首页 > 最新文献

2015 IEEE 16th International Symposium on High Assurance Systems Engineering最新文献

英文 中文
Modeling and Verifying Google File System 建模和验证Google文件系统
Bo Li, Mengdi Wang, Yongxin Zhao, G. Pu, Huibiao Zhu, Fu Song
Google File System (GFS) is a distributed file system developed by Google for massive data-intensive applications. Its high aggregate performance of delivering massive data to many clients but the inexpensiveness of commodity hardware facilitate GFS to successfully meet the massive storage needs and be widely used in industries. In this paper, we first present a formal model of Google File System in terms of Communicating Sequential Processes (CSP#), which precisely describes the un-derlying read/write behaviors of GFS. On that basis, both relaxed consistency and eventually consistency guaranteed by GFS may be revealed in our framework. Furthermore, the suggested CSP# model is encoded in Process Analysis Toolkit (PAT), thus several properties such as starvation-free and deadlock-free could be automatically checked and verified in the framework of formal methods.
Google File System (GFS)是Google为海量数据密集型应用开发的分布式文件系统。GFS具有向多个客户端提供海量数据的高聚合性能和廉价的商用硬件,成功地满足了海量存储的需求,在工业中得到了广泛的应用。在本文中,我们首先从通信顺序进程(CSP#)的角度提出了Google文件系统的形式化模型,该模型精确地描述了GFS的底层读/写行为。在此基础上,我们的框架可以揭示GFS保证的松弛一致性和最终一致性。此外,建议的CSP#模型被编码在过程分析工具包(PAT)中,因此可以在形式化方法的框架中自动检查和验证诸如无饥饿和无死锁等几个属性。
{"title":"Modeling and Verifying Google File System","authors":"Bo Li, Mengdi Wang, Yongxin Zhao, G. Pu, Huibiao Zhu, Fu Song","doi":"10.1109/HASE.2015.38","DOIUrl":"https://doi.org/10.1109/HASE.2015.38","url":null,"abstract":"Google File System (GFS) is a distributed file system developed by Google for massive data-intensive applications. Its high aggregate performance of delivering massive data to many clients but the inexpensiveness of commodity hardware facilitate GFS to successfully meet the massive storage needs and be widely used in industries. In this paper, we first present a formal model of Google File System in terms of Communicating Sequential Processes (CSP#), which precisely describes the un-derlying read/write behaviors of GFS. On that basis, both relaxed consistency and eventually consistency guaranteed by GFS may be revealed in our framework. Furthermore, the suggested CSP# model is encoded in Process Analysis Toolkit (PAT), thus several properties such as starvation-free and deadlock-free could be automatically checked and verified in the framework of formal methods.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"375 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122777193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fidelity and Complexity in Passive Radar Simulations 无源雷达仿真中的保真度和复杂性
W. Barott, Ted Dabrowski, B. Himed
A case study of the trade off between fidelity and complexity is presented for a passive radar simulator. Although it is possible to accurately model the underlying physics, signal processing, and environment of a radar, the resulting model might be both too complex and too costly to evaluate. Instead, simplifications of various model attributes reduce the complexity and permit fast evaluation of performance metrics over large areas, such as the United States. Several model simplifications and their impact on the results are discussed.
以无源雷达模拟器为例,研究了保真度与复杂性之间的权衡问题。虽然可以准确地对雷达的底层物理、信号处理和环境进行建模,但所得到的模型可能过于复杂且成本太高,无法进行评估。相反,各种模型属性的简化降低了复杂性,并允许在大范围内对性能指标进行快速评估,例如美国。讨论了几种模型的简化及其对结果的影响。
{"title":"Fidelity and Complexity in Passive Radar Simulations","authors":"W. Barott, Ted Dabrowski, B. Himed","doi":"10.1109/HASE.2015.30","DOIUrl":"https://doi.org/10.1109/HASE.2015.30","url":null,"abstract":"A case study of the trade off between fidelity and complexity is presented for a passive radar simulator. Although it is possible to accurately model the underlying physics, signal processing, and environment of a radar, the resulting model might be both too complex and too costly to evaluate. Instead, simplifications of various model attributes reduce the complexity and permit fast evaluation of performance metrics over large areas, such as the United States. Several model simplifications and their impact on the results are discussed.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive GC-Aware Load Balancing Strategy for High-Assurance Java Distributed Systems 高保证Java分布式系统的自适应gc感知负载均衡策略
Omar Portillo-Dominguez, Miao Wang, John Murphy, D. Magoni, A. O. Portillo-Dominguez
High-Assurance applications usually require achieving fast response time and high throughput on a constant basis. To fulfil these stringent quality of service requirements, these applications are commonly deployed in clustered instances. However, how to effectively manage these clusters has become a new challenge. A common approach is to deploy a front-end load balancer to optimise the workload distribution among the clustered applications. Thus, researchers have been studying how to improve the effectiveness of a load balancer. Our previous work presented a novel load balancing strategy which improves the performance of a distributed Java system by avoiding the performance impacts of Major Garbage Collection, which is a common cause of performance degradation in Java applications. However, as that strategy used a static configuration, it could only improve the performance of a system if the strategy was configured with domain expert knowledge. This paper extends our previous work by presenting an adaptive GC-aware load balancing strategy which self-configures according to the GC characteristics of the application. Our results have shown that this adaptive strategy can achieve higher throughput and lower response time, compared to the round-robin load balancing, while also avoiding the burden of manual tuning.
高保证应用程序通常需要在恒定的基础上实现快速响应时间和高吞吐量。为了满足这些严格的服务质量要求,这些应用程序通常部署在集群实例中。然而,如何有效地管理这些集群已成为一个新的挑战。一种常见的方法是部署前端负载平衡器来优化集群应用程序之间的工作负载分布。因此,研究人员一直在研究如何提高负载平衡器的有效性。我们之前的工作提出了一种新的负载平衡策略,通过避免主要垃圾收集对性能的影响来提高分布式Java系统的性能,这是Java应用程序中性能下降的常见原因。然而,由于该策略使用的是静态配置,因此只有在使用领域专家知识配置该策略时才能提高系统的性能。本文通过提出一种自适应GC感知负载平衡策略来扩展我们之前的工作,该策略可以根据应用程序的GC特征进行自配置。我们的结果表明,与轮循负载平衡相比,这种自适应策略可以实现更高的吞吐量和更低的响应时间,同时还避免了手动调优的负担。
{"title":"Adaptive GC-Aware Load Balancing Strategy for High-Assurance Java Distributed Systems","authors":"Omar Portillo-Dominguez, Miao Wang, John Murphy, D. Magoni, A. O. Portillo-Dominguez","doi":"10.1109/HASE.2015.19","DOIUrl":"https://doi.org/10.1109/HASE.2015.19","url":null,"abstract":"High-Assurance applications usually require achieving fast response time and high throughput on a constant basis. To fulfil these stringent quality of service requirements, these applications are commonly deployed in clustered instances. However, how to effectively manage these clusters has become a new challenge. A common approach is to deploy a front-end load balancer to optimise the workload distribution among the clustered applications. Thus, researchers have been studying how to improve the effectiveness of a load balancer. Our previous work presented a novel load balancing strategy which improves the performance of a distributed Java system by avoiding the performance impacts of Major Garbage Collection, which is a common cause of performance degradation in Java applications. However, as that strategy used a static configuration, it could only improve the performance of a system if the strategy was configured with domain expert knowledge. This paper extends our previous work by presenting an adaptive GC-aware load balancing strategy which self-configures according to the GC characteristics of the application. Our results have shown that this adaptive strategy can achieve higher throughput and lower response time, compared to the round-robin load balancing, while also avoiding the burden of manual tuning.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123654188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Ontology of Secure Service Level Agreement 安全服务水平协议本体
Chen-Yu Lee, K. Kavi, R. Paul, M. Gomathisankaran
Maintaining security and privacy in the Cloud is a complex task. The task is made even more challenging as the number of vulnerabilities associated with the cloud infrastructure and applications are increasing very rapidly. Understanding the security service level agreements (SSLAs) and privacy policies offered by service and infrastructure providers is critical for consumers to assess the risks of the Cloud before they consider migrating their IT operations to the Cloud. To address these concerns relative to the assessment of security and privacy risks of the Cloud, we have developed ontologies for representing security SLAs (SSLA) in this paper. Our ontologies for SSLAs can be used to understand the security agreements of a provider, to negotiate desired security levels, and to audit the compliance of a provider with respect to federal regulations (such as HIPAA).
在云中维护安全和隐私是一项复杂的任务。随着与云基础设施和应用程序相关的漏洞数量迅速增加,这项任务变得更加具有挑战性。了解服务和基础设施提供商提供的安全服务级别协议(SSLAs)和隐私策略对于消费者在考虑将IT操作迁移到云之前评估云的风险至关重要。为了解决这些与云的安全和隐私风险评估相关的问题,我们在本文中开发了用于表示安全sla (SSLA)的本体。我们的SSLAs本体可用于理解提供者的安全协议、协商所需的安全级别,以及审计提供者对联邦法规(如HIPAA)的遵从性。
{"title":"Ontology of Secure Service Level Agreement","authors":"Chen-Yu Lee, K. Kavi, R. Paul, M. Gomathisankaran","doi":"10.1109/HASE.2015.33","DOIUrl":"https://doi.org/10.1109/HASE.2015.33","url":null,"abstract":"Maintaining security and privacy in the Cloud is a complex task. The task is made even more challenging as the number of vulnerabilities associated with the cloud infrastructure and applications are increasing very rapidly. Understanding the security service level agreements (SSLAs) and privacy policies offered by service and infrastructure providers is critical for consumers to assess the risks of the Cloud before they consider migrating their IT operations to the Cloud. To address these concerns relative to the assessment of security and privacy risks of the Cloud, we have developed ontologies for representing security SLAs (SSLA) in this paper. Our ontologies for SSLAs can be used to understand the security agreements of a provider, to negotiate desired security levels, and to audit the compliance of a provider with respect to federal regulations (such as HIPAA).","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130125961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Weaving an Assurance Case from Design: A Model-Based Approach 从设计中编织保证案例:基于模型的方法
R. Hawkins, I. Habli, D. Kolovos, R. Paige, T. Kelly
Assurance cases are used to demonstrate confidence in properties of interest for a system, e.g. For safety or security. A model-based assurance case seeks to bring the benefits of model-driven engineering, such as automation, transformation and validation, to what is currently a lengthy and informal process. In this paper we develop a model-based assurance approach, based on a weaving model, which allows integration between assurance case, design and process models and meta-models. In our approach, the assurance case itself is treated as a structured model, with the aim that all entities in the assurance case become linked explicitly to the models that represent them. We show how it is possible to exploit the weaving model for automated generation of assurance cases. Building upon these results, we discuss how a seamless model-driven approach to assurance cases can be achieved and examine the utility of increased formality and automation.
保证案例用于证明对系统相关属性的信心,例如安全或保安。基于模型的保证案例寻求将模型驱动工程的好处,例如自动化、转换和验证,带到当前冗长且非正式的过程中。在本文中,我们基于编织模型开发了一种基于模型的保证方法,该方法允许在保证用例、设计和过程模型以及元模型之间进行集成。在我们的方法中,保证案例本身被视为一个结构化模型,目的是保证案例中的所有实体都显式地链接到表示它们的模型。我们将展示如何利用编织模型自动生成保证用例。在这些结果的基础上,我们将讨论如何实现一个无缝的模型驱动方法来保证用例,并检查增加的形式化和自动化的效用。
{"title":"Weaving an Assurance Case from Design: A Model-Based Approach","authors":"R. Hawkins, I. Habli, D. Kolovos, R. Paige, T. Kelly","doi":"10.1109/HASE.2015.25","DOIUrl":"https://doi.org/10.1109/HASE.2015.25","url":null,"abstract":"Assurance cases are used to demonstrate confidence in properties of interest for a system, e.g. For safety or security. A model-based assurance case seeks to bring the benefits of model-driven engineering, such as automation, transformation and validation, to what is currently a lengthy and informal process. In this paper we develop a model-based assurance approach, based on a weaving model, which allows integration between assurance case, design and process models and meta-models. In our approach, the assurance case itself is treated as a structured model, with the aim that all entities in the assurance case become linked explicitly to the models that represent them. We show how it is possible to exploit the weaving model for automated generation of assurance cases. Building upon these results, we discuss how a seamless model-driven approach to assurance cases can be achieved and examine the utility of increased formality and automation.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Model-Checking and Game theory for Synthesis of Safety Rules 安全规则综合的模型检验与博弈论
M. Machin, F. Dufossé, Jérémie Guiochet, D. Powell, Matthieu Roy, H. Waeselynck
Ensuring that safety requirements are respected is a critical issue for the deployment of hazardous and complex reactive systems. We consider a separate safety channel, called a monitor, that is able to partially observe the system and to trigger safety-ensuring actuations. We address the issue of correctly specifying such a monitor with respect to safety and liveness requirements. Two safety requirement synthesis programs are presented and compared. Based on a formal model of the system and its hazards, they compute a monitor behavior that ensures system safety without unduly compromising system liveness. The first program uses the model-checker NuSMV to check safety requirements. These requirements are automatically generated by a branch-and-bound algorithm. Based on a game theory approach, the second program uses the TIGA extension of UPPAAL to synthesize safety requirements, starting from an appropriately reformulated representation of the problem.
确保安全要求得到尊重是部署危险和复杂反应系统的关键问题。我们考虑了一个单独的安全通道,称为监视器,它能够部分地观察系统并触发确保安全的驱动。我们根据安全性和活动性要求,解决了正确指定这种监视器的问题。提出了两种安全需求综合方案并进行了比较。基于系统及其危险的正式模型,他们计算一个监视器行为,以确保系统安全,而不会过度损害系统的活性。第一个程序使用模型检查器NuSMV来检查安全要求。这些需求是由分支定界算法自动生成的。基于博弈论方法,第二个方案使用UPPAAL的TIGA扩展来综合安全需求,从问题的适当重新表述的表示开始。
{"title":"Model-Checking and Game theory for Synthesis of Safety Rules","authors":"M. Machin, F. Dufossé, Jérémie Guiochet, D. Powell, Matthieu Roy, H. Waeselynck","doi":"10.1109/HASE.2015.15","DOIUrl":"https://doi.org/10.1109/HASE.2015.15","url":null,"abstract":"Ensuring that safety requirements are respected is a critical issue for the deployment of hazardous and complex reactive systems. We consider a separate safety channel, called a monitor, that is able to partially observe the system and to trigger safety-ensuring actuations. We address the issue of correctly specifying such a monitor with respect to safety and liveness requirements. Two safety requirement synthesis programs are presented and compared. Based on a formal model of the system and its hazards, they compute a monitor behavior that ensures system safety without unduly compromising system liveness. The first program uses the model-checker NuSMV to check safety requirements. These requirements are automatically generated by a branch-and-bound algorithm. Based on a game theory approach, the second program uses the TIGA extension of UPPAAL to synthesize safety requirements, starting from an appropriately reformulated representation of the problem.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123617531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Formal Foundations for Hierarchical Safety Cases 分层安全案例的形式基础
E. Denney, Ganesh J. Pai, I. Whiteside
Safety cases are increasingly being required in many safety-critical domains to assure, using structured argumentation and evidence, that a system is acceptably safe. However, comprehensive system-wide safety arguments present appreciable challenges to develop, understand, evaluate, and manage, partly due to the volume of information that they aggregate, such as the results of hazard analysis, requirements analysis, testing, formal verification, and other engineering activities. Previously, we have proposed hierarchical safety cases, hicases, to aid the comprehension of safety case argument structures. In this paper, we build on a formal notion of safety case to formalise the use of hierarchy as a structuring technique, and show that hicases satisfy several desirable properties. Our aim is to provide a formal, theoretical foundation for safety cases. In particular, we believe that tools for high assurance systems should be granted similar assurance to the systems to which they are applied. To this end, we formally specify and prove the correctness of key operations for constructing and managing hicases, which gives the specification for implementing hicases in Advocate, our toolset for safety case automation. We motivate and explain the theory with the help of a simple running example, extracted from a real safety case and developed using Advocate.
在许多安全关键领域,越来越多地需要安全案例来确保,使用结构化的论证和证据,系统是可接受的安全。然而,全面的系统范围内的安全论证对开发、理解、评估和管理提出了明显的挑战,部分原因是由于它们聚集的信息量,例如危害分析、需求分析、测试、正式验证和其他工程活动的结果。以前,我们已经提出了分层安全案例,hicases,以帮助理解安全案例的参数结构。在本文中,我们建立了安全案例的形式化概念,以形式化层次结构作为一种结构技术的使用,并表明hicases满足几个理想的性质。我们的目标是为安全案例提供正式的理论基础。特别地,我们认为高保证系统的工具应该被授予与应用它们的系统类似的保证。为此,我们正式指定并证明了构造和管理hicase的关键操作的正确性,从而为在我们的安全案例自动化工具集Advocate中实现hicase提供了规范。我们用一个简单的运行例子来激励和解释这个理论,这个例子是从一个真实的安全案例中提取出来的,并使用Advocate进行了开发。
{"title":"Formal Foundations for Hierarchical Safety Cases","authors":"E. Denney, Ganesh J. Pai, I. Whiteside","doi":"10.1109/HASE.2015.17","DOIUrl":"https://doi.org/10.1109/HASE.2015.17","url":null,"abstract":"Safety cases are increasingly being required in many safety-critical domains to assure, using structured argumentation and evidence, that a system is acceptably safe. However, comprehensive system-wide safety arguments present appreciable challenges to develop, understand, evaluate, and manage, partly due to the volume of information that they aggregate, such as the results of hazard analysis, requirements analysis, testing, formal verification, and other engineering activities. Previously, we have proposed hierarchical safety cases, hicases, to aid the comprehension of safety case argument structures. In this paper, we build on a formal notion of safety case to formalise the use of hierarchy as a structuring technique, and show that hicases satisfy several desirable properties. Our aim is to provide a formal, theoretical foundation for safety cases. In particular, we believe that tools for high assurance systems should be granted similar assurance to the systems to which they are applied. To this end, we formally specify and prove the correctness of key operations for constructing and managing hicases, which gives the specification for implementing hicases in Advocate, our toolset for safety case automation. We motivate and explain the theory with the help of a simple running example, extracted from a real safety case and developed using Advocate.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128589173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Adaptive Failure Prediction for Computer Systems: A Framework and a Case Study 计算机系统自适应故障预测:框架与案例研究
Ivano Irrera, M. Vieira, J. Durães
Online Failure Prediction allows improving system dependability by foreseeing incoming failures at runtime, enabling mitigation actions to be taken in advance. Despite advances in the last years, Online Failure Prediction is still not adopted due to the complexity and time needed to perform the supporting operations, such as training, testing and tuning. Moreover, a predictor must be frequently re-trained to maintain its effectiveness as the target system evolves during its runtime life, this requiring substantial human intervention and effort. In this work we propose a framework for the automatic deployment and online retraining of failure prediction systems. The framework makes use of key techniques such as fault injection and virtualization to reduce the cost and impact of retraining, and is driven by configurable events that trigger the entire process. We present a case study using a web server system and our results show that the framework is able to maintain the performance of the fault predictor even when the system is modified, suggesting that it can be useful in real scenarios.
在线故障预测可以通过在运行时预测传入的故障来提高系统可靠性,从而提前采取缓解措施。尽管在过去几年中取得了进步,但由于执行支持操作(如培训、测试和调优)的复杂性和时间需要,在线故障预测仍然没有被采用。此外,预测器必须经常被重新训练,以便在目标系统在其运行寿命期间发展时保持其有效性,这需要大量的人工干预和努力。在这项工作中,我们提出了一个自动部署和在线再训练故障预测系统的框架。该框架利用故障注入和虚拟化等关键技术来降低再培训的成本和影响,并由触发整个过程的可配置事件驱动。我们提出了一个使用web服务器系统的案例研究,结果表明,即使系统被修改,该框架也能够保持故障预测器的性能,这表明它在实际场景中是有用的。
{"title":"Adaptive Failure Prediction for Computer Systems: A Framework and a Case Study","authors":"Ivano Irrera, M. Vieira, J. Durães","doi":"10.1109/HASE.2015.29","DOIUrl":"https://doi.org/10.1109/HASE.2015.29","url":null,"abstract":"Online Failure Prediction allows improving system dependability by foreseeing incoming failures at runtime, enabling mitigation actions to be taken in advance. Despite advances in the last years, Online Failure Prediction is still not adopted due to the complexity and time needed to perform the supporting operations, such as training, testing and tuning. Moreover, a predictor must be frequently re-trained to maintain its effectiveness as the target system evolves during its runtime life, this requiring substantial human intervention and effort. In this work we propose a framework for the automatic deployment and online retraining of failure prediction systems. The framework makes use of key techniques such as fault injection and virtualization to reduce the cost and impact of retraining, and is driven by configurable events that trigger the entire process. We present a case study using a web server system and our results show that the framework is able to maintain the performance of the fault predictor even when the system is modified, suggesting that it can be useful in real scenarios.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127291275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops 无限循环自动静态检测的不动点算法
A. Ibing, Alexandra Mai
We present an algorithm for automated detection of infinite loop bugs in programs. It relies on a Satisfiability Modulo Theories (SMT) solver backend and can be run conveniently with SMT-constrained symbolic execution. The algorithm detects infinite loop bugs for single-path, multi-path and nested loops. We prove soundness of the algorithm, i.e. There are no false positive detections of infinite loops. Part of the algorithm is a fixed-point based termination check for 'simple' loops, whose soundness is a consequence of Brouwer's fixed-point theorem. The algorithm further yields no false negative detections for context-sensitive detection of periodic loop orbits with sum of prefix iterations and periodicity of up to the analysis loop unroll depth (bounded completeness), if the SMT solver answers the fixed-point satisfiability query in time. We describe an example implementation as plug-in extension of Eclipse CDT. The implementation is validated with the infinite loop test cases from the Juliet test suite and benchmarks are provided.
提出了一种自动检测程序中无限循环错误的算法。它依赖于可满足模理论(Satisfiability Modulo Theories, SMT)解算器后端,可以在SMT约束的符号执行下方便地运行。该算法检测单路径、多路径和嵌套循环的无限循环错误。证明了该算法的合理性,即不存在无限循环的假阳性检测。该算法的一部分是基于不动点的“简单”循环的终止检查,其正确性是browwer不动点定理的结果。如果SMT求解器及时回答不动点可满足性查询,则该算法对于前缀迭代和周期的和直至分析循环展开深度(有界完备性)的周期循环轨道的上下文敏感检测不会产生假阴性检测。我们将一个示例实现描述为Eclipse CDT的插件扩展。该实现使用来自Juliet测试套件的无限循环测试用例进行验证,并提供了基准测试。
{"title":"A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops","authors":"A. Ibing, Alexandra Mai","doi":"10.1109/HASE.2015.16","DOIUrl":"https://doi.org/10.1109/HASE.2015.16","url":null,"abstract":"We present an algorithm for automated detection of infinite loop bugs in programs. It relies on a Satisfiability Modulo Theories (SMT) solver backend and can be run conveniently with SMT-constrained symbolic execution. The algorithm detects infinite loop bugs for single-path, multi-path and nested loops. We prove soundness of the algorithm, i.e. There are no false positive detections of infinite loops. Part of the algorithm is a fixed-point based termination check for 'simple' loops, whose soundness is a consequence of Brouwer's fixed-point theorem. The algorithm further yields no false negative detections for context-sensitive detection of periodic loop orbits with sum of prefix iterations and periodicity of up to the analysis loop unroll depth (bounded completeness), if the SMT solver answers the fixed-point satisfiability query in time. We describe an example implementation as plug-in extension of Eclipse CDT. The implementation is validated with the infinite loop test cases from the Juliet test suite and benchmarks are provided.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122346616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures 信息通信技术与电力基础设施安全风险管理的博弈论模型
Z. Ismail, J. Leneutre, D. Bateman, Lin Chen
The communication infrastructure is a key element for management and control of the power system in the smart grid. The communication infrastructure, which can include equipment using off-the-shelf vulnerable operating systems, has the potential to increase the attack surface of the power system. The interdependency between the communication and the power system renders the management of the overall security risk a challenging task. In this paper, we address this issue by presenting a mathematical model for identifying and hardening the most critical communication equipment used in the power system. Using non-cooperative game theory, we model interactions between an attacker and a defender. We derive the minimum defense resources required and the optimal strategy of the defender that minimizes the risk on the power system. Finally, we evaluate the correctness and the efficiency of our model via a case study.
在智能电网中,通信基础设施是电力系统管理和控制的关键要素。通信基础设施可能包括使用现成易受攻击的操作系统的设备,有可能增加电力系统的攻击面。通信与电力系统之间的相互依存关系使得对整体安全风险的管理成为一项具有挑战性的任务。在本文中,我们通过提出一个数学模型来识别和强化电力系统中使用的最关键的通信设备来解决这个问题。利用非合作博弈论,我们模拟了攻击者和防御者之间的互动。我们推导出所需的最小防御资源和防御者的最优策略,使电力系统的风险最小化。最后,通过实例分析验证了模型的正确性和有效性。
{"title":"A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures","authors":"Z. Ismail, J. Leneutre, D. Bateman, Lin Chen","doi":"10.1109/HASE.2015.24","DOIUrl":"https://doi.org/10.1109/HASE.2015.24","url":null,"abstract":"The communication infrastructure is a key element for management and control of the power system in the smart grid. The communication infrastructure, which can include equipment using off-the-shelf vulnerable operating systems, has the potential to increase the attack surface of the power system. The interdependency between the communication and the power system renders the management of the overall security risk a challenging task. In this paper, we address this issue by presenting a mathematical model for identifying and hardening the most critical communication equipment used in the power system. Using non-cooperative game theory, we model interactions between an attacker and a defender. We derive the minimum defense resources required and the optimal strategy of the defender that minimizes the risk on the power system. Finally, we evaluate the correctness and the efficiency of our model via a case study.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115181339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2015 IEEE 16th International Symposium on High Assurance Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1