首页 > 最新文献

2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
A Systematic Mapping Review of Memory Leak Detection Techniques 内存泄漏检测技术的系统映射综述
G. Sena, Rivalino Matias
Numerous problems investigated in Software Aging and Rejuvenation (SAR) research are also of interest of other research communities. One of these problems is memory leak detection, which is one of the most recurrent topic in the SAR literature in its twenty-three years. Due to this major interest of SAR researchers on memory leak detection techniques, naturally a question emerges: how other areas deal with this problem? To answer this question we surveyed the main scientific digital libraries, from 1982 to 2017, looking for studies on memory-leak detection that were not originated in the SAR community. We found 105 papers that matched our inclusion and exclusion criteria. Our method was based on the systematic mapping review approach. The empirical findings revealed several intersections of SAR research with studies conducted in other areas, offering interesting insights on different research cooperation opportunities.
软件老化与再生(SAR)研究中的许多问题也引起了其他研究界的兴趣。其中一个问题是内存泄漏检测,这是在其23年的SAR文献中最常出现的主题之一。由于SAR研究人员对内存泄漏检测技术的主要兴趣,自然出现了一个问题:其他领域如何处理这个问题?为了回答这个问题,我们调查了1982年至2017年期间的主要科学数字图书馆,寻找并非起源于SAR社区的内存泄漏检测研究。我们发现105篇论文符合我们的纳入和排除标准。我们的方法是基于系统的制图回顾方法。实证研究结果揭示了SAR研究与其他领域研究的几个交叉点,为不同的研究合作机会提供了有趣的见解。
{"title":"A Systematic Mapping Review of Memory Leak Detection Techniques","authors":"G. Sena, Rivalino Matias","doi":"10.1109/ISSREW.2018.00017","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00017","url":null,"abstract":"Numerous problems investigated in Software Aging and Rejuvenation (SAR) research are also of interest of other research communities. One of these problems is memory leak detection, which is one of the most recurrent topic in the SAR literature in its twenty-three years. Due to this major interest of SAR researchers on memory leak detection techniques, naturally a question emerges: how other areas deal with this problem? To answer this question we surveyed the main scientific digital libraries, from 1982 to 2017, looking for studies on memory-leak detection that were not originated in the SAR community. We found 105 papers that matched our inclusion and exclusion criteria. Our method was based on the systematic mapping review approach. The empirical findings revealed several intersections of SAR research with studies conducted in other areas, offering interesting insights on different research cooperation opportunities.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":" 45","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Reliable Is My Software-Defined Network? Models and Failure Impacts 我的软件定义网络有多可靠?模型和失效影响
V. Mendiratta, L. Jagadeesan, R. Hanmer, M. Rahman
Software-Defined Networking (SDN) is a fundamental paradigm shift in communication networks, separating the network control and data planes. This separation enables the dynamic reconfiguration of the data plane at run-time through control plane software. The logically centralized control plane - the network brain - is typically realized in a distributed fashion to avoid a single point of failure, to provide redundancy of key control plane functions vis-a-vis the data plane and to provide horizontal scale-out. As SDN begins to be adopted as the underlying paradigm and platform for carrier-grade networks through the advent of open-source SDN controllers, a deep understanding of the reliability of SDNs is essential to satisfying carrier-grade requirements and fulfilling service-level agreements. To this end, we present a model of SDN reliability under control and data plane failures, that encompasses the distributed nature of the SDN control plane.
软件定义网络(SDN)是通信网络的一种基本范式转变,它将网络控制平面和数据平面分离开来。这种分离允许通过控制平面软件在运行时动态地重新配置数据平面。逻辑上集中的控制平面——网络大脑——通常以分布式方式实现,以避免单点故障,提供相对于数据平面的关键控制平面功能的冗余,并提供水平向外扩展。随着开源SDN控制器的出现,SDN开始作为运营商级网络的底层范式和平台被采用,深入了解SDN的可靠性对于满足运营商级需求和履行服务水平协议至关重要。为此,我们提出了一个SDN控制和数据平面故障下的可靠性模型,该模型包含了SDN控制平面的分布式特性。
{"title":"How Reliable Is My Software-Defined Network? Models and Failure Impacts","authors":"V. Mendiratta, L. Jagadeesan, R. Hanmer, M. Rahman","doi":"10.1109/ISSREW.2018.00-26","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00-26","url":null,"abstract":"Software-Defined Networking (SDN) is a fundamental paradigm shift in communication networks, separating the network control and data planes. This separation enables the dynamic reconfiguration of the data plane at run-time through control plane software. The logically centralized control plane - the network brain - is typically realized in a distributed fashion to avoid a single point of failure, to provide redundancy of key control plane functions vis-a-vis the data plane and to provide horizontal scale-out. As SDN begins to be adopted as the underlying paradigm and platform for carrier-grade networks through the advent of open-source SDN controllers, a deep understanding of the reliability of SDNs is essential to satisfying carrier-grade requirements and fulfilling service-level agreements. To this end, we present a model of SDN reliability under control and data plane failures, that encompasses the distributed nature of the SDN control plane.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125906083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Taming Exceptions in Android Applications 控制Android应用程序中的异常
Juliana Oliveira
The popularity of the Android platform can be attributed to their ability to run apps, end-user programs that leverage the many capabilities of mobile devices, potentially in unforeseen ways. Apps are in widespread use and App crashing is the most common cause of complaints about Android mobile phone apps according to recent studies. Android apps are usually written in the Java programming language. Java includes an exception handling mechanism that allows programs to signal the occurrence of errors by throwing exceptions and to handle these exceptions by catching them. All the Android-specific abstractions, such as activities and asynctasks, can throw exceptions when errors occur. When an app catches the exceptions that it or the libraries upon which it depends throw, it can resume its activity or, at least, fail in a graceful way. On the other hand, uncaught exceptions make the app crash. The exception handling mechanism for the Android platform has two liabilities: (1) the "Terminate ALL" approach and (2) a lack of a holistic view on exceptional behavior. This research investigates the relationship between Android abstractions and robustness of apps during evolution and proposes a new exception handling mechanism to tame exceptions in Android applications.
Android平台的受欢迎程度可以归因于其运行应用程序的能力,最终用户程序可以利用移动设备的许多功能,潜在地以不可预见的方式。应用程序被广泛使用,根据最近的研究,应用程序崩溃是人们抱怨安卓手机应用程序最常见的原因。Android应用程序通常是用Java编程语言编写的。Java包含一个异常处理机制,允许程序通过抛出异常来发出错误发生的信号,并通过捕获异常来处理这些异常。所有android特定的抽象,如活动和异步任务,都可以在错误发生时抛出异常。当应用程序捕获到它或它所依赖的库抛出的异常时,它可以恢复其活动,或者至少以一种优雅的方式失败。另一方面,未捕获的异常会使应用程序崩溃。Android平台的异常处理机制有两个缺点:(1)“Terminate ALL”方法;(2)缺乏对异常行为的整体看法。本文研究了Android抽象与应用发展过程中鲁棒性之间的关系,并提出了一种新的异常处理机制来驯服Android应用中的异常。
{"title":"Taming Exceptions in Android Applications","authors":"Juliana Oliveira","doi":"10.1109/ISSREW.2018.000-2","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.000-2","url":null,"abstract":"The popularity of the Android platform can be attributed to their ability to run apps, end-user programs that leverage the many capabilities of mobile devices, potentially in unforeseen ways. Apps are in widespread use and App crashing is the most common cause of complaints about Android mobile phone apps according to recent studies. Android apps are usually written in the Java programming language. Java includes an exception handling mechanism that allows programs to signal the occurrence of errors by throwing exceptions and to handle these exceptions by catching them. All the Android-specific abstractions, such as activities and asynctasks, can throw exceptions when errors occur. When an app catches the exceptions that it or the libraries upon which it depends throw, it can resume its activity or, at least, fail in a graceful way. On the other hand, uncaught exceptions make the app crash. The exception handling mechanism for the Android platform has two liabilities: (1) the \"Terminate ALL\" approach and (2) a lack of a holistic view on exceptional behavior. This research investigates the relationship between Android abstractions and robustness of apps during evolution and proposes a new exception handling mechanism to tame exceptions in Android applications.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Message from the ISSRE 2018 Doctoral Symposium Chairs ISSRE 2018博士研讨会主席致辞
{"title":"Message from the ISSRE 2018 Doctoral Symposium Chairs","authors":"","doi":"10.1109/issrew.2018.00-56","DOIUrl":"https://doi.org/10.1109/issrew.2018.00-56","url":null,"abstract":"","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126656976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload 基于交互SRN模型的虚拟机迁移的可用性评估
Matheus Torquato, M. Vieira
This paper presents a set of analytical models for availability evaluation of a virtualized system with VMM software rejuvenation enabled by VM migration schedule. The proposed models consider aspects of varying workload. We adopted the interacting models approach to reduce time and cost for models' evaluation. Our metrics of interest are steady-state availability and annual downtime. In our first case study, we compare the monolithic model and interacting models approach. Obtained results show a significant reduction in time for model evaluation in the interacting models approach. Our second case study presents a variety of scenarios with a varying workload. We consider the workload variation with two stages: i) peak - when the workload submitted is high; and ii) off-peak - when the workload submitted is low. The evaluation results comprise from systems without high workload demand (peakDuration = 0h per day) to systems with only high workload demand (peakDuration = 24h per day). For all considered scenarios, we present the best rejuvenation schedule to maximize system availability. In scenarios with a heavy workload, the downtime avoidance caused by software rejuvenation surpass three days.
本文提出了一套基于虚拟机迁移计划的VMM软件再生虚拟化系统可用性评估分析模型。所建议的模型考虑了不同工作负载的各个方面。我们采用交互模型的方法来减少模型评估的时间和成本。我们感兴趣的指标是稳定状态的可用性和年度停机时间。在我们的第一个案例研究中,我们比较了整体模型和交互模型方法。得到的结果表明,在相互作用模型方法中,模型评估的时间显著减少。我们的第二个案例研究展示了具有不同工作负载的各种场景。我们将工作负载的变化分为两个阶段:i)峰值-当提交的工作负载很高时;ii)非高峰—当提交的工作负载较低时。评估结果包括没有高工作负载需求的系统(peakDuration =每天0小时)和只有高工作负载需求的系统(peakDuration =每天24小时)。对于所有考虑的场景,我们提出了最佳恢复计划,以最大化系统可用性。在工作量较大的场景下,软件返修避免的停机时间超过3天。
{"title":"Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload","authors":"Matheus Torquato, M. Vieira","doi":"10.1109/ISSREW.2018.00022","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00022","url":null,"abstract":"This paper presents a set of analytical models for availability evaluation of a virtualized system with VMM software rejuvenation enabled by VM migration schedule. The proposed models consider aspects of varying workload. We adopted the interacting models approach to reduce time and cost for models' evaluation. Our metrics of interest are steady-state availability and annual downtime. In our first case study, we compare the monolithic model and interacting models approach. Obtained results show a significant reduction in time for model evaluation in the interacting models approach. Our second case study presents a variety of scenarios with a varying workload. We consider the workload variation with two stages: i) peak - when the workload submitted is high; and ii) off-peak - when the workload submitted is low. The evaluation results comprise from systems without high workload demand (peakDuration = 0h per day) to systems with only high workload demand (peakDuration = 24h per day). For all considered scenarios, we present the best rejuvenation schedule to maximize system availability. In scenarios with a heavy workload, the downtime avoidance caused by software rejuvenation surpass three days.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Approach to Identifying Error Patterns for Infrastructure as Code 一种将基础架构错误模式识别为代码的方法
Wei Chen, Guoquan Wu, Jun Wei
Infrastructure as Code (IaC), which specifies system configurations in an imperative or declarative way, automates environment set up, system deployment and configuration. Despite wide adoption, developing and maintaining high-quality IaC artifacts is still challenging. This paper proposes an approach to handling the fine-grained and frequently occurring IaC code errors. The approach extracts code changes from historical commits and clusters them into groups, by constructing a feature model of code changes and employing an unsupervised machine learning algorithm. It identifies error patterns from the clusters and proposes a set of inspection rules to check the potential IaC code errors. In practice, we take Puppet code artifacts as subject objects and perform a comprehensive study on 14 popular Puppet artifacts. In our experiment, we get 41 cross-artifact error patterns, covering 42% crawled code changes. Based on these patterns, 30 rules are proposed, covering 60% identified error patterns, to proactively check IaC artifacts. The approach would be helpful in improving code quality of IaC artifacts.
基础设施即代码(IaC)以命令式或声明式的方式指定系统配置,使环境设置、系统部署和配置自动化。尽管被广泛采用,开发和维护高质量的IaC工件仍然具有挑战性。本文提出了一种处理细粒度和频繁发生的IaC代码错误的方法。该方法通过构建代码更改的特征模型和采用无监督机器学习算法,从历史提交中提取代码更改并将其聚类成组。它从集群中识别错误模式,并提出一组检查规则来检查潜在的IaC代码错误。在实践中,我们将Puppet代码构件作为主题对象,并对14个流行的Puppet构件进行了全面的研究。在我们的实验中,我们得到41个跨工件错误模式,覆盖42%的爬行代码更改。基于这些模式,提出了30条规则,覆盖了60%已识别的错误模式,以主动检查IaC工件。该方法将有助于提高IaC构件的代码质量。
{"title":"An Approach to Identifying Error Patterns for Infrastructure as Code","authors":"Wei Chen, Guoquan Wu, Jun Wei","doi":"10.1109/ISSREW.2018.00-19","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00-19","url":null,"abstract":"Infrastructure as Code (IaC), which specifies system configurations in an imperative or declarative way, automates environment set up, system deployment and configuration. Despite wide adoption, developing and maintaining high-quality IaC artifacts is still challenging. This paper proposes an approach to handling the fine-grained and frequently occurring IaC code errors. The approach extracts code changes from historical commits and clusters them into groups, by constructing a feature model of code changes and employing an unsupervised machine learning algorithm. It identifies error patterns from the clusters and proposes a set of inspection rules to check the potential IaC code errors. In practice, we take Puppet code artifacts as subject objects and perform a comprehensive study on 14 popular Puppet artifacts. In our experiment, we get 41 cross-artifact error patterns, covering 42% crawled code changes. Based on these patterns, 30 rules are proposed, covering 60% identified error patterns, to proactively check IaC artifacts. The approach would be helpful in improving code quality of IaC artifacts.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123900126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Prioritization of Metamorphic Relations Based on Test Case Execution Properties 基于测试用例执行属性的变形关系的优先级
Madhusudan Srinivasan
A test oracle is essential for software testing. In certain complex systems, it is hard to distinguish between correct and incorrect behavior. Metamorphic testing is one of the solution to solve the test oracle problem. In metamorphic testing, metamorphic relations (MRs) are derived based on the properties exhibited by the program under test (PUT). These MRs play a major role in the generation of test data for conducting MT. The effectiveness of MRs can be determined based on the ability to detect considerable faults for the given PUT. Many metamorphic relations with different fault finding capability can be used to test the PUT and it is important to identify and prioritize the MRs based on its fault finding effectiveness. In order to answer this challenge, we propose to prioritize the MRs based on the diversity in the execution path of the source and follow-up test cases of the MRs. We propose four metrics to capture different levels of diversity in the execution behavior of the test cases for each of the derived MRs. The total weight calculated for each of the MRs using the metrics is used to prioritize the MRs.
测试oracle对于软件测试是必不可少的。在某些复杂的系统中,很难区分正确和不正确的行为。变形测试是解决测试oracle问题的一种方法。在变质试验中,根据被测程序(PUT)所显示的性质推导出变质关系(MRs)。这些MRs在生成传导MT的测试数据中起着重要作用。MRs的有效性可以根据检测给定PUT的相当大的故障的能力来确定。许多具有不同故障发现能力的变质关系可以用来测试PUT,根据其故障发现能力对MRs进行识别和排序是很重要的。为了回答这一挑战,我们建议根据源和后续测试用例的执行路径的多样性对MRs进行优先级划分。我们提出了四个度量来捕获每个派生MRs的测试用例执行行为的不同级别的多样性。使用度量为每个MRs计算的总权重用于对MRs进行优先级划分。
{"title":"Prioritization of Metamorphic Relations Based on Test Case Execution Properties","authors":"Madhusudan Srinivasan","doi":"10.1109/ISSREW.2018.000-5","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.000-5","url":null,"abstract":"A test oracle is essential for software testing. In certain complex systems, it is hard to distinguish between correct and incorrect behavior. Metamorphic testing is one of the solution to solve the test oracle problem. In metamorphic testing, metamorphic relations (MRs) are derived based on the properties exhibited by the program under test (PUT). These MRs play a major role in the generation of test data for conducting MT. The effectiveness of MRs can be determined based on the ability to detect considerable faults for the given PUT. Many metamorphic relations with different fault finding capability can be used to test the PUT and it is important to identify and prioritize the MRs based on its fault finding effectiveness. In order to answer this challenge, we propose to prioritize the MRs based on the diversity in the execution path of the source and follow-up test cases of the MRs. We propose four metrics to capture different levels of diversity in the execution behavior of the test cases for each of the derived MRs. The total weight calculated for each of the MRs using the metrics is used to prioritize the MRs.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verifiable Self-Certifying Autonomous Systems 可验证的自我认证自治系统
Michael Fisher, Emily Collins, Louise Dennis, Matt Luckcuck, M. Webster, M. Jump, Vincent Pagé, C. Patchett, F. Dinmohammadi, D. Flynn, V. Robu, Xingyu Zhao
Autonomous systems are increasingly being used in safety-and mission-critical domains, including aviation, manufacturing, healthcare and the automotive industry. Systems for such domains are often verified with respect to essential requirements set by a regulator, as part of a process called certification. In principle, autonomous systems can be deployed if they can be certified for use. However, certification is especially challenging as the condition of both the system and its environment will surely change, limiting the effective use of the system. In this paper we discuss the technological and regulatory background for such systems, and introduce an architectural framework that supports verifiably-correct dynamic self-certification by the system, potentially allowing deployed systems to operate more safely and effectively.
自主系统越来越多地应用于安全和关键任务领域,包括航空、制造业、医疗保健和汽车行业。这些领域的系统通常根据监管机构设定的基本要求进行验证,这是称为认证的过程的一部分。原则上,如果能够获得使用认证,就可以部署自主系统。然而,认证尤其具有挑战性,因为系统及其环境的条件肯定会发生变化,从而限制了系统的有效使用。在本文中,我们讨论了此类系统的技术和监管背景,并介绍了一个体系结构框架,该框架支持系统的可验证正确的动态自我认证,从而潜在地允许部署的系统更安全有效地运行。
{"title":"Verifiable Self-Certifying Autonomous Systems","authors":"Michael Fisher, Emily Collins, Louise Dennis, Matt Luckcuck, M. Webster, M. Jump, Vincent Pagé, C. Patchett, F. Dinmohammadi, D. Flynn, V. Robu, Xingyu Zhao","doi":"10.1109/ISSREW.2018.00028","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00028","url":null,"abstract":"Autonomous systems are increasingly being used in safety-and mission-critical domains, including aviation, manufacturing, healthcare and the automotive industry. Systems for such domains are often verified with respect to essential requirements set by a regulator, as part of a process called certification. In principle, autonomous systems can be deployed if they can be certified for use. However, certification is especially challenging as the condition of both the system and its environment will surely change, limiting the effective use of the system. In this paper we discuss the technological and regulatory background for such systems, and introduce an architectural framework that supports verifiably-correct dynamic self-certification by the system, potentially allowing deployed systems to operate more safely and effectively.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Enhancing HPC System Log Analysis by Identifying Message Origin in Source Code 通过在源代码中识别消息来源来增强高性能计算系统日志分析
Megan Hickman, Dakota Fulp, Elisabeth Baseman, S. Blanchard, Hugh Greenberg, William M. Jones, Nathan Debardeleben
Supercomputers, high performance computers, and clusters are composed of very large numbers of independent operating systems that are generating their own system logs. Messages are generated locally on each host and usually are transferred to a central logging infrastructure which keeps a master record of the system as a whole. At Los Alamos National Laboratory (LANL) a collection of open source cloud tools are used which log over a hundred million system log messages per day from over a dozen such systems. Understanding what source code created those messages can be extremely useful to system administrators when they are troubleshooting these complex systems as it can give insight into a subsystem (disk, network, etc.) or even line numbers of source code. Oftentimes, debugging supercomputers is done in environments where open access cannot be provided to all individuals due to security concerns. As such, providing a means for conveying information between system log messages and source code lines allows for communication between system administrators and source developers or supercomputer vendors. In this work, we demonstrate a prototype tool which aims to provide such an expert system. We leverage capabilities from ElasticSearch, one of the open source cloud tools deployed at LANL, and with our own metrics develop a means for correctly matching source code lines as well as files with high confidence. We discuss confidence metrics and show that in our experiments 92% of syslog lines were correctly matched. For any future samples, we predict with 95% confidence that the correct file will be detected between 88.2% and 95.8% of the time. Finally, we discuss enhancements that are underway to improve the tool and study it on a larger dataset.
超级计算机、高性能计算机和集群由大量独立的操作系统组成,这些操作系统生成自己的系统日志。消息在每台主机上本地生成,通常被转移到中央日志基础设施,该基础设施保留了整个系统的主记录。在洛斯阿拉莫斯国家实验室(Los Alamos National Laboratory, LANL),使用了一组开源云工具,每天从十几个这样的系统中记录超过1亿条系统日志消息。当系统管理员对这些复杂的系统进行故障排除时,了解创建这些消息的源代码非常有用,因为它可以深入了解子系统(磁盘、网络等)甚至源代码的行数。通常,调试超级计算机是在由于安全考虑而不能向所有个人提供开放访问的环境中进行的。因此,提供在系统日志消息和源代码行之间传递信息的方法允许系统管理员和源代码开发人员或超级计算机供应商之间进行通信。在这项工作中,我们展示了一个原型工具,旨在提供这样一个专家系统。我们利用了ElasticSearch (LANL部署的开源云工具之一)的功能,并使用我们自己的指标开发了一种方法,可以高可信度地正确匹配源代码行和文件。我们讨论了置信度指标,并表明在我们的实验中,92%的syslog日志行是正确匹配的。对于任何未来的样本,我们以95%的置信度预测,在88.2%到95.8%的时间内将检测到正确的文件。最后,我们讨论了正在进行的改进,以改进工具并在更大的数据集上研究它。
{"title":"Enhancing HPC System Log Analysis by Identifying Message Origin in Source Code","authors":"Megan Hickman, Dakota Fulp, Elisabeth Baseman, S. Blanchard, Hugh Greenberg, William M. Jones, Nathan Debardeleben","doi":"10.1109/ISSREW.2018.00-23","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00-23","url":null,"abstract":"Supercomputers, high performance computers, and clusters are composed of very large numbers of independent operating systems that are generating their own system logs. Messages are generated locally on each host and usually are transferred to a central logging infrastructure which keeps a master record of the system as a whole. At Los Alamos National Laboratory (LANL) a collection of open source cloud tools are used which log over a hundred million system log messages per day from over a dozen such systems. Understanding what source code created those messages can be extremely useful to system administrators when they are troubleshooting these complex systems as it can give insight into a subsystem (disk, network, etc.) or even line numbers of source code. Oftentimes, debugging supercomputers is done in environments where open access cannot be provided to all individuals due to security concerns. As such, providing a means for conveying information between system log messages and source code lines allows for communication between system administrators and source developers or supercomputer vendors. In this work, we demonstrate a prototype tool which aims to provide such an expert system. We leverage capabilities from ElasticSearch, one of the open source cloud tools deployed at LANL, and with our own metrics develop a means for correctly matching source code lines as well as files with high confidence. We discuss confidence metrics and show that in our experiments 92% of syslog lines were correctly matched. For any future samples, we predict with 95% confidence that the correct file will be detected between 88.2% and 95.8% of the time. Finally, we discuss enhancements that are underway to improve the tool and study it on a larger dataset.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124303646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing Security and Reliability for Smart- Systems' Architectures 增强智能系统架构的安全性和可靠性
Florian Hofer
The vision of a fourth industrial revolution lately strongly captured the attention of research. A Cyber-physical system (CPS) is one of the main drivers of this vision. Such system controls an underlying factory interacting with sensors, actuators and other systems creating systems-of-systems. A main point of interest is how these components are built and interconnected, i.e. the system's architecture, and how it might be improved to increase reliability and security. Unfortunately, a recently completed systematic mapping study has shown that security based research for CPS architectures is only weakly present. The target of this research is therefore to find generalized architectural models and patterns that improve reliability and security. The results will enable the improvement of reliability and security of cyber-physical systems in general, leading to a variety of application scenarios and possible use cases.
第四次工业革命的愿景最近引起了研究部门的强烈关注。网络物理系统(CPS)是实现这一愿景的主要驱动力之一。这样的系统控制着一个底层工厂,与传感器、执行器和其他系统交互,创造出系统的系统。主要关注的是这些组件是如何构建和相互连接的,即系统的体系结构,以及如何改进它以增加可靠性和安全性。不幸的是,最近完成的一项系统映射研究表明,针对CPS架构的基于安全性的研究很少。因此,本研究的目标是找到提高可靠性和安全性的通用体系结构模型和模式。研究结果将提高网络物理系统的可靠性和安全性,从而产生各种应用场景和可能的用例。
{"title":"Enhancing Security and Reliability for Smart- Systems' Architectures","authors":"Florian Hofer","doi":"10.1109/ISSREW.2018.000-8","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.000-8","url":null,"abstract":"The vision of a fourth industrial revolution lately strongly captured the attention of research. A Cyber-physical system (CPS) is one of the main drivers of this vision. Such system controls an underlying factory interacting with sensors, actuators and other systems creating systems-of-systems. A main point of interest is how these components are built and interconnected, i.e. the system's architecture, and how it might be improved to increase reliability and security. Unfortunately, a recently completed systematic mapping study has shown that security based research for CPS architectures is only weakly present. The target of this research is therefore to find generalized architectural models and patterns that improve reliability and security. The results will enable the improvement of reliability and security of cyber-physical systems in general, leading to a variety of application scenarios and possible use cases.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1