首页 > 最新文献

2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing最新文献

英文 中文
A Clustering Approach for Web Vulnerabilities Detection Web漏洞检测的聚类方法
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.31
Anthony Dessiatnikoff, R. Akrout, E. Alata, M. Kaâniche, V. Nicomette
This paper presents a new algorithm aimed at the vulnerability assessment of web applications following a black-box approach. The objective is to improve the detection efficiency of existing vulnerability scanners and to move a step forward toward the automation of this process. Our approach covers various types of vulnerabilities but this paper mainly focuses on SQL injections. The proposed algorithm is based on the automatic classification of the responses returned by the web servers using data clustering techniques and provides especially crafted inputs that lead to successful attacks when vulnerabilities are present. Experimental results on several vulnerable applications and comparative analysis with some existing tools confirm the effectiveness of our approach.
本文提出了一种基于黑盒方法的web应用漏洞评估新算法。目标是提高现有漏洞扫描器的检测效率,并向该过程的自动化迈进一步。我们的方法涵盖了各种类型的漏洞,但本文主要关注SQL注入。所提出的算法基于使用数据集群技术对web服务器返回的响应进行自动分类,并提供特别精心制作的输入,当存在漏洞时导致成功的攻击。在几个易受攻击的应用程序上的实验结果以及与一些现有工具的对比分析证实了我们方法的有效性。
{"title":"A Clustering Approach for Web Vulnerabilities Detection","authors":"Anthony Dessiatnikoff, R. Akrout, E. Alata, M. Kaâniche, V. Nicomette","doi":"10.1109/PRDC.2011.31","DOIUrl":"https://doi.org/10.1109/PRDC.2011.31","url":null,"abstract":"This paper presents a new algorithm aimed at the vulnerability assessment of web applications following a black-box approach. The objective is to improve the detection efficiency of existing vulnerability scanners and to move a step forward toward the automation of this process. Our approach covers various types of vulnerabilities but this paper mainly focuses on SQL injections. The proposed algorithm is based on the automatic classification of the responses returned by the web servers using data clustering techniques and provides especially crafted inputs that lead to successful attacks when vulnerabilities are present. Experimental results on several vulnerable applications and comparative analysis with some existing tools confirm the effectiveness of our approach.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125520799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Gossiping with Network Coding 用网络编码闲聊
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.17
Shun Tokuyama, Tatsuhiro Tsuchiya, T. Kikuno
Gossip is a scalable and easy-to-deploy broadcast method for distributed systems. In gossip a broadcast message is disseminated through repeated information exchanges between randomly chosen nodes. Gossip can also achieve high reliability using a large amount of redundant messages, but this also incurs high load on the network. This paper proposes a new gossip algorithm which incorporates network coding techniques to mitigate the high load. With random linear coding, each message propagated in the new algorithm is randomly generated from the broadcast message. Unlike in ordinary gossip, this feature prevents nodes from receiving an identical message more than once, allowing to achieve the same reliability at a lower message cost.
Gossip是一种可扩展且易于部署的分布式系统广播方法。在八卦中,广播消息通过随机选择的节点之间的重复信息交换而传播。八卦也可以通过大量冗余消息实现高可靠性,但这也会给网络带来高负载。本文提出了一种新的八卦算法,该算法结合了网络编码技术来缓解高负载。采用随机线性编码,在新算法中传播的每条消息都是由广播消息随机生成的。与普通的八卦不同,此功能可以防止节点多次接收相同的消息,从而以更低的消息成本实现相同的可靠性。
{"title":"Gossiping with Network Coding","authors":"Shun Tokuyama, Tatsuhiro Tsuchiya, T. Kikuno","doi":"10.1109/PRDC.2011.17","DOIUrl":"https://doi.org/10.1109/PRDC.2011.17","url":null,"abstract":"Gossip is a scalable and easy-to-deploy broadcast method for distributed systems. In gossip a broadcast message is disseminated through repeated information exchanges between randomly chosen nodes. Gossip can also achieve high reliability using a large amount of redundant messages, but this also incurs high load on the network. This paper proposes a new gossip algorithm which incorporates network coding techniques to mitigate the high load. With random linear coding, each message propagated in the new algorithm is randomly generated from the broadcast message. Unlike in ordinary gossip, this feature prevents nodes from receiving an identical message more than once, allowing to achieve the same reliability at a lower message cost.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134459611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power Plants 安全关键型核电站反应堆安全壳可靠性的提高
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.24
Chi-Shiang Cho, W. Chung, D. Gao, Hongke Zhang, S. Kuo
The use of nuclear energy to generate electric power is crucial in meeting the high energy demand of modern economy. The dependability of nuclear power plants has been a critical issue and the reactor containment is the most important safety structure acting as a barrier against the release of radioactive material to the environment. In this paper, we propose a practical framework for design, implementation, and V&V to enhance the dependability of reactor containment through an integrated leakage rate test.
利用核能发电对于满足现代经济对能源的高需求至关重要。核电站的可靠性一直是一个关键问题,而反应堆安全壳是防止放射性物质向环境释放的最重要的安全结构。在本文中,我们提出了一个实用的框架,设计,实施和V&V,以提高可靠性的反应堆安全壳通过一个集成的泄漏率测试。
{"title":"Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power Plants","authors":"Chi-Shiang Cho, W. Chung, D. Gao, Hongke Zhang, S. Kuo","doi":"10.1109/PRDC.2011.24","DOIUrl":"https://doi.org/10.1109/PRDC.2011.24","url":null,"abstract":"The use of nuclear energy to generate electric power is crucial in meeting the high energy demand of modern economy. The dependability of nuclear power plants has been a critical issue and the reactor containment is the most important safety structure acting as a barrier against the release of radioactive material to the environment. In this paper, we propose a practical framework for design, implementation, and V&V to enhance the dependability of reactor containment through an integrated leakage rate test.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133048233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Layered Diagnosis and Clock-Rate Correction for the TTEthernet Clock Synchronization Protocol 以太网时钟同步协议的分层诊断和时钟速率校正
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.36
W. Steiner, B. Dutertre
Fault-tolerant clock synchronization is the foundation of synchronous architectures such as the Time-Triggered Architecture (TTA) for dependable cyber-physical systems. Clocks are typically local counters that are increased with a given rate according to real time, and clock synchronization algorithms ensure that any two clocks in the system read about the same value at about the same point in real time. This is achieved by a clock synchronization algorithm that changes the current values of the clocks, the clocks' rate, or both. This paper presents a diagnosis algorithm and a clock-rate correction algorithm as layered services on top of the TTEthernet clock synchronization algorithm, which itself is a clock-state correction algorithm. We analyze the algorithms' properties and explore and understand their behavior using a bounded model checker for infinite data types. We use our formal framework for both simulation and formal proof. To the best knowledge of the authors this has been the first time that formal methods, should they be theorem provers or model checkers, have been applied to the problem of rate-correction for fault-tolerant clock synchronization. Furthermore, the formal development process itself demonstrates how easily existing models can be utilized in the development of new algorithms and their formal verification.
容错时钟同步是同步体系结构的基础,如时间触发体系结构(TTA),用于可靠的网络物理系统。时钟通常是本地计数器,根据实时情况以给定的速率增加,时钟同步算法确保系统中的任何两个时钟在实时的同一点读取相同的值。这是通过时钟同步算法来实现的,该算法可以改变时钟的当前值、时钟的速率或两者兼而有之。在以太网时钟同步算法的基础上,提出了一种诊断算法和一种时钟速率校正算法作为分层服务,其本身就是一种时钟状态校正算法。我们分析算法的属性,并使用无限数据类型的有界模型检查器探索和理解它们的行为。我们将我们的形式化框架用于模拟和形式化证明。据作者所知,这是第一次将形式化方法(应该是定理证明或模型检查器)应用于容错时钟同步的速率校正问题。此外,形式化开发过程本身演示了在新算法的开发及其形式化验证中如何轻松地利用现有模型。
{"title":"Layered Diagnosis and Clock-Rate Correction for the TTEthernet Clock Synchronization Protocol","authors":"W. Steiner, B. Dutertre","doi":"10.1109/PRDC.2011.36","DOIUrl":"https://doi.org/10.1109/PRDC.2011.36","url":null,"abstract":"Fault-tolerant clock synchronization is the foundation of synchronous architectures such as the Time-Triggered Architecture (TTA) for dependable cyber-physical systems. Clocks are typically local counters that are increased with a given rate according to real time, and clock synchronization algorithms ensure that any two clocks in the system read about the same value at about the same point in real time. This is achieved by a clock synchronization algorithm that changes the current values of the clocks, the clocks' rate, or both. This paper presents a diagnosis algorithm and a clock-rate correction algorithm as layered services on top of the TTEthernet clock synchronization algorithm, which itself is a clock-state correction algorithm. We analyze the algorithms' properties and explore and understand their behavior using a bounded model checker for infinite data types. We use our formal framework for both simulation and formal proof. To the best knowledge of the authors this has been the first time that formal methods, should they be theorem provers or model checkers, have been applied to the problem of rate-correction for fault-tolerant clock synchronization. Furthermore, the formal development process itself demonstrates how easily existing models can be utilized in the development of new algorithms and their formal verification.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Test Model for Hardware and Software 硬件和软件的测试模型
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.41
J. Sziray
The paper presents a unified test model which is a mapping scheme for describing the one-to-one correspondence between the input and output domains of a given hardware or software system. Here the test inputs and the fault classes are also involved. The test model incorporates both the verification and the validation schemes for the hardware and software.
本文提出了一种统一的测试模型,它是描述给定硬件或软件系统的输入域和输出域之间一一对应关系的映射方案。这里还涉及到测试输入和故障类。该测试模型结合了硬件和软件的验证和验证方案。
{"title":"A Test Model for Hardware and Software","authors":"J. Sziray","doi":"10.1109/PRDC.2011.41","DOIUrl":"https://doi.org/10.1109/PRDC.2011.41","url":null,"abstract":"The paper presents a unified test model which is a mapping scheme for describing the one-to-one correspondence between the input and output domains of a given hardware or software system. Here the test inputs and the fault classes are also involved. The test model incorporates both the verification and the validation schemes for the hardware and software.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130925536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Robustness Assessment of DDS-Compliant Middleware dds兼容中间件的鲁棒性自动评估
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.51
A. Napolitano, G. Carrozza, Antonio Bovenzi, C. Esposito
The next generation of critical systems requires an efficient, scalable and robust data dissemination infrastructure. Middleware solutions compliant with the novel OMG standard, called Data Distribution Service (DDS), are being traditionally used for architecting large-scale systems, because they well meet the requirements of scalability, seamless decoupling and fault tolerance. Due to such features, industrial practitioners are enforcing the adoption of such middleware solutions also within the context of critical systems. However, these systems pose serious dependability requirements, which in turn demand DDS compliant products also to realize reliable data dissemination in different and heterogeneous contexts. Hence, assessing the supported reliability degree and proposing improvement strategies becomes crucial and requires a clear understanding of DDS compliant middleware failing behavior. This paper illustrates an innovative tool to automatically evaluate the robustness of DDS-compliant middleware based on a fault injection technique. Specifically, experiments have been conducted on an actual implementation of the DDS standard, by means of injecting a set of proper invalid inputs through its API and analyzing the achieved outcomes.
下一代关键系统需要高效、可扩展和健壮的数据传播基础设施。中间件解决方案符合新的OMG标准,称为数据分布服务(Data Distribution Service, DDS),传统上用于构建大型系统,因为它们很好地满足了可伸缩性、无缝解耦和容错的要求。由于这些特性,工业从业者也在关键系统的上下文中强制采用此类中间件解决方案。然而,这些系统提出了严重的可靠性要求,这反过来又要求符合DDS的产品在不同和异构环境下实现可靠的数据传播。因此,评估支持的可靠性程度并提出改进策略变得至关重要,并且需要清楚地了解符合DDS的中间件故障行为。本文提出了一种基于故障注入技术的dds兼容中间件鲁棒性自动评估工具。具体而言,通过DDS标准的API注入一组适当的无效输入,并对实际实施DDS标准的结果进行了实验分析。
{"title":"Automatic Robustness Assessment of DDS-Compliant Middleware","authors":"A. Napolitano, G. Carrozza, Antonio Bovenzi, C. Esposito","doi":"10.1109/PRDC.2011.51","DOIUrl":"https://doi.org/10.1109/PRDC.2011.51","url":null,"abstract":"The next generation of critical systems requires an efficient, scalable and robust data dissemination infrastructure. Middleware solutions compliant with the novel OMG standard, called Data Distribution Service (DDS), are being traditionally used for architecting large-scale systems, because they well meet the requirements of scalability, seamless decoupling and fault tolerance. Due to such features, industrial practitioners are enforcing the adoption of such middleware solutions also within the context of critical systems. However, these systems pose serious dependability requirements, which in turn demand DDS compliant products also to realize reliable data dissemination in different and heterogeneous contexts. Hence, assessing the supported reliability degree and proposing improvement strategies becomes crucial and requires a clear understanding of DDS compliant middleware failing behavior. This paper illustrates an innovative tool to automatically evaluate the robustness of DDS-compliant middleware based on a fault injection technique. Specifically, experiments have been conducted on an actual implementation of the DDS standard, by means of injecting a set of proper invalid inputs through its API and analyzing the achieved outcomes.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Making Dependability Visual -- Combining Model-Based Design and Virtual Realities 迈向可靠性可视化——基于模型的设计与虚拟现实的结合
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.55
Matthias Güdemann, Michael Lipaczewski, F. Ortmeier, Marco Schumann, R. Eschbach
Dependability is often a very abstract concept. The reason is that dependability implications shall be very rare and are often not even wanted to happen during testing. In particular for software-intensive systems, it is very hard to find correct causal relationships/minimal cut sets. Modern model-based approaches help here by computing for example minimal cut sets automatically. However, these methods always rely on a correct model of the environment. In addition, the results are often not traceable or understandable for humans. Therefore, we suggest combining model-based analysis for deriving safety properties with virtual realities for ensuring model validity and trace-ability of results.
可靠性通常是一个非常抽象的概念。原因是可靠性的影响应该是非常罕见的,通常甚至不希望在测试期间发生。特别是对于软件密集型系统,很难找到正确的因果关系/最小割集。现代基于模型的方法通过自动计算最小割集来提供帮助。然而,这些方法总是依赖于正确的环境模型。此外,其结果往往是不可追溯的或不可理解的人类。因此,我们建议将基于模型的安全属性分析与虚拟现实相结合,以确保模型的有效性和结果的可追溯性。
{"title":"Towards Making Dependability Visual -- Combining Model-Based Design and Virtual Realities","authors":"Matthias Güdemann, Michael Lipaczewski, F. Ortmeier, Marco Schumann, R. Eschbach","doi":"10.1109/PRDC.2011.55","DOIUrl":"https://doi.org/10.1109/PRDC.2011.55","url":null,"abstract":"Dependability is often a very abstract concept. The reason is that dependability implications shall be very rare and are often not even wanted to happen during testing. In particular for software-intensive systems, it is very hard to find correct causal relationships/minimal cut sets. Modern model-based approaches help here by computing for example minimal cut sets automatically. However, these methods always rely on a correct model of the environment. In addition, the results are often not traceable or understandable for humans. Therefore, we suggest combining model-based analysis for deriving safety properties with virtual realities for ensuring model validity and trace-ability of results.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specification-Based Intrusion Detection for Advanced Metering Infrastructures 基于规范的高级计量基础设施入侵检测
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.30
Kordy, S. Mauw, S. Radomirovic, P. Schweitzer, D Mougouei, M. Moghtadaei, S. Moradmand
It is critical to develop an effective way to monitor advanced metering infrastructures (AMI). To ensure the security and reliability of a modernized power grid, the current deployment of millions of smart meters requires the development of innovative situational awareness solutions to prevent compromised devices from impacting the stability of the grid and the reliability of the energy distribution infrastructure. To address this issue, we introduce a specification-based intrusion detection sensor that can be deployed in the field to identify security threats in real time. This sensor monitors the traffic among meters and access points at the network, transport, and application layers to ensure that devices are running in a secure state and their operations respect a specified security policy. It does this by implementing a set of constraints on transmissions made using the C12.22 standard protocol that ensure that all violations of the specified security policy will be detected. The soundness of these constraints was verified using a formal framework, and a prototype implementation of the sensor was evaluated with realistic AMI network traffic.
开发一种有效的方法来监控高级计量基础设施(AMI)是至关重要的。为了确保现代化电网的安全性和可靠性,目前数百万智能电表的部署需要开发创新的态势感知解决方案,以防止受损设备影响电网的稳定性和能源分配基础设施的可靠性。为了解决这个问题,我们引入了一种基于规范的入侵检测传感器,可以在现场部署,实时识别安全威胁。该传感器对网络层、传输层和应用层的仪表和接入点之间的流量进行监控,以确保设备在安全状态下运行,其操作符合指定的安全策略。它通过在使用C12.22标准协议的传输上实现一组约束来实现这一点,这些约束确保所有违反指定安全策略的行为都将被检测到。使用形式化框架验证了这些约束的合理性,并使用现实AMI网络流量评估了传感器的原型实现。
{"title":"Specification-Based Intrusion Detection for Advanced Metering Infrastructures","authors":"Kordy, S. Mauw, S. Radomirovic, P. Schweitzer, D Mougouei, M. Moghtadaei, S. Moradmand","doi":"10.1109/PRDC.2011.30","DOIUrl":"https://doi.org/10.1109/PRDC.2011.30","url":null,"abstract":"It is critical to develop an effective way to monitor advanced metering infrastructures (AMI). To ensure the security and reliability of a modernized power grid, the current deployment of millions of smart meters requires the development of innovative situational awareness solutions to prevent compromised devices from impacting the stability of the grid and the reliability of the energy distribution infrastructure. To address this issue, we introduce a specification-based intrusion detection sensor that can be deployed in the field to identify security threats in real time. This sensor monitors the traffic among meters and access points at the network, transport, and application layers to ensure that devices are running in a secure state and their operations respect a specified security policy. It does this by implementing a set of constraints on transmissions made using the C12.22 standard protocol that ensure that all violations of the specified security policy will be detected. The soundness of these constraints was verified using a formal framework, and a prototype implementation of the sensor was evaluated with realistic AMI network traffic.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117349254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 194
Utilizing Hidden Markov Models for Formal Reliability Analysis of Real-Time Communication Systems with Errors 利用隐马尔可夫模型进行有误差实时通信系统的形式可靠性分析
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.19
M. Sebastian, Philip Axer, R. Ernst
In the near future embedded systems will be faced with the phenomena of increasing error rates, caused by a variety of error sources that have to be considered during the design process. In this paper we propose a method to derive the reliability of a real-time capable CAN bus system with errors. Individual errors on the CAN bus might be correlated in arbitrary way, the proposed algorithm will cover this. It is based on a previous work on reliability analysis that has been restricted to uncorrelated bit errors. To extend this approach we first introduce a suitable error model to describe arbitrary correlations between bit errors. As a key novelty we present an extended analysis procedure that takes this error model into account. This new approach will be utilized to determine the effects of burst errors and to demonstrate the necessity of appropriate error models for reliability analysis.
在不久的将来,嵌入式系统将面临错误率不断上升的现象,这是由于在设计过程中必须考虑的各种错误来源造成的。本文提出了一种基于误差的实时CAN总线系统可靠性的推导方法。CAN总线上的单个误差可能以任意方式相关,所提出的算法将涵盖这一点。它基于先前的可靠性分析工作,该工作仅限于不相关的误码。为了扩展这种方法,我们首先引入一个合适的误差模型来描述比特误差之间的任意相关性。作为一个关键的创新,我们提出了一个扩展的分析程序,考虑到这种误差模型。这种新方法将用于确定突发误差的影响,并证明适当的误差模型对可靠性分析的必要性。
{"title":"Utilizing Hidden Markov Models for Formal Reliability Analysis of Real-Time Communication Systems with Errors","authors":"M. Sebastian, Philip Axer, R. Ernst","doi":"10.1109/PRDC.2011.19","DOIUrl":"https://doi.org/10.1109/PRDC.2011.19","url":null,"abstract":"In the near future embedded systems will be faced with the phenomena of increasing error rates, caused by a variety of error sources that have to be considered during the design process. In this paper we propose a method to derive the reliability of a real-time capable CAN bus system with errors. Individual errors on the CAN bus might be correlated in arbitrary way, the proposed algorithm will cover this. It is based on a previous work on reliability analysis that has been restricted to uncorrelated bit errors. To extend this approach we first introduce a suitable error model to describe arbitrary correlations between bit errors. As a key novelty we present an extended analysis procedure that takes this error model into account. This new approach will be utilized to determine the effects of burst errors and to demonstrate the necessity of appropriate error models for reliability analysis.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"40 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Method of Gate-Level Circuit Reliability Estimation Based on Iterative PTM Model 基于迭代PTM模型的门级电路可靠性估计方法
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.45
Jie Xiao, Jianhui Jiang, Xuguang Zhu, Chengtian Ouyang
The rapid development of nanotechnology has opened up new possibilities and introduced new challenges for circuit design. It is very important to study new analysis methods for accurate circuit reliability. Few methods for evaluating circuit reliability were proposed in recent years. For example, the original probabilistic transfer matrix (PTM) model has large time and space overhead, so it can only calculate small scale circuits, the improved PTM model proposed in [2] can handle large scale circuits but it also has large time overhead. In this paper, the concept of macro-gate is defined and an iterative PTM model based on macro-gate is proposed. Based on this model, a circuit reliability evaluation algorithm that can calculate the circuit reliability from primary input to any level of the circuit is given. The complexity of the proposed algorithm related to the number of macro-gates contained in the circuit is linear. Experimental results show that the proposed method has the same accuracy as the PTM model, but it has lower time overhead for large circuits.
纳米技术的快速发展为电路设计带来了新的可能性,也带来了新的挑战。研究新的精确电路可靠性分析方法具有十分重要的意义。近年来提出了几种评估电路可靠性的方法。例如,原始概率传递矩阵(PTM)模型的时间和空间开销较大,只能计算小规模电路,[2]提出的改进PTM模型可以处理大规模电路,但时间开销也较大。定义了宏门的概念,提出了一种基于宏门的迭代PTM模型。在此模型的基础上,给出了一种能够计算从一次输入到任意电平的电路可靠性的电路可靠性评估算法。该算法的复杂度与电路中包含的宏门数量呈线性关系。实验结果表明,该方法具有与PTM模型相同的精度,但对于大型电路具有更低的时间开销。
{"title":"A Method of Gate-Level Circuit Reliability Estimation Based on Iterative PTM Model","authors":"Jie Xiao, Jianhui Jiang, Xuguang Zhu, Chengtian Ouyang","doi":"10.1109/PRDC.2011.45","DOIUrl":"https://doi.org/10.1109/PRDC.2011.45","url":null,"abstract":"The rapid development of nanotechnology has opened up new possibilities and introduced new challenges for circuit design. It is very important to study new analysis methods for accurate circuit reliability. Few methods for evaluating circuit reliability were proposed in recent years. For example, the original probabilistic transfer matrix (PTM) model has large time and space overhead, so it can only calculate small scale circuits, the improved PTM model proposed in [2] can handle large scale circuits but it also has large time overhead. In this paper, the concept of macro-gate is defined and an iterative PTM model based on macro-gate is proposed. Based on this model, a circuit reliability evaluation algorithm that can calculate the circuit reliability from primary input to any level of the circuit is given. The complexity of the proposed algorithm related to the number of macro-gates contained in the circuit is linear. Experimental results show that the proposed method has the same accuracy as the PTM model, but it has lower time overhead for large circuits.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130244711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1