首页 > 最新文献

2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
Software rejuvenation and runtime reliability monitoring 软件更新和运行时可靠性监控
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00063
A. Fantechi, G. Gori, Marco Papini
The overall system reliability of complex Cyber Physical systems is contributed both by hardware reliability and software reliability. The former can be often increased through fault-tolerant mechanisms and architectures, while the latter can take advantage of a suitable rejuvenation policy. These characteristics call for flexible runtime safety checks of system executions that go beyond conventional runtime mon-itoring of pre-programmed safety conditions, also in order to minimize maintenance costs. Defining a satisfying monitoring model for complex systems is still a challenge. In this paper, we investigate the application of a novel approach, named Reliability Based Monitoring (RBM), that allows for a flexible runtime monitoring of software reliability in complex systems. The approach leverages a hierarchical reliability model periodically applied to runtime diagnostics data: this allows to dynamically plan rejuvenation activities that are able to prevent software failures.
复杂网络物理系统的整体可靠性是由硬件可靠性和软件可靠性共同贡献的。前者通常可以通过容错机制和体系结构来增加,而后者可以利用适当的恢复策略。这些特点要求对系统执行进行灵活的运行时安全检查,这超越了传统的预编程安全条件的运行时监控,也是为了最大限度地降低维护成本。为复杂系统定义一个令人满意的监视模型仍然是一个挑战。在本文中,我们研究了一种新方法的应用,称为基于可靠性的监控(RBM),它允许在复杂系统中灵活地运行时监控软件的可靠性。该方法利用定期应用于运行时诊断数据的分层可靠性模型:这允许动态规划能够防止软件故障的恢复活动。
{"title":"Software rejuvenation and runtime reliability monitoring","authors":"A. Fantechi, G. Gori, Marco Papini","doi":"10.1109/ISSREW55968.2022.00063","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00063","url":null,"abstract":"The overall system reliability of complex Cyber Physical systems is contributed both by hardware reliability and software reliability. The former can be often increased through fault-tolerant mechanisms and architectures, while the latter can take advantage of a suitable rejuvenation policy. These characteristics call for flexible runtime safety checks of system executions that go beyond conventional runtime mon-itoring of pre-programmed safety conditions, also in order to minimize maintenance costs. Defining a satisfying monitoring model for complex systems is still a challenge. In this paper, we investigate the application of a novel approach, named Reliability Based Monitoring (RBM), that allows for a flexible runtime monitoring of software reliability in complex systems. The approach leverages a hierarchical reliability model periodically applied to runtime diagnostics data: this allows to dynamically plan rejuvenation activities that are able to prevent software failures.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Colour Space Defence: Simple, Intuitive, but Effective 色彩空间防御:简单,直观,但有效
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00086
Pei Yang, Jing Wang, Huandong Wang
Deep neural networks (DNNs) are widely applied in autonomous intelligent systems. However, DNNs are vulnerable to adversarial attacks from exclusively crafted input images, leading to performance degradation such as wrong classifications. A wrong classification made by an AIS could result in severe and possibly lethal consequences. While several existing works proposed applying classic computer vision techniques to adversarial defense, these methods generally deteriorate the input information to a considerable extent. To re-store model performances while minimising such deterioration, we propose a novel method for adversarial defence named Colour Space Defence. We first demonstrated the weak transferability of adversarial information across different colour spaces. We then proposed to defend against adversarial examples by ensembling models trained in multiple colour spaces. Experiments have verified the validity of Colour Space Defence in maintaining performances on clean images. In most cases of defence, this method outperformed several of its comparators.
深度神经网络在自主智能系统中有着广泛的应用。然而,dnn很容易受到来自专门制作的输入图像的对抗性攻击,导致性能下降,例如错误分类。AIS的错误分类可能会导致严重甚至致命的后果。虽然已有的一些研究提出将经典的计算机视觉技术应用于对抗性防御,但这些方法通常会在相当程度上破坏输入信息。为了在最大限度地减少这种退化的同时恢复模型的性能,我们提出了一种新的对抗性防御方法,称为颜色空间防御。我们首先证明了敌对信息在不同色彩空间中的弱可转移性。然后,我们提出通过在多个色彩空间中训练的集成模型来防御对抗性示例。实验验证了彩色空间防御在保持干净图像性能方面的有效性。在大多数辩护案件中,这种方法的表现优于若干比较方法。
{"title":"Colour Space Defence: Simple, Intuitive, but Effective","authors":"Pei Yang, Jing Wang, Huandong Wang","doi":"10.1109/ISSREW55968.2022.00086","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00086","url":null,"abstract":"Deep neural networks (DNNs) are widely applied in autonomous intelligent systems. However, DNNs are vulnerable to adversarial attacks from exclusively crafted input images, leading to performance degradation such as wrong classifications. A wrong classification made by an AIS could result in severe and possibly lethal consequences. While several existing works proposed applying classic computer vision techniques to adversarial defense, these methods generally deteriorate the input information to a considerable extent. To re-store model performances while minimising such deterioration, we propose a novel method for adversarial defence named Colour Space Defence. We first demonstrated the weak transferability of adversarial information across different colour spaces. We then proposed to defend against adversarial examples by ensembling models trained in multiple colour spaces. Experiments have verified the validity of Colour Space Defence in maintaining performances on clean images. In most cases of defence, this method outperformed several of its comparators.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124193163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies 一种通过移除硬件依赖来自动重新托管嵌入式固件的方法
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00033
A. Ketterer, Asha Shekar, E. Yi, S. Bagchi, Abraham A. Clements
Firmware emulation is useful for finding vulnerabil-ities, performing debugging, and testing functionalities. However, the process of enabling firmware to execute in an emulator (i.e., re-hosting) is difficult. Each piece of the firmware may depend on hardware peripherals outside the microcontroller that are inaccessible during emulation. Current practices involve painstakingly disentangling these dependencies or replacing them with developed models that emulate functions interacting with hardware. Unfortunately, both are highly manual and error-prone. In this paper, we introduce a systematic graph-based approach to analyze firmware binaries and determine which functions need to be replaced. Our approach is customizable to balance the fidelity of the emulation and the amount of effort it would take to achieve the emulation by modeling functions. We run our algorithm across a number of firmware binaries and show its ability to capture and remove a large majority of hardware dependencies.
固件仿真对于发现漏洞、执行调试和测试功能非常有用。然而,使固件在模拟器中执行的过程(即重新托管)是困难的。固件的每个部分都可能依赖于在仿真期间无法访问的微控制器外部的硬件外设。当前的实践包括费力地解开这些依赖关系,或者用模拟与硬件交互的功能的开发模型代替它们。不幸的是,这两种方法都是高度手工化且容易出错的。在本文中,我们介绍了一种系统的基于图形的方法来分析固件二进制文件并确定需要替换哪些功能。我们的方法是可定制的,以平衡仿真的保真度和通过建模功能实现仿真所需的工作量。我们在许多固件二进制文件上运行我们的算法,并展示了它捕获和删除大部分硬件依赖的能力。
{"title":"An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies","authors":"A. Ketterer, Asha Shekar, E. Yi, S. Bagchi, Abraham A. Clements","doi":"10.1109/ISSREW55968.2022.00033","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00033","url":null,"abstract":"Firmware emulation is useful for finding vulnerabil-ities, performing debugging, and testing functionalities. However, the process of enabling firmware to execute in an emulator (i.e., re-hosting) is difficult. Each piece of the firmware may depend on hardware peripherals outside the microcontroller that are inaccessible during emulation. Current practices involve painstakingly disentangling these dependencies or replacing them with developed models that emulate functions interacting with hardware. Unfortunately, both are highly manual and error-prone. In this paper, we introduce a systematic graph-based approach to analyze firmware binaries and determine which functions need to be replaced. Our approach is customizable to balance the fidelity of the emulation and the amount of effort it would take to achieve the emulation by modeling functions. We run our algorithm across a number of firmware binaries and show its ability to capture and remove a large majority of hardware dependencies.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Making Unikernels Rejuvenatable 朝着使Unikernels返老返老的方向发展
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00062
Takeru Wada, Hiroshi Yamada
Software rejuvenation is a simple but powerful method for improving the availability of computer systems. Software rejuvenation faces a challenge to apply itself to a new type of application, the Unikernel which is a library OS where OS functions are linked to the target applications like libraries. Since the unikernel layer is tightly coupled to applications, rebooting the unikernel layers involves the applications' reboots, eliminating and reconstructing memory contents unrelated to the unikernels. This paper presents VampOS that allows us to rejuve-nate the only unikernellayer. VampOS performs component-level rejuvenation of the unikernel by logging interactions between the components and replaying them to restarted components while simultaneously keeping the linked applications running. We implemented a prototype of VampOS, not well-optimized, on Unikraft 0.8.0 and the experimental results show that its runtime overhead is up to 13.6x and the VampOS-linked SQLite mitigates the effects of the intentionally injected memory leak bugs without any downtime. This paper also describes the next directions for efficient rejuvenation of the unikernel-linked applications.
软件复兴是一种简单而有力的提高计算机系统可用性的方法。软件复兴面临着将自身应用于一种新型应用程序的挑战,Unikernel是一种库操作系统,其中操作系统函数与库等目标应用程序相关联。由于单内核层与应用程序紧密耦合,重新引导单内核层涉及到应用程序的重新引导,消除和重建与unikernels无关的内存内容。本文介绍了VampOS,它允许我们恢复唯一的非内核层。VampOS通过记录组件之间的交互并将它们重放给重新启动的组件,同时保持链接的应用程序运行,从而执行组件级的unikernel复兴。我们在Unikraft 0.8.0上实现了一个没有经过优化的VampOS原型,实验结果表明,它的运行时开销高达13.6倍,并且VampOS链接的SQLite减轻了故意注入的内存泄漏错误的影响,而没有任何停机时间。本文还描述了有效地更新与内核相关的应用程序的下一个方向。
{"title":"Towards Making Unikernels Rejuvenatable","authors":"Takeru Wada, Hiroshi Yamada","doi":"10.1109/ISSREW55968.2022.00062","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00062","url":null,"abstract":"Software rejuvenation is a simple but powerful method for improving the availability of computer systems. Software rejuvenation faces a challenge to apply itself to a new type of application, the Unikernel which is a library OS where OS functions are linked to the target applications like libraries. Since the unikernel layer is tightly coupled to applications, rebooting the unikernel layers involves the applications' reboots, eliminating and reconstructing memory contents unrelated to the unikernels. This paper presents VampOS that allows us to rejuve-nate the only unikernellayer. VampOS performs component-level rejuvenation of the unikernel by logging interactions between the components and replaying them to restarted components while simultaneously keeping the linked applications running. We implemented a prototype of VampOS, not well-optimized, on Unikraft 0.8.0 and the experimental results show that its runtime overhead is up to 13.6x and the VampOS-linked SQLite mitigates the effects of the intentionally injected memory leak bugs without any downtime. This paper also describes the next directions for efficient rejuvenation of the unikernel-linked applications.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems 深度强化学习系统的模糊化
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00049
Tiancheng Li, Xiaohui Wan, Muhammed Murat Özbek
In recent years, deep reinforcement learning (DRL) technology has developed rapidly, and the application of DRL has been extended to many fields such as game gaming, au-tonomous driving, financial transactions, and robot control. As DRL applications expand and enrich, quality assurance of DRL software is increasingly important, especially in safety -critical areas. Therefore, it is necessary and urgent to adequately test DRL models to ensure the reliability and security of DRL systems. However, due to fundamental differences, traditional software testing methods cannot be directly applied to D RL systems. To bridge this gap, we introduce a new DRL system testing framework in this proposal, which aims to generate various test cases that can cause D RL systems to fail. The proposed testing framework is the first fuzzing framework for systematically testing DRL systems which we call AgentFuzz.
近年来,深度强化学习(deep reinforcement learning, DRL)技术发展迅速,其应用已经扩展到游戏、自动驾驶、金融交易、机器人控制等多个领域。随着DRL应用的扩展和丰富,DRL软件的质量保证变得越来越重要,特别是在安全关键领域。因此,为了保证DRL系统的可靠性和安全性,对DRL模型进行充分的测试是必要和迫切的。然而,由于两者的本质区别,传统的软件测试方法并不能直接应用于RL系统。为了弥补这一差距,我们在本提案中引入了一个新的DRL系统测试框架,该框架旨在生成各种可能导致DRL系统失败的测试用例。提出的测试框架是第一个用于系统测试DRL系统的模糊测试框架,我们称之为AgentFuzz。
{"title":"AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems","authors":"Tiancheng Li, Xiaohui Wan, Muhammed Murat Özbek","doi":"10.1109/ISSREW55968.2022.00049","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00049","url":null,"abstract":"In recent years, deep reinforcement learning (DRL) technology has developed rapidly, and the application of DRL has been extended to many fields such as game gaming, au-tonomous driving, financial transactions, and robot control. As DRL applications expand and enrich, quality assurance of DRL software is increasingly important, especially in safety -critical areas. Therefore, it is necessary and urgent to adequately test DRL models to ensure the reliability and security of DRL systems. However, due to fundamental differences, traditional software testing methods cannot be directly applied to D RL systems. To bridge this gap, we introduce a new DRL system testing framework in this proposal, which aims to generate various test cases that can cause D RL systems to fail. The proposed testing framework is the first fuzzing framework for systematically testing DRL systems which we call AgentFuzz.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity Research 哨兵:一个多机构企业规模的数据驱动网络安全研究平台
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00075
Alastair Nottingham, Molly Buchanan, Mark Gardner, Jason Hiser, J. Davidson
Current cybersecurity research is constrained by the general scarcity of large, realistic, labeled network traffic datasets. To address said scarcity, this paper introduces Sentinel: a multi-enterprise scientific instrument developed to support data-driven cybersecurity research. Sentinel provides researchers access to virtual computing infrastructure and petabytes of data collected over several years from network sensors at two large, disjoint educational institutions - the University of Virginia and Virginia Tech. The network dataset is supplemented by multi-modal malware activity logs generated by attack recreation exercises which realistically integrate ground truth into collected edge sensor data. To mitigate risks associated with providing access to enterprise network sensor logs, Sentinel uses a combination of a code-to-data policy, data usage agreements, and pattern-preserving anonymization. Sentinel has been used as part of a government-funded effort to investigate new machine learning algorithms, cybersecurity forensics, and data retention techniques.
目前的网络安全研究受到普遍缺乏大型、现实、有标签的网络流量数据集的限制。为了解决上述问题,本文介绍了Sentinel:一种多企业科学仪器,用于支持数据驱动的网络安全研究。Sentinel为研究人员提供了访问虚拟计算基础设施和数年来从弗吉尼亚大学和弗吉尼亚理工大学这两家大型、脱节的教育机构的网络传感器收集的pb级数据的机会。网络数据集由攻击再现练习生成的多模态恶意软件活动日志补充,这些活动日志实际地将地面真相整合到收集的边缘传感器数据中。为了降低与提供对企业网络传感器日志的访问相关的风险,Sentinel使用了代码到数据策略、数据使用协议和模式保留匿名化的组合。Sentinel已被用作政府资助项目的一部分,用于研究新的机器学习算法、网络安全取证和数据保留技术。
{"title":"Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity Research","authors":"Alastair Nottingham, Molly Buchanan, Mark Gardner, Jason Hiser, J. Davidson","doi":"10.1109/ISSREW55968.2022.00075","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00075","url":null,"abstract":"Current cybersecurity research is constrained by the general scarcity of large, realistic, labeled network traffic datasets. To address said scarcity, this paper introduces Sentinel: a multi-enterprise scientific instrument developed to support data-driven cybersecurity research. Sentinel provides researchers access to virtual computing infrastructure and petabytes of data collected over several years from network sensors at two large, disjoint educational institutions - the University of Virginia and Virginia Tech. The network dataset is supplemented by multi-modal malware activity logs generated by attack recreation exercises which realistically integrate ground truth into collected edge sensor data. To mitigate risks associated with providing access to enterprise network sensor logs, Sentinel uses a combination of a code-to-data policy, data usage agreements, and pattern-preserving anonymization. Sentinel has been used as part of a government-funded effort to investigate new machine learning algorithms, cybersecurity forensics, and data retention techniques.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125298376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cache Antagonists Identification: A Practice from Alibaba Colocation Datacenter 缓存拮抗剂识别:来自阿里巴巴托管数据中心的实践
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00031
Kangjin Wang, Chuanjia Hou, Ying Li, Yaoyong Dou, Cheng Wang, Yang Wen, Jie Yao, Liping Zhang
Colocating latency-critical (LC) jobs and best-effort (BE) jobs on a host effectively improve resource efficiency in modern datacenters. But it increases resource contention between jobs, which seriously affects job performance. In Alibaba's real- world LC- BE colocation datacenters, we observed that cache is one of the most contended resources in the CPU. When cache contention occurs, identifying the antagonists that caused cache resource contention is the first step to mitigate cache contention, called cache antagonists identification (CAl). However, it is chal-lenging to identify cache antagonists because cache contention is difficult to observe and quantify. In this paper, we first propose cache usage graph (CUG) to finely characterize cache usage of jobs in the multiple CPU microarchitectural hierarchies and locations, and we provide a monitoring tool to collect “per-container-per-logic CPU” Ll/2/3 cache misses and build CUG. Then we propose a CUG-based CAl approach, $mu$ Tactic. $mu$ Tactic leverages machine learning models to quantify the cache contention on every cache hierarchy, then reasons out the cache antagonists with CUG. Experiments in production datacenters show that $mu$ Tactic has a high precision (85+%) and low cost (32 ms), which are better than state-of-the-art approaches.
在现代数据中心中,将延迟关键型(LC)作业和最佳努力型(BE)作业放在一台主机上可以有效地提高资源效率。但它增加了作业之间的资源争用,严重影响了作业绩效。在阿里巴巴的LC- BE托管数据中心中,我们观察到缓存是CPU中竞争最激烈的资源之一。当发生缓存争用时,识别导致缓存资源争用的拮抗剂是缓解缓存争用的第一步,称为缓存拮抗剂识别(CAl)。然而,由于缓存竞争难以观察和量化,因此识别缓存拮抗剂具有挑战性。在本文中,我们首先提出了缓存使用图(CUG)来精细表征多个CPU微体系结构层次和位置中作业的缓存使用情况,并提供了一个监控工具来收集“每个容器每个逻辑CPU”的Ll/2/3缓存缺失并构建CUG。然后,我们提出了一种基于cug的CAl方法,$mu$ tactical。$mu$ tactical利用机器学习模型来量化每个缓存层次结构上的缓存争用,然后用CUG推断出缓存拮抗剂。在生产数据中心的实验表明,$mu$ tactical具有高精度(85+%)和低成本(32 ms),优于最先进的方法。
{"title":"Cache Antagonists Identification: A Practice from Alibaba Colocation Datacenter","authors":"Kangjin Wang, Chuanjia Hou, Ying Li, Yaoyong Dou, Cheng Wang, Yang Wen, Jie Yao, Liping Zhang","doi":"10.1109/ISSREW55968.2022.00031","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00031","url":null,"abstract":"Colocating latency-critical (LC) jobs and best-effort (BE) jobs on a host effectively improve resource efficiency in modern datacenters. But it increases resource contention between jobs, which seriously affects job performance. In Alibaba's real- world LC- BE colocation datacenters, we observed that cache is one of the most contended resources in the CPU. When cache contention occurs, identifying the antagonists that caused cache resource contention is the first step to mitigate cache contention, called cache antagonists identification (CAl). However, it is chal-lenging to identify cache antagonists because cache contention is difficult to observe and quantify. In this paper, we first propose cache usage graph (CUG) to finely characterize cache usage of jobs in the multiple CPU microarchitectural hierarchies and locations, and we provide a monitoring tool to collect “per-container-per-logic CPU” Ll/2/3 cache misses and build CUG. Then we propose a CUG-based CAl approach, $mu$ Tactic. $mu$ Tactic leverages machine learning models to quantify the cache contention on every cache hierarchy, then reasons out the cache antagonists with CUG. Experiments in production datacenters show that $mu$ Tactic has a high precision (85+%) and low cost (32 ms), which are better than state-of-the-art approaches.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121414988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Domain Specific Language for the ARINC 653 Specification arinc653规范的领域特定语言
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00073
Ikram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo
With the introduction of the integrated modular avionics (IMA), recent trends in avionics are to integrate dif-ferent software applications on the same hardware platform. In this context, the underlying platform embodied by a real-time operating system (RTOS) must be designed in compliance with the ARIN C 653 specification. ARIN C 653 defines an application executive (APEX) interface between the RTOS and avionics applications within IMA architecture. It specifies requirements of an environment that provides partitioning, i.e. separation of applications to ensure fault containment and ease of verification. Designing an RTOS that complies with ARIN C 653 is costly and requires significant efforts. In this paper, we introduce a domain-specific language (DSL) that supports the specification of an ARINC653-compliant RTOS. In particular, we consider ARINC 653 as a set of generic and high-level requirements, and we use model-driven technologies to specify these requirements in the form of a metamodel. The ARINC metamodel aims at supporting and reducing the cost of certification by reusing the metamodel across multiple RTOS development projects. Other benefits of the ARIN C metamodel include generating data required for certification such as ARIN C configuration tables and test data.
随着集成模块化航空电子系统(IMA)的引入,航空电子系统的最新趋势是在同一硬件平台上集成不同的软件应用程序。在这种情况下,实时操作系统(RTOS)所包含的底层平台必须按照ARIN C 653规范进行设计。ARIN C 653定义了IMA体系结构中RTOS和航空电子应用程序之间的应用程序执行(APEX)接口。它指定了提供分区的环境的需求,即应用程序的分离,以确保故障控制和易于验证。设计一个符合ARIN C 653的实时操作系统是昂贵的,需要付出巨大的努力。在本文中,我们介绍了一种支持arinc653兼容的RTOS规范的领域特定语言(DSL)。特别地,我们将ARINC 653视为一组通用和高级需求,并且我们使用模型驱动技术以元模型的形式指定这些需求。ARINC元模型旨在通过跨多个RTOS开发项目重用元模型来支持和降低认证成本。ARIN元模型的其他好处包括生成认证所需的数据,如ARIN配置表和测试数据。
{"title":"A Domain Specific Language for the ARINC 653 Specification","authors":"Ikram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo","doi":"10.1109/ISSREW55968.2022.00073","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00073","url":null,"abstract":"With the introduction of the integrated modular avionics (IMA), recent trends in avionics are to integrate dif-ferent software applications on the same hardware platform. In this context, the underlying platform embodied by a real-time operating system (RTOS) must be designed in compliance with the ARIN C 653 specification. ARIN C 653 defines an application executive (APEX) interface between the RTOS and avionics applications within IMA architecture. It specifies requirements of an environment that provides partitioning, i.e. separation of applications to ensure fault containment and ease of verification. Designing an RTOS that complies with ARIN C 653 is costly and requires significant efforts. In this paper, we introduce a domain-specific language (DSL) that supports the specification of an ARINC653-compliant RTOS. In particular, we consider ARINC 653 as a set of generic and high-level requirements, and we use model-driven technologies to specify these requirements in the form of a metamodel. The ARINC metamodel aims at supporting and reducing the cost of certification by reusing the metamodel across multiple RTOS development projects. Other benefits of the ARIN C metamodel include generating data required for certification such as ARIN C configuration tables and test data.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISSRE 2022 Industry Track Committee: ISSREW 2022 行业跟踪委员会:ISSREW 2022
Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00007
{"title":"ISSRE 2022 Industry Track Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00007","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00007","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TensorFI+: A Scalable Fault Injection Framework for Modern Deep Learning Neural Networks TensorFI+:现代深度学习神经网络的可扩展故障注入框架
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00074
Sabuj Laskar, Md. Hasanur Rahman, Guanpeng Li
Deep Neural Networks (DNNs) are widely deployed in various applications such as autonomous vehicles, healthcare, space applications. TensorFlow is the most popular framework for developing DNN models. After the release of TensorFlow 2, a software-level fault injector named TensorFI is developed for TensorFlow 2 models, which is limited to inject faults only in sequential models. However, most popular DNN models today are non-sequential. In this paper, we are the first to propose TensorFI+, an extension to TensorFI to support for non-sequential models so that developers can assess resiliency of any DNN model developed with TensorFlow 2. For the evaluation, we conduct a large-scale fault injection experiment on 30 sequential and non-sequential models with three popularly used classification datasets. We observe that our tool can inject faults in any layer for any sequential or non-sequential DNN model, and fault-injected inference incurs only 7.62 x overhead compared to fault-free inference.
深度神经网络(dnn)广泛应用于自动驾驶汽车、医疗保健、空间应用等各种应用中。TensorFlow是开发深度神经网络模型最流行的框架。TensorFlow 2发布后,针对TensorFlow 2模型开发了软件级故障注入器TensorFI,该注入器仅限于在顺序模型中注入故障。然而,当今最流行的深度神经网络模型是非顺序的。在本文中,我们首先提出了TensorFI+,这是TensorFI的扩展,以支持非顺序模型,以便开发人员可以评估使用TensorFlow 2开发的任何DNN模型的弹性。为了进行评价,我们使用三种常用的分类数据集对30个顺序和非顺序模型进行了大规模故障注入实验。我们观察到,我们的工具可以在任何顺序或非顺序DNN模型的任何层注入故障,并且与无故障推理相比,故障注入推理仅产生7.62倍的开销。
{"title":"TensorFI+: A Scalable Fault Injection Framework for Modern Deep Learning Neural Networks","authors":"Sabuj Laskar, Md. Hasanur Rahman, Guanpeng Li","doi":"10.1109/ISSREW55968.2022.00074","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00074","url":null,"abstract":"Deep Neural Networks (DNNs) are widely deployed in various applications such as autonomous vehicles, healthcare, space applications. TensorFlow is the most popular framework for developing DNN models. After the release of TensorFlow 2, a software-level fault injector named TensorFI is developed for TensorFlow 2 models, which is limited to inject faults only in sequential models. However, most popular DNN models today are non-sequential. In this paper, we are the first to propose TensorFI+, an extension to TensorFI to support for non-sequential models so that developers can assess resiliency of any DNN model developed with TensorFlow 2. For the evaluation, we conduct a large-scale fault injection experiment on 30 sequential and non-sequential models with three popularly used classification datasets. We observe that our tool can inject faults in any layer for any sequential or non-sequential DNN model, and fault-injected inference incurs only 7.62 x overhead compared to fault-free inference.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134333436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1