{"title":"Aging and Rejuvenation Models of Load Changing Attacks in Micro-Grids","authors":"R. Czekster, Alberto Avritzer, D. Menasché","doi":"10.1109/ISSREW53611.2021.00039","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00039","url":null,"abstract":"Recent cyber-attacks in critical infrastructures have highlighted the importance of investigating how to improve Smart-Grids (SG) resiliency. In the future, it is envisioned that grid connected micro-grids would have the ability of operating in 'islanded mode’ in the event of a grid-level failure. In this work, we propose a method for unfolding aging and rejuvenation models into their sequential counterparts to enable the computation of transient state probabilities in the proposed models. We have applied our methodology to one specific security attack scenario and four large campus micro-grids case studies. We have shown how to convert the software aging and rejuvenation, with cycles, to its unfolded counterpart. We then used the unfolded counterpart to support the survivability computation. We were able to analytically evaluate the transient failure probability and the associated Instantaneous Expected Energy Not Supplied metric, for each of the four case studies, from one specific attack. We envision several practical applications of the proposed methodology. First, because the micro-grid model is solved analytically, the approach can be used to support micro-grid engineering optimizations accounting for security intrusions. Second, micro-grid engineers could use the approach to detect security attacks by monitoring for unexpected deviations of the Energy Not Supplied metric.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114387803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Targeted Code Inspection based on Human Errors","authors":"Fuqun Huang, H. Madeira","doi":"10.1109/ISSREW53611.2021.00076","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00076","url":null,"abstract":"As a direct cause of software defects, human error is the key to understanding and identifying defects. We propose a new code inspection method: targeted code inspection based on human error mechanisms of software engineers. Based on the common erroneous mechanisms of human cognition, the method targets error-prone codes with high efficiency and minimum effort. The proposed method is supported by preliminary evidence in a pilot study.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114622988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Far Have We Come in Fault Tolerance for Distributed Graph Processing: A Quantitative Assessment of Fault Tolerance Effectiveness","authors":"Chengbo Zhang, Ying Li, Yong Yang, Tong Jia, Zhirong Hou","doi":"10.1109/ISSREW53611.2021.00114","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00114","url":null,"abstract":"With the increase in graph dataset size and algorithm complexity, distributed graph processing runs with severe reliability problems caused by high uncertainty. A range of fault tolerance specific to distributed graph processing has been proposed. Unfortunately, current work does not consider the complexity of actual failure but only verifies the effectiveness of fault tolerance by simply killing processes or crashing compute nodes. We investigate the impact of failures on the effectiveness of three widely-used fault-tolerance mechanisms in distributed graph processing, such as checkpoint-based fault tolerance, logging-based fault tolerance, and replication-based fault tolerance, by performing fault injection based on extensive research about actual faults. Based on the above analysis, we find that failure offsets cause fault tolerance's average recovery coverage factor to drop by 0.37% to 26.77 %, and small checkpoint intervals and the confined recovery bring weak robustness of failure recovery.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ReSwitcher: Automatically Refactoring Java Programs for Switch Expression","authors":"Yang Zhang, Chaoshuai Li, Shuai Shao","doi":"10.1109/ISSREW53611.2021.00108","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00108","url":null,"abstract":"A switch statement is frequently used with the advantage of handling multi-way branches and with the disadvantage of fall-through semantics that makes programs error-prone. Since JDK 12, the switch expression has been proposed as an alternative to make the code cleaner and safer. However, none of existing works focuses on fall-through semantics and refactoring for switch expressions in Java programs. To this end, this paper presents a refactoring tool ReSwitcher that can automatically (i) remove the fall-through semantics from a switch statement; and (ii) convert a switch statement into a switch expression. ReSwitcher is evaluated on 5 real-world applications. The results show it can refactor 2,984 switch statements in an average of 2.71 seconds, which improves robustness for these projects.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Hiding using Bucket Steganography","authors":"Katarzyna Koptyra, M. Ogiela","doi":"10.1109/ISSREW53611.2021.00085","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00085","url":null,"abstract":"This paper describes bucket steganography-a data hiding technique in which secret message may be extracted from the carrier with standard software preinstalled in operating system, and with inconspicuous graphical applications, like GIMP, Paint or Photoshop. First, the carrier file should be presented in chosen base, for example hexadecimal, octal, etc. Then the user takes the screenshot of the listing and fill its background with bucket tool. In this way the secret message appears and may be read from unfilled regions of different color.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122320439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rustpi: A Rust-powered Reliable Micro-kernel Operating System","authors":"Yuanzhi Liang, Lei Wang, Siran Li, Bo Jiang","doi":"10.1109/ISSREW53611.2021.00075","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00075","url":null,"abstract":"Rustpi is a micro-kernel operating system implemented in Rust to explore how modern language features can help to build a reliable operating system. In our system, isolations between micro-kernel servers are achieved by Rust language instead of expensive hardware mechanisms. Moreover, Rust language features such as control-flow integrity and unwinding enable hardware transient fault detection and error recovery without resource leaking. Rustpi creatively integrates these features to enhance its reliability. Moreover, our design is also applicable to other Rust micro-kernel systems or even the Linux kernel.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector","authors":"V. Tan, C. Cheh, Binbin Chen","doi":"10.1109/ISSREW53611.2021.00046","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00046","url":null,"abstract":"The OWASP Application Security Verification Standard (ASVS) is a widely used web application development guideline regarding the technical security controls and secure development requirements. While software development teams refer to ASVS to secure their applications and development process, they also need to ensure the compliance of various security related regulations, including sector-specific ones. In this work, we study the synergy of these two activities, i.e., by following ASVS, how does a development team position their developed applications in meeting those regulation requirements. We take the highly regulated financial services sector as a case study. In particular, we look at two recent guidelines published by Monetary Authority of Singapore (MAS) - the Technology Risk Management (TRM) guidelines and Notice 655 Cyber Hygiene. We developed a systematic approach to map ASVS to those two sector-specific regulations. Our results show that by adopting ASVS, a development team can achieve a high degree of regulatory compliance (38.6 % for the MAS TRM guidelines and 47.6% for the MAS Notice 655, respectively). That demonstrates the viability of using international standards (like ASVS) to support compliance with the two sector-specific regulations. In addition, our mapping approach can be useful for organizations to support their compliance efforts.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127965880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}