首页 > 最新文献

2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing最新文献

英文 中文
Malware Profiler Based on Innovative Behavior-Awareness Technique 基于创新行为感知技术的恶意软件分析器
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.53
Shih-Yao Dai, Fedor V. Yarochkin, S. Kuo, Ming-Wei Wu, Yennun Huang
In order to steal valuable data, hackers are uninterrupted research and development new techniques to intrude computer systems. Opposite to hackers, security researchers are uninterrupted analysis and tracking new malicious techniques for protecting sensitive data. There are a lot of existing analyzers can be used to help security researchers to analyze and track new malicious techniques. However, these existing analyzers cannot provide sufficient information to security researchers to perform precise assessment and deep analysis. In this paper, we introduce a behavior-based malicious software profiler, named Holography platform, to assist security researchers to obtain sufficient information. Holography platform analyzes virtualization hardware data, including CPU instructions, CPU registers, memory data and disk data, to obtain high level behavior semantic of all running processes. High level behavior semantic can provide sufficient information to security researchers to perform precise assessment and deep analysis new malicious techniques, such as malicious advertisement attack(malvertising attack).
为了窃取有价值的数据,黑客们不间断地研究和开发侵入计算机系统的新技术。与黑客相反,安全研究人员正在不间断地分析和跟踪新的恶意技术,以保护敏感数据。有很多现有的分析工具可以用来帮助安全研究人员分析和跟踪新的恶意技术。然而,这些现有的分析工具无法为安全研究人员提供足够的信息来进行精确的评估和深入的分析。本文介绍了一种基于行为的恶意软件剖析器——全息平台,以帮助安全研究人员获取足够的信息。全息平台分析虚拟化硬件数据,包括CPU指令、CPU寄存器、内存数据和磁盘数据,获得所有运行进程的高级行为语义。高层次的行为语义可以为安全研究人员提供足够的信息,以便对恶意广告攻击(malvertising attack)等新型恶意技术进行精确评估和深入分析。
{"title":"Malware Profiler Based on Innovative Behavior-Awareness Technique","authors":"Shih-Yao Dai, Fedor V. Yarochkin, S. Kuo, Ming-Wei Wu, Yennun Huang","doi":"10.1109/PRDC.2011.53","DOIUrl":"https://doi.org/10.1109/PRDC.2011.53","url":null,"abstract":"In order to steal valuable data, hackers are uninterrupted research and development new techniques to intrude computer systems. Opposite to hackers, security researchers are uninterrupted analysis and tracking new malicious techniques for protecting sensitive data. There are a lot of existing analyzers can be used to help security researchers to analyze and track new malicious techniques. However, these existing analyzers cannot provide sufficient information to security researchers to perform precise assessment and deep analysis. In this paper, we introduce a behavior-based malicious software profiler, named Holography platform, to assist security researchers to obtain sufficient information. Holography platform analyzes virtualization hardware data, including CPU instructions, CPU registers, memory data and disk data, to obtain high level behavior semantic of all running processes. High level behavior semantic can provide sufficient information to security researchers to perform precise assessment and deep analysis new malicious techniques, such as malicious advertisement attack(malvertising attack).","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
One Optimization Method on the Navigation Performance Reliability of Planing Craft 一种平面艇航行性能可靠性优化方法
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.43
Songlin Yang, Ning Yu, Feng Zhu, Huile Li
In this paper, a comprehensive optimization mathematical model of the planing craft navigational performance reliability was established. A hierarchical parallel chaos-genetic algorithm, which is called P-CX-GA, is proposed based on parallel thinking, genetic algorithm and new chaos algorithm. The conclusion based on quantities of computation results shows that P-CX-GA is reliable and efficient. It proposed a solid foundation for hull form optimization design and evaluation analysis of the high-speed ships.
建立了平面艇航行性能可靠性综合优化数学模型。基于并行思维、遗传算法和新混沌算法,提出了一种分层并行混沌遗传算法P-CX-GA。大量的计算结果表明,P-CX-GA算法是可靠、高效的。为高速船型优化设计和评价分析提供了坚实的基础。
{"title":"One Optimization Method on the Navigation Performance Reliability of Planing Craft","authors":"Songlin Yang, Ning Yu, Feng Zhu, Huile Li","doi":"10.1109/PRDC.2011.43","DOIUrl":"https://doi.org/10.1109/PRDC.2011.43","url":null,"abstract":"In this paper, a comprehensive optimization mathematical model of the planing craft navigational performance reliability was established. A hierarchical parallel chaos-genetic algorithm, which is called P-CX-GA, is proposed based on parallel thinking, genetic algorithm and new chaos algorithm. The conclusion based on quantities of computation results shows that P-CX-GA is reliable and efficient. It proposed a solid foundation for hull form optimization design and evaluation analysis of the high-speed ships.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131019303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unification of Software Reliability Models Using Markovian Arrival Processes 基于马尔可夫到达过程的软件可靠性模型统一
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.12
H. Okamura, T. Dohi
This paper proposes an unified modeling framework of Markov-type software reliability models (SRMs) using Markovian arrival processes (MAPs). The MAP is defined as a point process whose inter-arrival time follows a phase-type distribution incorporating the correlation between successive two arrivals. This paper presents MAP representation of Markov-type SRMs, called MAP-based SRMs. This framework enables us to use generalized formulas for several reliability measures such as the expected number of failures and the software reliability which can be applied to all the Markov-type SRMs. In addition, we discuss the parameter estimation for the MAP-based SRMs from grouped failure data and find maximum likelihood estimates of all the Markov-type SRMs. The resulting MAP-based SRM is a novel approach to unifying the model-based software reliability evaluation using failure data.
提出了一种基于马尔可夫到达过程的马尔可夫软件可靠性模型的统一建模框架。MAP被定义为一个点过程,其到达时间遵循包含连续两个到达之间相关性的相位型分布。本文提出了马尔可夫型srm的MAP表示,称为基于MAP的srm。该框架使我们能够对几种可靠性度量(如预期故障数和软件可靠性)使用广义公式,这可以应用于所有马尔可夫型srm。此外,我们讨论了从分组故障数据中估计基于映射的srm的参数,并找到了所有马尔可夫型srm的最大似然估计。由此产生的基于映射的SRM是统一基于模型的软件可靠性评估的一种新方法。
{"title":"Unification of Software Reliability Models Using Markovian Arrival Processes","authors":"H. Okamura, T. Dohi","doi":"10.1109/PRDC.2011.12","DOIUrl":"https://doi.org/10.1109/PRDC.2011.12","url":null,"abstract":"This paper proposes an unified modeling framework of Markov-type software reliability models (SRMs) using Markovian arrival processes (MAPs). The MAP is defined as a point process whose inter-arrival time follows a phase-type distribution incorporating the correlation between successive two arrivals. This paper presents MAP representation of Markov-type SRMs, called MAP-based SRMs. This framework enables us to use generalized formulas for several reliability measures such as the expected number of failures and the software reliability which can be applied to all the Markov-type SRMs. In addition, we discuss the parameter estimation for the MAP-based SRMs from grouped failure data and find maximum likelihood estimates of all the Markov-type SRMs. The resulting MAP-based SRM is a novel approach to unifying the model-based software reliability evaluation using failure data.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124387616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Characterizing Attackers and Attacks: An Empirical Study 表征攻击者和攻击:一个实证研究
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.29
Gabriel Salles-Loustau, R. Berthier, Etienne Collange, Bertrand Sobesto, M. Cukier
This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and deployed over 167 days that leveraged three different honey pot configurations and a SSH-based authentication proxy to attract and follow attackers over several weeks. A total of 211 attack sessions were recorded and evidence was collected at each stage of the attack sequence: from discovery to intrusion and exploitation of rogue software. This study makes two important contributions: 1) we introduce a new approach to measure attacker skills, and 2) we leverage keystroke profile analysis to differentiate attackers beyond their IP address of origin.
本文描述了一项实证研究,以表征攻击者和针对机会目标的攻击。蜜网基础设施在167天内构建和部署,利用三种不同的蜜罐配置和基于ssh的身份验证代理,在数周内吸引和跟踪攻击者。总共记录了211次攻击会话,并收集了攻击序列的每个阶段的证据:从发现到入侵和利用流氓软件。这项研究有两个重要贡献:1)我们引入了一种新的方法来衡量攻击者的技能,2)我们利用击键配置文件分析来区分攻击者的IP来源。
{"title":"Characterizing Attackers and Attacks: An Empirical Study","authors":"Gabriel Salles-Loustau, R. Berthier, Etienne Collange, Bertrand Sobesto, M. Cukier","doi":"10.1109/PRDC.2011.29","DOIUrl":"https://doi.org/10.1109/PRDC.2011.29","url":null,"abstract":"This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey net infrastructure was built and deployed over 167 days that leveraged three different honey pot configurations and a SSH-based authentication proxy to attract and follow attackers over several weeks. A total of 211 attack sessions were recorded and evidence was collected at each stage of the attack sequence: from discovery to intrusion and exploitation of rogue software. This study makes two important contributions: 1) we introduce a new approach to measure attacker skills, and 2) we leverage keystroke profile analysis to differentiate attackers beyond their IP address of origin.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121580118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Estimating Software Intensity Function via Multiscale Analysis and Its Application to Reliability Assessment 基于多尺度分析的软件强度函数估计及其在可靠性评估中的应用
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.11
Xiao Xiao, T. Dohi
Since software fault detection process is well-modeled by a non-homogeneous Poisson process, it is of great interest to estimate accurately the intensity function from observed software-fault data. In the existing work the same authors introduced the wavelet-based techniques for this problem and found that the Haar wavelet transform provided a very powerful performance in estimating software intensity function. In this paper, we also study the Haar-wavelet-transform-based approach to be investigated from the point of view of multiscale analysis. More specifically, a Bayesian multiscale intensity estimation algorithm is employed. In numerical study with real software-fault count data, we compare the Bayesian multiscale intensity estimation with the existing non-Bayesian wavelet-based estimation as well as the conventional maximum likelihood estimation method and least squares estimation method.
由于软件故障检测过程是由非齐次泊松过程很好地建模的,因此从观测到的软件故障数据中准确估计强度函数是一个很有意义的问题。在现有的工作中,同一作者介绍了基于小波的技术来解决这个问题,并发现哈尔小波变换在估计软件强度函数方面提供了非常强大的性能。本文还从多尺度分析的角度研究了基于haar小波变换的方法。具体来说,采用贝叶斯多尺度强度估计算法。在实际软件故障计数数据的数值研究中,将贝叶斯多尺度强度估计与现有的基于非贝叶斯小波的估计以及传统的极大似然估计和最小二乘估计进行了比较。
{"title":"Estimating Software Intensity Function via Multiscale Analysis and Its Application to Reliability Assessment","authors":"Xiao Xiao, T. Dohi","doi":"10.1109/PRDC.2011.11","DOIUrl":"https://doi.org/10.1109/PRDC.2011.11","url":null,"abstract":"Since software fault detection process is well-modeled by a non-homogeneous Poisson process, it is of great interest to estimate accurately the intensity function from observed software-fault data. In the existing work the same authors introduced the wavelet-based techniques for this problem and found that the Haar wavelet transform provided a very powerful performance in estimating software intensity function. In this paper, we also study the Haar-wavelet-transform-based approach to be investigated from the point of view of multiscale analysis. More specifically, a Bayesian multiscale intensity estimation algorithm is employed. In numerical study with real software-fault count data, we compare the Bayesian multiscale intensity estimation with the existing non-Bayesian wavelet-based estimation as well as the conventional maximum likelihood estimation method and least squares estimation method.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116784335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Method of Calculating Safety Integrity Level for IEC 61508 Conformity Software IEC 61508软件安全完整性等级的计算方法
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.50
T. Fujiwara, M. Kimura, Yoshinobu Satoh, S. Yamada
In the functional safety standard (IEC 61508), development methods and quantitative analytical methods are defined for establishment of safety-related systems. However, only development methods are recommended to establish the software of safety-related systems. That is, the safety integrity level for software is determined only by the number of the development methods applied to practical safety-related system development. This is not reasonable to evaluate the safety integrity level, because various risk factors should be taken up. In this paper, we propose how to calculate the safety integrity level for software. Especially, we propose the calculation method based on software reliability growth models that have been utilized for many years in the large-scale system development.
在功能安全标准(IEC 61508)中,定义了建立安全相关系统的开发方法和定量分析方法。然而,仅推荐开发方法来建立安全相关系统的软件。也就是说,软件的安全完整性水平仅取决于应用于实际安全相关系统开发的开发方法的数量。这样评价安全完整性水平是不合理的,因为要考虑各种风险因素。本文提出了软件安全完整性等级的计算方法。特别提出了在大型系统开发中应用多年的软件可靠性增长模型的计算方法。
{"title":"A Method of Calculating Safety Integrity Level for IEC 61508 Conformity Software","authors":"T. Fujiwara, M. Kimura, Yoshinobu Satoh, S. Yamada","doi":"10.1109/PRDC.2011.50","DOIUrl":"https://doi.org/10.1109/PRDC.2011.50","url":null,"abstract":"In the functional safety standard (IEC 61508), development methods and quantitative analytical methods are defined for establishment of safety-related systems. However, only development methods are recommended to establish the software of safety-related systems. That is, the safety integrity level for software is determined only by the number of the development methods applied to practical safety-related system development. This is not reasonable to evaluate the safety integrity level, because various risk factors should be taken up. In this paper, we propose how to calculate the safety integrity level for software. Especially, we propose the calculation method based on software reliability growth models that have been utilized for many years in the large-scale system development.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130621493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Dependability Solution for Homogeneous MPSoCs 同构mpsoc的可靠性解决方案
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.16
Xiao Zhang, H. Kerkhoff
Nowadays highly dependable electronic devices are demanded by many safety-critical applications. Dependability attributes such as reliability and availability/maintainability of a many-processor system-on-chip (MPSoC) should already be examined at the design phase. Design for dependability approaches such as using available fault-free processor-cores and introducing a dependability manager infrastructural IP for self-test and evaluation can greatly enhance the dependability of an MPSoC. This is further supported by subsequent software-based repair. Design choices such as test fault coverage, test and repair time are examined to optimize the dependability attributes. Utilizing existing infrastructures like a network-on-chip (NoC) and tile-wrappers are needed to ensure a test can be performed at application run-time. An example design following the proposed design for dependability approach is shown. The MPSoC has been processed and measurement results have validated the proposed dependability approach.
如今,许多安全关键应用都要求高度可靠的电子设备。可靠性属性,如多处理器片上系统(MPSoC)的可靠性和可用性/可维护性,应该在设计阶段就进行检查。可靠性方法的设计,如使用可用的无故障处理器内核和引入可靠性管理器基础架构IP进行自测和评估,可以大大提高MPSoC的可靠性。后续的基于软件的修复进一步支持这一点。设计选择,如测试故障覆盖率,测试和修复时间进行检查,以优化可靠性属性。需要利用现有的基础设施,如片上网络(NoC)和贴片包装器,以确保可以在应用程序运行时执行测试。给出了采用可靠性设计方法的一个设计实例。对MPSoC进行了处理,测量结果验证了所提出的可靠性方法。
{"title":"A Dependability Solution for Homogeneous MPSoCs","authors":"Xiao Zhang, H. Kerkhoff","doi":"10.1109/PRDC.2011.16","DOIUrl":"https://doi.org/10.1109/PRDC.2011.16","url":null,"abstract":"Nowadays highly dependable electronic devices are demanded by many safety-critical applications. Dependability attributes such as reliability and availability/maintainability of a many-processor system-on-chip (MPSoC) should already be examined at the design phase. Design for dependability approaches such as using available fault-free processor-cores and introducing a dependability manager infrastructural IP for self-test and evaluation can greatly enhance the dependability of an MPSoC. This is further supported by subsequent software-based repair. Design choices such as test fault coverage, test and repair time are examined to optimize the dependability attributes. Utilizing existing infrastructures like a network-on-chip (NoC) and tile-wrappers are needed to ensure a test can be performed at application run-time. An example design following the proposed design for dependability approach is shown. The MPSoC has been processed and measurement results have validated the proposed dependability approach.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115237645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bio-inspired Error Detection for Complex Systems 复杂系统的仿生误差检测
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.27
M. Drozda, I. Bate, J. Timmis
In a number of areas, for example, sensor networks and systems of systems, complex networks are being used as part of applications that have to be dependable and safe. A common feature of these networks is they operate in a de-centralised manner and are formed in an ad-hoc manner and are often based on individual nodes that were not originally developed specifically for the situation that they are to be used. In addition, the nodes and their environment will have different behaviours over time, and there will be little knowledge during development of how they will interact. A key challenge is therefore how to understand what behaviour is normal from that which is abnormal so that the abnormal behaviour can be detected, and be prevented from affecting other parts of the system where appropriate recovery can then be performed. In this paper we review the state of the art in bio-inspired approaches, discuss how they can be used for error detection as part of providing a safe dependable sensor network, and then provide and evaluate an efficient and effective approach to error detection.
在许多领域,例如,传感器网络和系统的系统,复杂的网络被用作必须可靠和安全的应用程序的一部分。这些网络的一个共同特点是它们以去中心化的方式运行,并以一种特别的方式形成,并且通常基于单个节点,这些节点最初不是专门为它们将要使用的情况而开发的。此外,随着时间的推移,节点及其环境将具有不同的行为,并且在开发过程中对它们如何交互知之甚少。因此,一个关键的挑战是如何理解哪些行为是正常的,哪些行为是异常的,以便可以检测到异常行为,并防止其影响系统的其他部分,然后可以执行适当的恢复。在本文中,我们回顾了生物启发方法的最新进展,讨论了如何将它们用于错误检测,作为提供安全可靠的传感器网络的一部分,然后提供和评估一种高效有效的错误检测方法。
{"title":"Bio-inspired Error Detection for Complex Systems","authors":"M. Drozda, I. Bate, J. Timmis","doi":"10.1109/PRDC.2011.27","DOIUrl":"https://doi.org/10.1109/PRDC.2011.27","url":null,"abstract":"In a number of areas, for example, sensor networks and systems of systems, complex networks are being used as part of applications that have to be dependable and safe. A common feature of these networks is they operate in a de-centralised manner and are formed in an ad-hoc manner and are often based on individual nodes that were not originally developed specifically for the situation that they are to be used. In addition, the nodes and their environment will have different behaviours over time, and there will be little knowledge during development of how they will interact. A key challenge is therefore how to understand what behaviour is normal from that which is abnormal so that the abnormal behaviour can be detected, and be prevented from affecting other parts of the system where appropriate recovery can then be performed. In this paper we review the state of the art in bio-inspired approaches, discuss how they can be used for error detection as part of providing a safe dependable sensor network, and then provide and evaluate an efficient and effective approach to error detection.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124233774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
RAMpage: Graceful Degradation Management for Memory Errors in Commodity Linux Servers RAMpage:商用Linux服务器中内存错误的优雅降级管理
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.20
Horst Schirmeier, J. Neuhalfen, Ingo Korb, O. Spinczyk, M. Engel
Memory errors are a major source of reliability problems in current computers. Undetected errors may result in program termination, or, even worse, silent data corruption. Recent studies have shown that the frequency of permanent memory errors is an order of magnitude higher than previously assumed and regularly affects everyday operation. Often, neither additional circuitry to support hardware-based error detection nor downtime for performing hardware tests can be afforded. In the case of permanent memory errors, a system faces two challenges: detecting errors as early as possible and handling them while avoiding system downtime. To increase system reliability, we have developed RAMpage, an online memory testing infrastructure for commodity x86-64-based Linux servers, which is capable of efficiently detecting memory errors and which provides graceful degradation by withdrawing affected memory pages from further use. We describe the design and implementation of RAMpage and present results of an extensive qualitative as well as quantitative evaluation.
内存错误是当前计算机可靠性问题的一个主要来源。未检测到的错误可能会导致程序终止,或者更糟糕的是,无声的数据损坏。最近的研究表明,永久性记忆错误的频率比以前假设的要高一个数量级,并且经常影响日常操作。通常,既不能提供额外的电路来支持基于硬件的错误检测,也不能提供执行硬件测试的停机时间。在永久性内存错误的情况下,系统面临两个挑战:尽早检测错误并在避免系统停机的同时处理错误。为了提高系统可靠性,我们开发了RAMpage,这是一种用于商用x86-64 Linux服务器的在线内存测试基础设施,它能够有效地检测内存错误,并通过从进一步使用中提取受影响的内存页来提供优雅的降级。我们描述了RAMpage的设计和实施,并介绍了广泛的定性和定量评估的结果。
{"title":"RAMpage: Graceful Degradation Management for Memory Errors in Commodity Linux Servers","authors":"Horst Schirmeier, J. Neuhalfen, Ingo Korb, O. Spinczyk, M. Engel","doi":"10.1109/PRDC.2011.20","DOIUrl":"https://doi.org/10.1109/PRDC.2011.20","url":null,"abstract":"Memory errors are a major source of reliability problems in current computers. Undetected errors may result in program termination, or, even worse, silent data corruption. Recent studies have shown that the frequency of permanent memory errors is an order of magnitude higher than previously assumed and regularly affects everyday operation. Often, neither additional circuitry to support hardware-based error detection nor downtime for performing hardware tests can be afforded. In the case of permanent memory errors, a system faces two challenges: detecting errors as early as possible and handling them while avoiding system downtime. To increase system reliability, we have developed RAMpage, an online memory testing infrastructure for commodity x86-64-based Linux servers, which is capable of efficiently detecting memory errors and which provides graceful degradation by withdrawing affected memory pages from further use. We describe the design and implementation of RAMpage and present results of an extensive qualitative as well as quantitative evaluation.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127926076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Workload Adaptive Checkpoint Scheduling of Virtual Machine Replication 虚拟机复制工作负载自适应检查点调度
Pub Date : 2011-12-12 DOI: 10.1109/PRDC.2011.32
Balazs Gerofi, Y. Ishikawa
Checkpoint-recovery based Virtual Machine (VM) replication is an emerging approach towards accommodating VM installations with high availability, especially, due to its inherent capability of tackling with symmetric multiprocessing (SMP) virtual machines, i.e. VMs with multiple virtual CPUs (vCPUs). However, it comes with the price of significant performance degradation of the application executed in the VM because of the large amount of state that needs to be synchronized between the primary and the backup machines. Previous research improving VM replication performance focused primarily on decreasing the amount of data transferred over the network, while relying on constant checkpoint frequency. Our goal is to investigate how and to what extent performance degradation can be mitigated by adjusting the checkpoint period dynamically. We provide a comprehensive analysis of various workloads from the aspect of VM replication, paying special attention to their behavior over the increasing number of vCPUs in the system. We propose several heuristics for scheduling replication checkpoints in order to improve quality of service. Our algorithm adapts dynamically to the properties of the workload being executed in the VM, such as changes in the number of dirtied memory pages, network and disk I/O operations, as well as to the network bandwidth available for replication. We evaluate our scheduling algorithm over two network architectures, Gigabit Ethernet and Infiniband, a high-performance interconnect fabric. We find that checkpoint scheduling has a great impact on the performance of replicated virtual machines, and show that replicated virtual machines with up to 16 vCPUs can attain performance close to the native VM execution, not only over high-performance, but also over commercial network architectures.
基于检查点恢复的虚拟机(VM)复制是一种新兴的方法,用于适应具有高可用性的虚拟机安装,特别是由于其固有的处理对称多处理(SMP)虚拟机的能力,即具有多个虚拟cpu (vcpu)的虚拟机。但是,它的代价是在VM中执行的应用程序的性能显著下降,因为需要在主计算机和备份计算机之间同步大量的状态。以前提高VM复制性能的研究主要集中在减少通过网络传输的数据量,同时依赖于恒定的检查点频率。我们的目标是研究如何以及在多大程度上通过动态调整检查点周期来减轻性能下降。我们从VM复制的角度对各种工作负载进行了全面的分析,特别关注它们在系统中vcpu数量增加时的行为。为了提高服务质量,我们提出了几种调度复制检查点的启发式方法。我们的算法动态地适应在VM中执行的工作负载的属性,例如dirty内存页面、网络和磁盘I/O操作数量的变化,以及可用于复制的网络带宽。我们在两种网络架构上评估我们的调度算法,千兆以太网和Infiniband,一种高性能的互连结构。我们发现检查点调度对复制虚拟机的性能有很大的影响,并表明具有多达16个vcpu的复制虚拟机可以获得接近本机VM执行的性能,不仅在高性能方面,而且在商业网络架构上。
{"title":"Workload Adaptive Checkpoint Scheduling of Virtual Machine Replication","authors":"Balazs Gerofi, Y. Ishikawa","doi":"10.1109/PRDC.2011.32","DOIUrl":"https://doi.org/10.1109/PRDC.2011.32","url":null,"abstract":"Checkpoint-recovery based Virtual Machine (VM) replication is an emerging approach towards accommodating VM installations with high availability, especially, due to its inherent capability of tackling with symmetric multiprocessing (SMP) virtual machines, i.e. VMs with multiple virtual CPUs (vCPUs). However, it comes with the price of significant performance degradation of the application executed in the VM because of the large amount of state that needs to be synchronized between the primary and the backup machines. Previous research improving VM replication performance focused primarily on decreasing the amount of data transferred over the network, while relying on constant checkpoint frequency. Our goal is to investigate how and to what extent performance degradation can be mitigated by adjusting the checkpoint period dynamically. We provide a comprehensive analysis of various workloads from the aspect of VM replication, paying special attention to their behavior over the increasing number of vCPUs in the system. We propose several heuristics for scheduling replication checkpoints in order to improve quality of service. Our algorithm adapts dynamically to the properties of the workload being executed in the VM, such as changes in the number of dirtied memory pages, network and disk I/O operations, as well as to the network bandwidth available for replication. We evaluate our scheduling algorithm over two network architectures, Gigabit Ethernet and Infiniband, a high-performance interconnect fabric. We find that checkpoint scheduling has a great impact on the performance of replicated virtual machines, and show that replicated virtual machines with up to 16 vCPUs can attain performance close to the native VM execution, not only over high-performance, but also over commercial network architectures.","PeriodicalId":254760,"journal":{"name":"2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1