.00020","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00020","url":null,"abstract":"As the complexity of several safety-critical systems continues to increase (e.g. autonomous driving), the need for a safety operating system to run complex algorithms and software has arisen. Although GNU/Linux is a widely used operating system, including high-performance systems, it was not designed for safety critical systems. This paper presents a novel isolation concept in order to support a defined independence level in mixed-criticality systems. This novel isolation concept is integrated with the architecture proposed by SIL2LinuxMP. Finally, a simple case study is used to guide the definition of safety techniques and the identification of challenges to be addressed.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124029474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamal Shahid, Enrico Schiavone, Domagoj Drenjanac, Rasmus Pedersen Bæklund, R. Olsen, H. Schwefel
{"title":"Extraction of CIM-Based Distribution Grid Topology Information for Observability","authors":"Kamal Shahid, Enrico Schiavone, Domagoj Drenjanac, Rasmus Pedersen Bæklund, R. Olsen, H. Schwefel","doi":"10.1109/EDCC.2019.00040","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00040","url":null,"abstract":"In order to implement fault-detection and diagnosis applications in Low Voltage (LV) grids, the data from customer connections needs to be processed jointly with measurements from the distribution grid by other Distribution System Operator (DSO) systems and in addition correlated to the LV grid topology. In practical DSO systems, the LV grid topology data is included in asset management databases and may use the Common Information Model (CIM) as data model. This grid topology information plays an important role in fault-detection and diagnosis. Thus, this paper presents an architecture and a concrete implementation to extract relevant grid topology information for use in fault detection and diagnosis from a CIM based asset management database. The approach is demonstrated and validated via CIM-based grid topology model from a real medium-sized distribution grid operator.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134412278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ding, Sheng Ding, A. Morozov, T. Fabarisov, K. Janschek
{"title":"On-Line Error Detection and Mitigation for Time-Series Data of Cyber-Physical Systems using Deep Learning Based Methods","authors":"K. Ding, Sheng Ding, A. Morozov, T. Fabarisov, K. Janschek","doi":"10.1109/EDCC.2019.00015","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00015","url":null,"abstract":"A cyber-physical system consists of sensors, micro-controller, networks, and actuators that interact with each other, generate a substantial amount of data, and form extremely complex system operational profiles. These heterogeneous components are subject to errors, e.g. spikes, off-sets, or delays, that may result in system failures. As the complexity of modern systems increases, it becomes a challenge to apply traditional fault detection and isolation methods to such complex systems. Deep learning based methods have surpassed traditional methods in terms of performance as the data size and complexity increase. The signals of cyber-physical systems are mainly time-series data. In this paper, we propose a new on-line error detection and mitigation approach for common sensor, computing hardware, and network errors of cyber-physical systems using deep learning based methods. More specifically, we train a Long Short-Term Memory (LSTM) network as a single step prediction model for the detection and mitigation of errors, like spikes, or offsets. In order to detect the long-duration errors that show no sharp change (a sudden drop or rise) between two successive data samples when errors occurred, e.g. network delays, we train an LSTM encoder-decoder as a multi-step prediction model. We also introduce the on-line error mitigation approach. Automatic recovery is achieved by replacing the detected errors with the predicted values. Finally, we demonstrate on-line error detection and mitigation capabilities of the trained single step and multi-step predictors using representative case studies.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Cheh, Uttam Thakore, Binbin Chen, W. G. Temple, W. Sanders
{"title":"Leveraging Physical Access Logs to Identify Tailgating: Limitations and Solutions","authors":"C. Cheh, Uttam Thakore, Binbin Chen, W. G. Temple, W. Sanders","doi":"10.1109/EDCC.2019.00032","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00032","url":null,"abstract":"Critical infrastructure facilities use physical access systems to control movement in their facilities. However, the cyber logs collected from such systems are not representative of all human movement in real life, including \"tailgating\", which is an important problem because it potentially allows unauthorized physical access to critical equipment. In this paper, we identify physical constraints on human movement and use those constraints to motivate several approaches for inferring tailgating from card tap logs. In particular, using our approach, we found 3,999 instances of tailgating in a railway station during a 17-month period. However, certain movement scenarios are not visible in card tap logs. We overcome that limitation by leveraging additional physical data sources to provide information regarding the physical presence of people within a space. We support our findings with an observation experiment that we conducted in a railway station.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Experimental Study of Software Aging and Rejuvenation in Dockerd","authors":"Matheus Torquato, M. Vieira","doi":"10.1109/EDCC.2019.00014","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00014","url":null,"abstract":"Virtualized containers are being extensively used to host applications as they substantially reduce the overhead caused by conventional virtualization techniques. Therefore, as containers adoption grows, the need for dependability also increases. Dockerd, the process that is in charge of Docker containers management, is supposed to support long-running systems, which makes it prone to the well-known problem of software aging. This paper presents an experimental study of software aging and rejuvenation targeting the dockerd daemon. We used the SWARE approach to conduct the experimentation, which encompasses three phases: i) stress - stress environment with the accelerated workload to induce bugs activation; ii) wait - stop the workload submission to observe possible accumulated effects and; iii) rejuvenation - submit a rejuvenation action to perceive changes in the internal software state. The experiment runs for 26 days, and results show that dockerd suffers from software aging effects after the stress phase. The accumulated effects remain in the system until a complete cleanup, comprising removing all the containers and rebooting the operating system.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126707783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Local VM Migration Against Hypervisor Corruption","authors":"F. Cerveira, R. Barbosa, H. Madeira","doi":"10.1109/EDCC.2019.00028","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00028","url":null,"abstract":"Virtual machine migration is an established technique for tolerating hardware faults affecting the virtualization infrastructure. Normally migration is performed between different physical hosts and hypervisors, which requires the memory state to be eventually sent over the network, thereby causing performance degradation in the migrated and co-located virtual machines, particularly when the migrated VMs are running IO-and memory-heavy workloads. Since most of the hardware faults are transient and can be recovered from by refreshing the affected component, we propose and evaluate a technique for migrating virtual machines over the same physical host almost instantly and with no overhead, by avoiding memory copy and taking advantage of Intel EPT's inner workings. This technique can be employed for refreshing the VMs' state held by the hypervisor with a lower VM downtime and performance overhead than what would be possible using traditional live migration.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}