首页 > 最新文献

2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
DNA-based Secret Sharing and Hiding in Dispersed Computing 分布式计算中基于dna的秘密共享与隐藏
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00054
M. Ogiela, U. Ogiela
In this paper will be described a new security protocol for secret sharing and hiding, which use selected personal features. Such technique allows to create human-oriented personalized security protocols dedicated for particular users. Proposed method may be applied in dispersed computing systems, where secret data should be divided into particular number of parts.
本文将描述一种新的利用个人特征进行秘密共享和隐藏的安全协议。这种技术允许为特定用户创建面向人类的个性化安全协议。该方法可应用于分散计算系统中,需要将秘密数据划分为特定数量的部分。
{"title":"DNA-based Secret Sharing and Hiding in Dispersed Computing","authors":"M. Ogiela, U. Ogiela","doi":"10.1109/ISSREW55968.2022.00054","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00054","url":null,"abstract":"In this paper will be described a new security protocol for secret sharing and hiding, which use selected personal features. Such technique allows to create human-oriented personalized security protocols dedicated for particular users. Proposed method may be applied in dispersed computing systems, where secret data should be divided into particular number of parts.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116585198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software rejuvenation and runtime reliability monitoring 软件更新和运行时可靠性监控
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00063
A. Fantechi, G. Gori, Marco Papini
The overall system reliability of complex Cyber Physical systems is contributed both by hardware reliability and software reliability. The former can be often increased through fault-tolerant mechanisms and architectures, while the latter can take advantage of a suitable rejuvenation policy. These characteristics call for flexible runtime safety checks of system executions that go beyond conventional runtime mon-itoring of pre-programmed safety conditions, also in order to minimize maintenance costs. Defining a satisfying monitoring model for complex systems is still a challenge. In this paper, we investigate the application of a novel approach, named Reliability Based Monitoring (RBM), that allows for a flexible runtime monitoring of software reliability in complex systems. The approach leverages a hierarchical reliability model periodically applied to runtime diagnostics data: this allows to dynamically plan rejuvenation activities that are able to prevent software failures.
复杂网络物理系统的整体可靠性是由硬件可靠性和软件可靠性共同贡献的。前者通常可以通过容错机制和体系结构来增加,而后者可以利用适当的恢复策略。这些特点要求对系统执行进行灵活的运行时安全检查,这超越了传统的预编程安全条件的运行时监控,也是为了最大限度地降低维护成本。为复杂系统定义一个令人满意的监视模型仍然是一个挑战。在本文中,我们研究了一种新方法的应用,称为基于可靠性的监控(RBM),它允许在复杂系统中灵活地运行时监控软件的可靠性。该方法利用定期应用于运行时诊断数据的分层可靠性模型:这允许动态规划能够防止软件故障的恢复活动。
{"title":"Software rejuvenation and runtime reliability monitoring","authors":"A. Fantechi, G. Gori, Marco Papini","doi":"10.1109/ISSREW55968.2022.00063","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00063","url":null,"abstract":"The overall system reliability of complex Cyber Physical systems is contributed both by hardware reliability and software reliability. The former can be often increased through fault-tolerant mechanisms and architectures, while the latter can take advantage of a suitable rejuvenation policy. These characteristics call for flexible runtime safety checks of system executions that go beyond conventional runtime mon-itoring of pre-programmed safety conditions, also in order to minimize maintenance costs. Defining a satisfying monitoring model for complex systems is still a challenge. In this paper, we investigate the application of a novel approach, named Reliability Based Monitoring (RBM), that allows for a flexible runtime monitoring of software reliability in complex systems. The approach leverages a hierarchical reliability model periodically applied to runtime diagnostics data: this allows to dynamically plan rejuvenation activities that are able to prevent software failures.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Code Quality Prediction Under Super Extreme Class Imbalance 超极端类不平衡下的代码质量预测
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00047
Noah Lee, Rui Abreu, Nachiappan Nagappan
Predicting the quality of software in the early phases of the development life cycle has various benefits to an organization's bottom line with wide applicability across industry and government. Yet, developing robust software quality prediction models in practice is a challenging task due to “super” extreme class imbalance. In this paper, we present our work on a code quality prediction framework, we call Automated Incremental Effort Investments (AIEl), to fasten the process of going from data to a performant model under super extreme class imbalance. Experiments on a large scale real-world dataset, from Meta Platforms, show that the proposed approach competes with or outperforms state-of-the art shallow and deep learning approaches. We evaluate the practical significance of the model predictions on test case prioritization efficiency, where AIEl achieves the top rank reducing code review time by 2.5 % and test case resource utilization by 9.3%.
在开发生命周期的早期阶段预测软件的质量对组织的底线有各种各样的好处,并且在行业和政府之间具有广泛的适用性。然而,由于“超级”极端的类不平衡,在实践中开发健壮的软件质量预测模型是一项具有挑战性的任务。在本文中,我们介绍了我们在代码质量预测框架上的工作,我们称之为自动化增量努力投资(AIEl),以加快在超级极端类不平衡下从数据到性能模型的过程。在Meta平台的大规模真实数据集上进行的实验表明,所提出的方法与最先进的浅学习和深度学习方法竞争或优于最先进的浅学习方法。我们评估了模型预测对测试用例优先级效率的实际意义,其中AIEl达到了最高排名,减少了2.5%的代码审查时间和9.3%的测试用例资源利用率。
{"title":"Code Quality Prediction Under Super Extreme Class Imbalance","authors":"Noah Lee, Rui Abreu, Nachiappan Nagappan","doi":"10.1109/ISSREW55968.2022.00047","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00047","url":null,"abstract":"Predicting the quality of software in the early phases of the development life cycle has various benefits to an organization's bottom line with wide applicability across industry and government. Yet, developing robust software quality prediction models in practice is a challenging task due to “super” extreme class imbalance. In this paper, we present our work on a code quality prediction framework, we call Automated Incremental Effort Investments (AIEl), to fasten the process of going from data to a performant model under super extreme class imbalance. Experiments on a large scale real-world dataset, from Meta Platforms, show that the proposed approach competes with or outperforms state-of-the art shallow and deep learning approaches. We evaluate the practical significance of the model predictions on test case prioritization efficiency, where AIEl achieves the top rank reducing code review time by 2.5 % and test case resource utilization by 9.3%.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115807529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity Research 哨兵:一个多机构企业规模的数据驱动网络安全研究平台
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00075
Alastair Nottingham, Molly Buchanan, Mark Gardner, Jason Hiser, J. Davidson
Current cybersecurity research is constrained by the general scarcity of large, realistic, labeled network traffic datasets. To address said scarcity, this paper introduces Sentinel: a multi-enterprise scientific instrument developed to support data-driven cybersecurity research. Sentinel provides researchers access to virtual computing infrastructure and petabytes of data collected over several years from network sensors at two large, disjoint educational institutions - the University of Virginia and Virginia Tech. The network dataset is supplemented by multi-modal malware activity logs generated by attack recreation exercises which realistically integrate ground truth into collected edge sensor data. To mitigate risks associated with providing access to enterprise network sensor logs, Sentinel uses a combination of a code-to-data policy, data usage agreements, and pattern-preserving anonymization. Sentinel has been used as part of a government-funded effort to investigate new machine learning algorithms, cybersecurity forensics, and data retention techniques.
目前的网络安全研究受到普遍缺乏大型、现实、有标签的网络流量数据集的限制。为了解决上述问题,本文介绍了Sentinel:一种多企业科学仪器,用于支持数据驱动的网络安全研究。Sentinel为研究人员提供了访问虚拟计算基础设施和数年来从弗吉尼亚大学和弗吉尼亚理工大学这两家大型、脱节的教育机构的网络传感器收集的pb级数据的机会。网络数据集由攻击再现练习生成的多模态恶意软件活动日志补充,这些活动日志实际地将地面真相整合到收集的边缘传感器数据中。为了降低与提供对企业网络传感器日志的访问相关的风险,Sentinel使用了代码到数据策略、数据使用协议和模式保留匿名化的组合。Sentinel已被用作政府资助项目的一部分,用于研究新的机器学习算法、网络安全取证和数据保留技术。
{"title":"Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity Research","authors":"Alastair Nottingham, Molly Buchanan, Mark Gardner, Jason Hiser, J. Davidson","doi":"10.1109/ISSREW55968.2022.00075","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00075","url":null,"abstract":"Current cybersecurity research is constrained by the general scarcity of large, realistic, labeled network traffic datasets. To address said scarcity, this paper introduces Sentinel: a multi-enterprise scientific instrument developed to support data-driven cybersecurity research. Sentinel provides researchers access to virtual computing infrastructure and petabytes of data collected over several years from network sensors at two large, disjoint educational institutions - the University of Virginia and Virginia Tech. The network dataset is supplemented by multi-modal malware activity logs generated by attack recreation exercises which realistically integrate ground truth into collected edge sensor data. To mitigate risks associated with providing access to enterprise network sensor logs, Sentinel uses a combination of a code-to-data policy, data usage agreements, and pattern-preserving anonymization. Sentinel has been used as part of a government-funded effort to investigate new machine learning algorithms, cybersecurity forensics, and data retention techniques.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125298376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Making Unikernels Rejuvenatable 朝着使Unikernels返老返老的方向发展
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00062
Takeru Wada, Hiroshi Yamada
Software rejuvenation is a simple but powerful method for improving the availability of computer systems. Software rejuvenation faces a challenge to apply itself to a new type of application, the Unikernel which is a library OS where OS functions are linked to the target applications like libraries. Since the unikernel layer is tightly coupled to applications, rebooting the unikernel layers involves the applications' reboots, eliminating and reconstructing memory contents unrelated to the unikernels. This paper presents VampOS that allows us to rejuve-nate the only unikernellayer. VampOS performs component-level rejuvenation of the unikernel by logging interactions between the components and replaying them to restarted components while simultaneously keeping the linked applications running. We implemented a prototype of VampOS, not well-optimized, on Unikraft 0.8.0 and the experimental results show that its runtime overhead is up to 13.6x and the VampOS-linked SQLite mitigates the effects of the intentionally injected memory leak bugs without any downtime. This paper also describes the next directions for efficient rejuvenation of the unikernel-linked applications.
软件复兴是一种简单而有力的提高计算机系统可用性的方法。软件复兴面临着将自身应用于一种新型应用程序的挑战,Unikernel是一种库操作系统,其中操作系统函数与库等目标应用程序相关联。由于单内核层与应用程序紧密耦合,重新引导单内核层涉及到应用程序的重新引导,消除和重建与unikernels无关的内存内容。本文介绍了VampOS,它允许我们恢复唯一的非内核层。VampOS通过记录组件之间的交互并将它们重放给重新启动的组件,同时保持链接的应用程序运行,从而执行组件级的unikernel复兴。我们在Unikraft 0.8.0上实现了一个没有经过优化的VampOS原型,实验结果表明,它的运行时开销高达13.6倍,并且VampOS链接的SQLite减轻了故意注入的内存泄漏错误的影响,而没有任何停机时间。本文还描述了有效地更新与内核相关的应用程序的下一个方向。
{"title":"Towards Making Unikernels Rejuvenatable","authors":"Takeru Wada, Hiroshi Yamada","doi":"10.1109/ISSREW55968.2022.00062","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00062","url":null,"abstract":"Software rejuvenation is a simple but powerful method for improving the availability of computer systems. Software rejuvenation faces a challenge to apply itself to a new type of application, the Unikernel which is a library OS where OS functions are linked to the target applications like libraries. Since the unikernel layer is tightly coupled to applications, rebooting the unikernel layers involves the applications' reboots, eliminating and reconstructing memory contents unrelated to the unikernels. This paper presents VampOS that allows us to rejuve-nate the only unikernellayer. VampOS performs component-level rejuvenation of the unikernel by logging interactions between the components and replaying them to restarted components while simultaneously keeping the linked applications running. We implemented a prototype of VampOS, not well-optimized, on Unikraft 0.8.0 and the experimental results show that its runtime overhead is up to 13.6x and the VampOS-linked SQLite mitigates the effects of the intentionally injected memory leak bugs without any downtime. This paper also describes the next directions for efficient rejuvenation of the unikernel-linked applications.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cache Antagonists Identification: A Practice from Alibaba Colocation Datacenter 缓存拮抗剂识别:来自阿里巴巴托管数据中心的实践
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00031
Kangjin Wang, Chuanjia Hou, Ying Li, Yaoyong Dou, Cheng Wang, Yang Wen, Jie Yao, Liping Zhang
Colocating latency-critical (LC) jobs and best-effort (BE) jobs on a host effectively improve resource efficiency in modern datacenters. But it increases resource contention between jobs, which seriously affects job performance. In Alibaba's real- world LC- BE colocation datacenters, we observed that cache is one of the most contended resources in the CPU. When cache contention occurs, identifying the antagonists that caused cache resource contention is the first step to mitigate cache contention, called cache antagonists identification (CAl). However, it is chal-lenging to identify cache antagonists because cache contention is difficult to observe and quantify. In this paper, we first propose cache usage graph (CUG) to finely characterize cache usage of jobs in the multiple CPU microarchitectural hierarchies and locations, and we provide a monitoring tool to collect “per-container-per-logic CPU” Ll/2/3 cache misses and build CUG. Then we propose a CUG-based CAl approach, $mu$ Tactic. $mu$ Tactic leverages machine learning models to quantify the cache contention on every cache hierarchy, then reasons out the cache antagonists with CUG. Experiments in production datacenters show that $mu$ Tactic has a high precision (85+%) and low cost (32 ms), which are better than state-of-the-art approaches.
在现代数据中心中,将延迟关键型(LC)作业和最佳努力型(BE)作业放在一台主机上可以有效地提高资源效率。但它增加了作业之间的资源争用,严重影响了作业绩效。在阿里巴巴的LC- BE托管数据中心中,我们观察到缓存是CPU中竞争最激烈的资源之一。当发生缓存争用时,识别导致缓存资源争用的拮抗剂是缓解缓存争用的第一步,称为缓存拮抗剂识别(CAl)。然而,由于缓存竞争难以观察和量化,因此识别缓存拮抗剂具有挑战性。在本文中,我们首先提出了缓存使用图(CUG)来精细表征多个CPU微体系结构层次和位置中作业的缓存使用情况,并提供了一个监控工具来收集“每个容器每个逻辑CPU”的Ll/2/3缓存缺失并构建CUG。然后,我们提出了一种基于cug的CAl方法,$mu$ tactical。$mu$ tactical利用机器学习模型来量化每个缓存层次结构上的缓存争用,然后用CUG推断出缓存拮抗剂。在生产数据中心的实验表明,$mu$ tactical具有高精度(85+%)和低成本(32 ms),优于最先进的方法。
{"title":"Cache Antagonists Identification: A Practice from Alibaba Colocation Datacenter","authors":"Kangjin Wang, Chuanjia Hou, Ying Li, Yaoyong Dou, Cheng Wang, Yang Wen, Jie Yao, Liping Zhang","doi":"10.1109/ISSREW55968.2022.00031","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00031","url":null,"abstract":"Colocating latency-critical (LC) jobs and best-effort (BE) jobs on a host effectively improve resource efficiency in modern datacenters. But it increases resource contention between jobs, which seriously affects job performance. In Alibaba's real- world LC- BE colocation datacenters, we observed that cache is one of the most contended resources in the CPU. When cache contention occurs, identifying the antagonists that caused cache resource contention is the first step to mitigate cache contention, called cache antagonists identification (CAl). However, it is chal-lenging to identify cache antagonists because cache contention is difficult to observe and quantify. In this paper, we first propose cache usage graph (CUG) to finely characterize cache usage of jobs in the multiple CPU microarchitectural hierarchies and locations, and we provide a monitoring tool to collect “per-container-per-logic CPU” Ll/2/3 cache misses and build CUG. Then we propose a CUG-based CAl approach, $mu$ Tactic. $mu$ Tactic leverages machine learning models to quantify the cache contention on every cache hierarchy, then reasons out the cache antagonists with CUG. Experiments in production datacenters show that $mu$ Tactic has a high precision (85+%) and low cost (32 ms), which are better than state-of-the-art approaches.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121414988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems 深度强化学习系统的模糊化
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00049
Tiancheng Li, Xiaohui Wan, Muhammed Murat Özbek
In recent years, deep reinforcement learning (DRL) technology has developed rapidly, and the application of DRL has been extended to many fields such as game gaming, au-tonomous driving, financial transactions, and robot control. As DRL applications expand and enrich, quality assurance of DRL software is increasingly important, especially in safety -critical areas. Therefore, it is necessary and urgent to adequately test DRL models to ensure the reliability and security of DRL systems. However, due to fundamental differences, traditional software testing methods cannot be directly applied to D RL systems. To bridge this gap, we introduce a new DRL system testing framework in this proposal, which aims to generate various test cases that can cause D RL systems to fail. The proposed testing framework is the first fuzzing framework for systematically testing DRL systems which we call AgentFuzz.
近年来,深度强化学习(deep reinforcement learning, DRL)技术发展迅速,其应用已经扩展到游戏、自动驾驶、金融交易、机器人控制等多个领域。随着DRL应用的扩展和丰富,DRL软件的质量保证变得越来越重要,特别是在安全关键领域。因此,为了保证DRL系统的可靠性和安全性,对DRL模型进行充分的测试是必要和迫切的。然而,由于两者的本质区别,传统的软件测试方法并不能直接应用于RL系统。为了弥补这一差距,我们在本提案中引入了一个新的DRL系统测试框架,该框架旨在生成各种可能导致DRL系统失败的测试用例。提出的测试框架是第一个用于系统测试DRL系统的模糊测试框架,我们称之为AgentFuzz。
{"title":"AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems","authors":"Tiancheng Li, Xiaohui Wan, Muhammed Murat Özbek","doi":"10.1109/ISSREW55968.2022.00049","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00049","url":null,"abstract":"In recent years, deep reinforcement learning (DRL) technology has developed rapidly, and the application of DRL has been extended to many fields such as game gaming, au-tonomous driving, financial transactions, and robot control. As DRL applications expand and enrich, quality assurance of DRL software is increasingly important, especially in safety -critical areas. Therefore, it is necessary and urgent to adequately test DRL models to ensure the reliability and security of DRL systems. However, due to fundamental differences, traditional software testing methods cannot be directly applied to D RL systems. To bridge this gap, we introduce a new DRL system testing framework in this proposal, which aims to generate various test cases that can cause D RL systems to fail. The proposed testing framework is the first fuzzing framework for systematically testing DRL systems which we call AgentFuzz.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Domain Specific Language for the ARINC 653 Specification arinc653规范的领域特定语言
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00073
Ikram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo
With the introduction of the integrated modular avionics (IMA), recent trends in avionics are to integrate dif-ferent software applications on the same hardware platform. In this context, the underlying platform embodied by a real-time operating system (RTOS) must be designed in compliance with the ARIN C 653 specification. ARIN C 653 defines an application executive (APEX) interface between the RTOS and avionics applications within IMA architecture. It specifies requirements of an environment that provides partitioning, i.e. separation of applications to ensure fault containment and ease of verification. Designing an RTOS that complies with ARIN C 653 is costly and requires significant efforts. In this paper, we introduce a domain-specific language (DSL) that supports the specification of an ARINC653-compliant RTOS. In particular, we consider ARINC 653 as a set of generic and high-level requirements, and we use model-driven technologies to specify these requirements in the form of a metamodel. The ARINC metamodel aims at supporting and reducing the cost of certification by reusing the metamodel across multiple RTOS development projects. Other benefits of the ARIN C metamodel include generating data required for certification such as ARIN C configuration tables and test data.
随着集成模块化航空电子系统(IMA)的引入,航空电子系统的最新趋势是在同一硬件平台上集成不同的软件应用程序。在这种情况下,实时操作系统(RTOS)所包含的底层平台必须按照ARIN C 653规范进行设计。ARIN C 653定义了IMA体系结构中RTOS和航空电子应用程序之间的应用程序执行(APEX)接口。它指定了提供分区的环境的需求,即应用程序的分离,以确保故障控制和易于验证。设计一个符合ARIN C 653的实时操作系统是昂贵的,需要付出巨大的努力。在本文中,我们介绍了一种支持arinc653兼容的RTOS规范的领域特定语言(DSL)。特别地,我们将ARINC 653视为一组通用和高级需求,并且我们使用模型驱动技术以元模型的形式指定这些需求。ARINC元模型旨在通过跨多个RTOS开发项目重用元模型来支持和降低认证成本。ARIN元模型的其他好处包括生成认证所需的数据,如ARIN配置表和测试数据。
{"title":"A Domain Specific Language for the ARINC 653 Specification","authors":"Ikram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo","doi":"10.1109/ISSREW55968.2022.00073","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00073","url":null,"abstract":"With the introduction of the integrated modular avionics (IMA), recent trends in avionics are to integrate dif-ferent software applications on the same hardware platform. In this context, the underlying platform embodied by a real-time operating system (RTOS) must be designed in compliance with the ARIN C 653 specification. ARIN C 653 defines an application executive (APEX) interface between the RTOS and avionics applications within IMA architecture. It specifies requirements of an environment that provides partitioning, i.e. separation of applications to ensure fault containment and ease of verification. Designing an RTOS that complies with ARIN C 653 is costly and requires significant efforts. In this paper, we introduce a domain-specific language (DSL) that supports the specification of an ARINC653-compliant RTOS. In particular, we consider ARINC 653 as a set of generic and high-level requirements, and we use model-driven technologies to specify these requirements in the form of a metamodel. The ARINC metamodel aims at supporting and reducing the cost of certification by reusing the metamodel across multiple RTOS development projects. Other benefits of the ARIN C metamodel include generating data required for certification such as ARIN C configuration tables and test data.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127612898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISSRE 2022 Industry Track Committee: ISSREW 2022 行业跟踪委员会:ISSREW 2022
Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00007
{"title":"ISSRE 2022 Industry Track Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00007","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00007","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TensorFI+: A Scalable Fault Injection Framework for Modern Deep Learning Neural Networks TensorFI+:现代深度学习神经网络的可扩展故障注入框架
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00074
Sabuj Laskar, Md. Hasanur Rahman, Guanpeng Li
Deep Neural Networks (DNNs) are widely deployed in various applications such as autonomous vehicles, healthcare, space applications. TensorFlow is the most popular framework for developing DNN models. After the release of TensorFlow 2, a software-level fault injector named TensorFI is developed for TensorFlow 2 models, which is limited to inject faults only in sequential models. However, most popular DNN models today are non-sequential. In this paper, we are the first to propose TensorFI+, an extension to TensorFI to support for non-sequential models so that developers can assess resiliency of any DNN model developed with TensorFlow 2. For the evaluation, we conduct a large-scale fault injection experiment on 30 sequential and non-sequential models with three popularly used classification datasets. We observe that our tool can inject faults in any layer for any sequential or non-sequential DNN model, and fault-injected inference incurs only 7.62 x overhead compared to fault-free inference.
深度神经网络(dnn)广泛应用于自动驾驶汽车、医疗保健、空间应用等各种应用中。TensorFlow是开发深度神经网络模型最流行的框架。TensorFlow 2发布后,针对TensorFlow 2模型开发了软件级故障注入器TensorFI,该注入器仅限于在顺序模型中注入故障。然而,当今最流行的深度神经网络模型是非顺序的。在本文中,我们首先提出了TensorFI+,这是TensorFI的扩展,以支持非顺序模型,以便开发人员可以评估使用TensorFlow 2开发的任何DNN模型的弹性。为了进行评价,我们使用三种常用的分类数据集对30个顺序和非顺序模型进行了大规模故障注入实验。我们观察到,我们的工具可以在任何顺序或非顺序DNN模型的任何层注入故障,并且与无故障推理相比,故障注入推理仅产生7.62倍的开销。
{"title":"TensorFI+: A Scalable Fault Injection Framework for Modern Deep Learning Neural Networks","authors":"Sabuj Laskar, Md. Hasanur Rahman, Guanpeng Li","doi":"10.1109/ISSREW55968.2022.00074","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00074","url":null,"abstract":"Deep Neural Networks (DNNs) are widely deployed in various applications such as autonomous vehicles, healthcare, space applications. TensorFlow is the most popular framework for developing DNN models. After the release of TensorFlow 2, a software-level fault injector named TensorFI is developed for TensorFlow 2 models, which is limited to inject faults only in sequential models. However, most popular DNN models today are non-sequential. In this paper, we are the first to propose TensorFI+, an extension to TensorFI to support for non-sequential models so that developers can assess resiliency of any DNN model developed with TensorFlow 2. For the evaluation, we conduct a large-scale fault injection experiment on 30 sequential and non-sequential models with three popularly used classification datasets. We observe that our tool can inject faults in any layer for any sequential or non-sequential DNN model, and fault-injected inference incurs only 7.62 x overhead compared to fault-free inference.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134333436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1