首页 > 最新文献

2020 16th European Dependable Computing Conference (EDCC)最新文献

英文 中文
Effect of Coding Styles in Detection of Web Application Vulnerabilities 编码风格在Web应用漏洞检测中的作用
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00027
Ibéria Medeiros, N. Neves
Web application security has become paramount for the organisation's operation, and therefore, static analysis tools (SAT) for vulnerability detection have been widely researched in the last years. Nevertheless, SATs often generate errors (false positives & negatives), whose cause is recurrently associated with very diverse coding styles, i.e., similar functionality is implemented in distinct manners, and programming practices that create ambiguity, such as the reuse and share of variables. The paper presents an analysis of SAT's behaviour and results when they process various relevant web applications coded with different coding styles. Furthermore, it discusses if the SQL injection vulnerabilities detected by SATs as true positives are really exploitable. Our results demonstrate that SATs are built having in mind how to detect specific vulnerabilities, without considering such forms of programming. They call to action for a new generation of SATs that are highly malleable to be capable of processing the codes observed in the wild.
Web应用程序安全性已成为组织操作的重中之重,因此,用于漏洞检测的静态分析工具(SAT)在过去几年中得到了广泛的研究。然而,sat经常会产生错误(假阳性和假阴性),其原因通常与非常不同的编码风格有关,即,以不同的方式实现类似的功能,以及产生歧义的编程实践,例如变量的重用和共享。本文分析了SAT在处理用不同编码风格编码的各种相关web应用程序时的行为和结果。此外,本文还讨论了由sat检测到的SQL注入漏洞是否真的可以被利用。我们的研究结果表明,sat是在考虑如何检测特定漏洞的情况下构建的,而不考虑这种形式的编程。他们呼吁开发新一代的sat,这些sat具有高度的可塑性,能够处理在野外观察到的代码。
{"title":"Effect of Coding Styles in Detection of Web Application Vulnerabilities","authors":"Ibéria Medeiros, N. Neves","doi":"10.1109/EDCC51268.2020.00027","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00027","url":null,"abstract":"Web application security has become paramount for the organisation's operation, and therefore, static analysis tools (SAT) for vulnerability detection have been widely researched in the last years. Nevertheless, SATs often generate errors (false positives & negatives), whose cause is recurrently associated with very diverse coding styles, i.e., similar functionality is implemented in distinct manners, and programming practices that create ambiguity, such as the reuse and share of variables. The paper presents an analysis of SAT's behaviour and results when they process various relevant web applications coded with different coding styles. Furthermore, it discusses if the SQL injection vulnerabilities detected by SATs as true positives are really exploitable. Our results demonstrate that SATs are built having in mind how to detect specific vulnerabilities, without considering such forms of programming. They call to action for a new generation of SATs that are highly malleable to be capable of processing the codes observed in the wild.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128877323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations 智能建筑风险评估案例研究:挑战、不足和建议
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00019
John C. Mace, R. Czekster, C. Morisset, C. Maple
Inter-networked control systems make smart buildings increasingly efficient but can lead to severe operational disruptions and infrastructure damage. It is vital the security state of smart buildings is properly assessed so that thorough and cost effective risk management can be established. This paper uniquely reports on an actual risk assessment performed in 2018 on one of the world's most densely monitored, state-of-the-art, smart buildings. From our observations, we suggest that current practice may be inadequate due to a number of challenges and deficiencies, including the lack of a recognised smart building risk assessment methodology. As a result, the security posture of many smart buildings may not be as robust as their risk assessments suggest. Crucially, we highlight a number of key recommendations for a more comprehensive risk assessment process for smart buildings. As a whole, we believe this practical experience report will be of interest to a range of smart building stakeholders.
互联控制系统使智能建筑越来越高效,但也可能导致严重的运营中断和基础设施损坏。正确评估智能建筑的安全状态至关重要,这样才能建立全面且具有成本效益的风险管理。本文独特地报道了2018年对世界上监控最密集、最先进的智能建筑之一进行的实际风险评估。根据我们的观察,我们认为目前的做法可能是不充分的,因为许多挑战和缺陷,包括缺乏公认的智能建筑风险评估方法。因此,许多智能建筑的安全态势可能并不像其风险评估所显示的那样强大。最重要的是,我们强调了一些关于智能建筑更全面的风险评估过程的关键建议。总的来说,我们相信这份实践经验报告将引起智能建筑利益相关者的兴趣。
{"title":"Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations","authors":"John C. Mace, R. Czekster, C. Morisset, C. Maple","doi":"10.1109/EDCC51268.2020.00019","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00019","url":null,"abstract":"Inter-networked control systems make smart buildings increasingly efficient but can lead to severe operational disruptions and infrastructure damage. It is vital the security state of smart buildings is properly assessed so that thorough and cost effective risk management can be established. This paper uniquely reports on an actual risk assessment performed in 2018 on one of the world's most densely monitored, state-of-the-art, smart buildings. From our observations, we suggest that current practice may be inadequate due to a number of challenges and deficiencies, including the lack of a recognised smart building risk assessment methodology. As a result, the security posture of many smart buildings may not be as robust as their risk assessments suggest. Crucially, we highlight a number of key recommendations for a more comprehensive risk assessment process for smart buildings. As a whole, we believe this practical experience report will be of interest to a range of smart building stakeholders.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125111804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Robustness-Aware Design Space Exploration for FPGA-Based Systems 基于fpga系统的鲁棒性感知设计空间探索改进
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00011
I. Tuzov, D. Andrés, J. Ruiz
Thanks to their dynamic reconfiguration capabilities, FPGAs are used in application domains ranging from embedded systems to high performance computing. Nevertheless, as FPGAs usually rely on SRAM memories to keep their current configuration, they are highly sensitive to radiation. The robustness of FPGA-based implementations can be improved by tuning the configuration parameters of selected IP cores or EDA tools. As many different parameters can usually be set at several configuration levels, this constitutes a huge design space to be explored. Accordingly, not only suitable techniques are required to sample as many different configurations as possible, but also novel fault injection approaches are necessary to reduce the number of faults to be injected and speed up as much as possible the experimentation as a whole. To accomplish this goal, this paper integrates state of the art FPGA-based approaches to speed up the execution of individual fault injection experiments with a novel proposal that minimises the number of fault injection experiments required to successfully explore the design space with robustness in mind and following a genetic algorithm. This approach is exemplified by tuning the Vivado Design Suite to optimize the robustness and clock frequency of MC8051, AVR, and Microblaze soft-core processors.
由于其动态重新配置的能力,fpga被用于从嵌入式系统到高性能计算的应用领域。然而,由于fpga通常依赖于SRAM存储器来保持其当前配置,因此它们对辐射高度敏感。通过调整所选IP核或EDA工具的配置参数,可以提高基于fpga实现的鲁棒性。由于通常可以在几个配置级别设置许多不同的参数,这构成了一个巨大的设计空间。因此,不仅需要合适的技术来采样尽可能多的不同配置,而且需要新颖的故障注入方法来减少故障注入数量,并尽可能加快实验的整体速度。为了实现这一目标,本文集成了最先进的基于fpga的方法,以加速单个故障注入实验的执行,并提出了一种新颖的建议,该建议最大限度地减少了成功探索设计空间所需的故障注入实验的数量,并考虑了鲁棒性并遵循遗传算法。通过调整Vivado Design Suite来优化MC8051、AVR和Microblaze软核处理器的稳健性和时钟频率,可以举例说明这种方法。
{"title":"Improving Robustness-Aware Design Space Exploration for FPGA-Based Systems","authors":"I. Tuzov, D. Andrés, J. Ruiz","doi":"10.1109/EDCC51268.2020.00011","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00011","url":null,"abstract":"Thanks to their dynamic reconfiguration capabilities, FPGAs are used in application domains ranging from embedded systems to high performance computing. Nevertheless, as FPGAs usually rely on SRAM memories to keep their current configuration, they are highly sensitive to radiation. The robustness of FPGA-based implementations can be improved by tuning the configuration parameters of selected IP cores or EDA tools. As many different parameters can usually be set at several configuration levels, this constitutes a huge design space to be explored. Accordingly, not only suitable techniques are required to sample as many different configurations as possible, but also novel fault injection approaches are necessary to reduce the number of faults to be injected and speed up as much as possible the experimentation as a whole. To accomplish this goal, this paper integrates state of the art FPGA-based approaches to speed up the execution of individual fault injection experiments with a novel proposal that minimises the number of fault injection experiments required to successfully explore the design space with robustness in mind and following a genetic algorithm. This approach is exemplified by tuning the Vivado Design Suite to optimize the robustness and clock frequency of MC8051, AVR, and Microblaze soft-core processors.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CrEStO: A Tool for Synthesizing Stateful Priorities 一个合成有状态优先级的工具
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00031
Christian Herrera, Nancy Cruz, Ricardo Quintero
Stateful priorities are used for imposing precise restrictions on system actions, in order to meet safety constraints. Those priorities restrict erroneous system behavior, whereas safe system behavior remains unrestricted. In this work, we present the design of the tool CrEStO, which obtains those priorities, and we extend its query support. We also present several examples, experiments and point out future research work.
有状态优先级用于对系统操作施加精确的限制,以满足安全约束。这些优先级限制了错误的系统行为,而安全系统行为仍然不受限制。在这项工作中,我们提出了CrEStO工具的设计,它获得了这些优先级,并扩展了它的查询支持。最后给出了几个实例和实验,并指出了今后的研究工作。
{"title":"CrEStO: A Tool for Synthesizing Stateful Priorities","authors":"Christian Herrera, Nancy Cruz, Ricardo Quintero","doi":"10.1109/EDCC51268.2020.00031","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00031","url":null,"abstract":"Stateful priorities are used for imposing precise restrictions on system actions, in order to meet safety constraints. Those priorities restrict erroneous system behavior, whereas safe system behavior remains unrestricted. In this work, we present the design of the tool CrEStO, which obtains those priorities, and we extend its query support. We also present several examples, experiments and point out future research work.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115199427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stateful Priorities for Precise Restriction of System Behavior 用于精确限制系统行为的有状态优先级
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00021
Christian Herrera
We present the notion of stateful priorities for imposing precise restrictions on system actions, in order to meet safety constraints. By using stateful priorities we are able to exclusively restrict erroneous system behavior as specified by the constraint, whereas safe system behavior remains unrestricted. Given a system modeled as a network of discrete automata and an error constraint, we present algorithms which use those inputs to synthesize stateful priorities. We present as well a network transformation which uses synthesized priorities for blocking all system actions leading to the input error. The applicability of our approach is demonstrated on three real-world examples.
我们提出了有状态优先级的概念,以便对系统动作施加精确的限制,以满足安全约束。通过使用有状态优先级,我们能够按照约束的规定专门限制错误的系统行为,而安全的系统行为仍然不受限制。给定一个由离散自动机和误差约束组成的网络系统,我们提出了使用这些输入来综合有状态优先级的算法。我们也提出了一种网络转换,它使用综合优先级来阻止所有导致输入错误的系统动作。我们的方法的适用性在三个现实世界的例子中得到了证明。
{"title":"Stateful Priorities for Precise Restriction of System Behavior","authors":"Christian Herrera","doi":"10.1109/EDCC51268.2020.00021","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00021","url":null,"abstract":"We present the notion of stateful priorities for imposing precise restrictions on system actions, in order to meet safety constraints. By using stateful priorities we are able to exclusively restrict erroneous system behavior as specified by the constraint, whereas safe system behavior remains unrestricted. Given a system modeled as a network of discrete automata and an error constraint, we present algorithms which use those inputs to synthesize stateful priorities. We present as well a network transformation which uses synthesized priorities for blocking all system actions leading to the input error. The applicability of our approach is demonstrated on three real-world examples.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Cross-Layer Fault Management Architecture for Sensor Networks 传感器网络数据驱动的跨层故障管理体系结构
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00015
Lauri Vihman, M. Kruusmaa, J. Raik
The paper proposes a data-driven cross-layer resilient architecture for sensor networks. The novelty of the approach lies in combining fault detection across data and network layers into a coordinated system health management architecture.The implemented fault detection is entirely data-driven: data are collected exclusively by the functional sensors that are part of the system. Thus, there is no need for additional hardware resources.The data layers considered include the raw sensor data layer, the processed data layer and the data aggregation layer. The proposed cross-layer fault management architecture utilizes a hierarchical health-map structure for fault detection and data aggregation. A practical case study of an underwater sensor network for harbor water flow monitoring application based on the proposed architecture is presented. Synthetic experiments with real data demonstrate the effectiveness of the approach in fault detection and diagnosis. The experiments show that the data-driven cross-layer fault management allows improving the sensor group measurement accuracy by 35% in case of single sensor errors and nearly twofold in case of double sensor errors. The paper also presents examples of system health-map aggregation and fault diagnosis based on faults manifesting at the different layers for real incidents occurring in the field.
提出了一种数据驱动的传感器网络跨层弹性结构。该方法的新颖之处在于将跨数据层和网络层的故障检测结合到协调的系统健康管理体系结构中。实现的故障检测完全是数据驱动的:数据仅由作为系统一部分的功能传感器收集。因此,不需要额外的硬件资源。考虑的数据层包括原始传感器数据层、处理数据层和数据聚合层。提出的跨层故障管理体系结构利用分层健康映射结构进行故障检测和数据聚合。给出了基于该结构的水下传感器网络在港口水流监测中的应用实例。实际数据的综合实验验证了该方法在故障检测和诊断中的有效性。实验表明,数据驱动的跨层故障管理可以使单传感器误差下的传感器组测量精度提高35%,双传感器误差下的传感器组测量精度提高近两倍。针对现场发生的实际事故,给出了系统健康图聚合和基于不同层次故障的故障诊断实例。
{"title":"Data-Driven Cross-Layer Fault Management Architecture for Sensor Networks","authors":"Lauri Vihman, M. Kruusmaa, J. Raik","doi":"10.1109/EDCC51268.2020.00015","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00015","url":null,"abstract":"The paper proposes a data-driven cross-layer resilient architecture for sensor networks. The novelty of the approach lies in combining fault detection across data and network layers into a coordinated system health management architecture.The implemented fault detection is entirely data-driven: data are collected exclusively by the functional sensors that are part of the system. Thus, there is no need for additional hardware resources.The data layers considered include the raw sensor data layer, the processed data layer and the data aggregation layer. The proposed cross-layer fault management architecture utilizes a hierarchical health-map structure for fault detection and data aggregation. A practical case study of an underwater sensor network for harbor water flow monitoring application based on the proposed architecture is presented. Synthetic experiments with real data demonstrate the effectiveness of the approach in fault detection and diagnosis. The experiments show that the data-driven cross-layer fault management allows improving the sensor group measurement accuracy by 35% in case of single sensor errors and nearly twofold in case of double sensor errors. The paper also presents examples of system health-map aggregation and fault diagnosis based on faults manifesting at the different layers for real incidents occurring in the field.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"5 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Atomic Appends in Asynchronous Byzantine Distributed Ledgers 异步拜占庭分布式账本中的原子追加
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00022
V. Cholvi, Antonio Fernández, Chryssis Georgiou, N. Nicolaou, M. Raynal
A Distributed Ledger Object (DLO) is a concurrent object that maintains a totally ordered sequence of records, and supports two operations:APPEND, which appends a record at the end of the sequence, andGET, which returns the whole sequence of records. The work presented in this article is made up of two main contributions.The first contribution is a formalization of aByzantine-tolerantDistributed Ledger Object(BDLO), which is a DLO in which clients and servers processes may deviate arbitrarily from their intended behavior (i.e. they may be Byzantine). The proposed formal definition is accompanied by algorithms that implementBDLOs on top of an underlying Byzantine Atomic Broadcast service.The second contribution is a suite of algorithms, based on the previous BDLO implementations, that solve the Atomic Appends problem in the presence of asynchrony, Byzantine clients and Byzantine servers. This problem occurs when clients have a composite record (set of basic records) to append to different BDLOs, in such a way that either each basic record is appended to its BDLO (and this must occur in good circumstances),or no basic record is appended. Distributed algorithms are presented, which solve the Atomic Appends problem when the clients (involved in theAtomic Appends) and the servers (which maintain the BDLOs) may be Byzantine.
分布式账本对象(DLO)是一个并发对象,它维护一个完全有序的记录序列,并支持两种操作:APPEND(在序列的末尾追加一条记录)和get(返回整个记录序列)。本文中介绍的工作由两个主要贡献组成。第一个贡献是对拜占庭容忍分布式账本对象(BDLO)的形式化,这是一种客户端和服务器进程可能任意偏离其预期行为(即它们可能是拜占庭的)的DLO。提出的正式定义附带了在底层拜占庭原子广播服务之上实现bdlos的算法。第二个贡献是一套算法,基于以前的BDLO实现,解决了存在异步、拜占庭客户机和拜占庭服务器时的Atomic appendds问题。当客户端有一个复合记录(一组基本记录)要附加到不同的BDLO时,就会出现这个问题,这种方式要么将每个基本记录附加到其BDLO(这在良好的情况下必须发生),要么不附加任何基本记录。提出了分布式算法,解决了客户端(涉及原子追加)和服务器(维护BDLOs)可能处于拜占庭状态时的原子追加问题。
{"title":"Atomic Appends in Asynchronous Byzantine Distributed Ledgers","authors":"V. Cholvi, Antonio Fernández, Chryssis Georgiou, N. Nicolaou, M. Raynal","doi":"10.1109/EDCC51268.2020.00022","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00022","url":null,"abstract":"A Distributed Ledger Object (DLO) is a concurrent object that maintains a totally ordered sequence of records, and supports two operations:APPEND, which appends a record at the end of the sequence, andGET, which returns the whole sequence of records. The work presented in this article is made up of two main contributions.The first contribution is a formalization of aByzantine-tolerantDistributed Ledger Object(BDLO), which is a DLO in which clients and servers processes may deviate arbitrarily from their intended behavior (i.e. they may be Byzantine). The proposed formal definition is accompanied by algorithms that implementBDLOs on top of an underlying Byzantine Atomic Broadcast service.The second contribution is a suite of algorithms, based on the previous BDLO implementations, that solve the Atomic Appends problem in the presence of asynchrony, Byzantine clients and Byzantine servers. This problem occurs when clients have a composite record (set of basic records) to append to different BDLOs, in such a way that either each basic record is appended to its BDLO (and this must occur in good circumstances),or no basic record is appended. Distributed algorithms are presented, which solve the Atomic Appends problem when the clients (involved in theAtomic Appends) and the servers (which maintain the BDLOs) may be Byzantine.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SafeOps: A Concept of Continuous Safety 安全操作:持续安全的概念
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00020
Camille Fayollas, H. Bonnin, Olivier Flébus
Improved safety is one of the key benefits expected from autonomous vehicles. This can only be achieved if the autonomous vehicles are guaranteed to be safe enough. This paper proposes a potential approach contributing to this safety improvement: it describes and investigates "SafeOps", a concept of "continuous safety", based on the DevOps approach, unifying development and operations. DevOps consists in a set of practices intended to reduce the time between committing a change to a system and the change being deployed into production, while ensuring high quality. DevOps benefits to system development and delivery by enabling software continuous delivery, faster changes management with faster issues resolution, and improved reliability. SafeOps key principle is to monitor the system in operation and to use this information for validating and certifying a certain safety assurance level. Following this approach, a system could be compliant to a first safety assurance level when it's first delivered and compliant to higher ones when validated in operation.
提高安全性是自动驾驶汽车的主要优势之一。这只有在保证自动驾驶汽车足够安全的情况下才能实现。本文提出了一种有助于这种安全改进的潜在方法:它描述并研究了“SafeOps”,这是一种基于DevOps方法的“持续安全”概念,统一了开发和操作。DevOps由一组实践组成,旨在减少将更改提交到系统和将更改部署到生产环境之间的时间,同时确保高质量。DevOps通过支持软件的持续交付、更快的变更管理和更快的问题解决,以及改进的可靠性,对系统开发和交付有好处。安全操作的关键原则是监控系统的运行,并使用这些信息来验证和证明一定的安全保证水平。按照这种方法,系统在首次交付时可以符合第一个安全保证级别,在操作中验证时可以符合更高的安全保证级别。
{"title":"SafeOps: A Concept of Continuous Safety","authors":"Camille Fayollas, H. Bonnin, Olivier Flébus","doi":"10.1109/EDCC51268.2020.00020","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00020","url":null,"abstract":"Improved safety is one of the key benefits expected from autonomous vehicles. This can only be achieved if the autonomous vehicles are guaranteed to be safe enough. This paper proposes a potential approach contributing to this safety improvement: it describes and investigates \"SafeOps\", a concept of \"continuous safety\", based on the DevOps approach, unifying development and operations. DevOps consists in a set of practices intended to reduce the time between committing a change to a system and the change being deployed into production, while ensuring high quality. DevOps benefits to system development and delivery by enabling software continuous delivery, faster changes management with faster issues resolution, and improved reliability. SafeOps key principle is to monitor the system in operation and to use this information for validating and certifying a certain safety assurance level. Following this approach, a system could be compliant to a first safety assurance level when it's first delivered and compliant to higher ones when validated in operation.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developing Complex Safety Critical Systems in Complex Supply Chains 在复杂供应链中开发复杂安全关键系统
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00024
C. Temple
The emergence of high performance high complexity automotive systems for autonomous driving involves introducing complex supply chains to the system design and managing them in a structured way. Based on current estimates a fully autonomous car could require up to 1 billion lines of code with a code base involving dozens of suppliers. This paper identifies and discusses the complexities involved when such a complex safety critical system is designed using a high number of interacting safety elements that have been designed out of context of the target system by a multitude of suppliers. The paper details the complexities of the integration task. It argues in favour of introducing additional error containment boundaries and safety mechanisms to help manage the integration complexity.
高性能、高复杂性的自动驾驶汽车系统的出现,涉及到将复杂的供应链引入系统设计,并以结构化的方式对其进行管理。根据目前的估计,一辆全自动驾驶汽车可能需要多达10亿行代码,涉及数十家供应商的代码库。本文确定并讨论了当这样一个复杂的安全关键系统使用大量相互作用的安全元素设计时所涉及的复杂性,这些安全元素是由众多供应商在目标系统的背景之外设计的。本文详细介绍了集成任务的复杂性。它主张引入额外的错误包含边界和安全机制来帮助管理集成的复杂性。
{"title":"Developing Complex Safety Critical Systems in Complex Supply Chains","authors":"C. Temple","doi":"10.1109/EDCC51268.2020.00024","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00024","url":null,"abstract":"The emergence of high performance high complexity automotive systems for autonomous driving involves introducing complex supply chains to the system design and managing them in a structured way. Based on current estimates a fully autonomous car could require up to 1 billion lines of code with a code base involving dozens of suppliers. This paper identifies and discusses the complexities involved when such a complex safety critical system is designed using a high number of interacting safety elements that have been designed out of context of the target system by a multitude of suppliers. The paper details the complexities of the integration task. It argues in favour of introducing additional error containment boundaries and safety mechanisms to help manage the integration complexity.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"1219 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114052005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Availability Model for DSS and OLTP Applications in Virtualized Environments 虚拟环境中DSS和OLTP应用的可用性模型
Pub Date : 2020-09-01 DOI: 10.1109/EDCC51268.2020.00023
Matheus Torquato, Charles F. Gonçalves, M. Vieira
Decision support systems (DSS) and online transaction processing applications (OLTP) are crucial for several organizations and frequently require high levels of availability. Many organizations moved their systems to the virtualized environment aiming at improving system availability. Despite the flexibility and manageability features provided by virtualization, a question arises on what policies to apply in order to achieve high availability. Usual approaches highlight redundancy as a strategy for high availability. Still, a concern persists on what components we should consider for redundancy. This paper proposes a hierarchical availability model for evaluating different redundancy allocations for DSS and OLTP systems in virtualized environments. We present three case studies investigating only-Virtual Machine (VM) redundancy and physical machine redundancy strategies. The results provide an overview of the availability impact due to each strategy. We noticed that the physical machine failure rate limits the maximum availability obtained from only-VM redundancy. We exercise our model with a genetic algorithm to find alternatives for high availability. The presented models and results may bring insights when designing availability policies.
决策支持系统(DSS)和在线事务处理应用程序(OLTP)对于许多组织都是至关重要的,并且经常需要高水平的可用性。许多组织将他们的系统迁移到虚拟化环境,目的是提高系统可用性。尽管虚拟化提供了灵活性和可管理性特性,但是出现了一个问题,即应用什么策略来实现高可用性。通常的方法强调冗余作为高可用性的策略。但是,我们应该考虑哪些组件是冗余的问题仍然存在。本文提出了一种分层可用性模型,用于评估虚拟环境中DSS和OLTP系统的不同冗余分配。我们提出了三个案例研究,仅调查虚拟机(VM)冗余和物理机冗余策略。结果提供了每种策略对可用性影响的概述。我们注意到,物理机器的故障率限制了仅vm冗余获得的最大可用性。我们用遗传算法来练习我们的模型,以找到高可用性的替代方案。所提出的模型和结果可能会在设计可用性策略时带来一些见解。
{"title":"An Availability Model for DSS and OLTP Applications in Virtualized Environments","authors":"Matheus Torquato, Charles F. Gonçalves, M. Vieira","doi":"10.1109/EDCC51268.2020.00023","DOIUrl":"https://doi.org/10.1109/EDCC51268.2020.00023","url":null,"abstract":"Decision support systems (DSS) and online transaction processing applications (OLTP) are crucial for several organizations and frequently require high levels of availability. Many organizations moved their systems to the virtualized environment aiming at improving system availability. Despite the flexibility and manageability features provided by virtualization, a question arises on what policies to apply in order to achieve high availability. Usual approaches highlight redundancy as a strategy for high availability. Still, a concern persists on what components we should consider for redundancy. This paper proposes a hierarchical availability model for evaluating different redundancy allocations for DSS and OLTP systems in virtualized environments. We present three case studies investigating only-Virtual Machine (VM) redundancy and physical machine redundancy strategies. The results provide an overview of the availability impact due to each strategy. We noticed that the physical machine failure rate limits the maximum availability obtained from only-VM redundancy. We exercise our model with a genetic algorithm to find alternatives for high availability. The presented models and results may bring insights when designing availability policies.","PeriodicalId":212573,"journal":{"name":"2020 16th European Dependable Computing Conference (EDCC)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 16th European Dependable Computing Conference (EDCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1