首页 > 最新文献

2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
Machine Learning Augmented Fuzzing 机器学习增强模糊
Leonid Joffe
The proposed thesis introduces cutting edge Machine Learning (ML) tools into Search Based Software Engineering (SBST). The contribution is three-fold. The first is an ML driven property targeting search strategy. It uses a deep neural network to process execution trace information to yield a likelihood score of a presence of a crash, which is in turn used as a fitness function for search. This method clearly outperforms the baseline search technique. The second contribution is a method for defining a property agnostic search landscape. This is achieved by training an autoencoder on a corpus of execution traces to produce a "latent space" representation. The expectation is to observe a tendency for arbitrary properties of executions to group in distinct regions of the latent space. Location in this space would in turn be used to direct an SBST process. The third contribution is to augment an automated tool with a generative model. The intention is to produce approximately valid input seeds that would target desired locations of a fitness landscape. These contributions will provide novel ideas for future research in the intersection of SBST and ML.
本论文将尖端机器学习(ML)工具引入基于搜索的软件工程(SBST)。贡献有三方面。第一个是机器学习驱动的房产目标搜索策略。它使用深度神经网络来处理执行跟踪信息,以产生崩溃存在的可能性评分,然后将其用作搜索的适应度函数。这种方法明显优于基线搜索技术。第二个贡献是定义与属性无关的搜索环境的方法。这是通过在执行轨迹语料库上训练自动编码器来产生“潜在空间”表示来实现的。期望观察到执行的任意属性在潜在空间的不同区域分组的趋势。该空间中的位置将反过来用于指导SBST进程。第三个贡献是用生成模型增强自动化工具。其目的是产生近似有效的输入种子,这些种子将针对健身景观的理想位置。这些贡献将为未来SBST和ML交叉领域的研究提供新的思路。
{"title":"Machine Learning Augmented Fuzzing","authors":"Leonid Joffe","doi":"10.1109/ISSREW.2018.000-1","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.000-1","url":null,"abstract":"The proposed thesis introduces cutting edge Machine Learning (ML) tools into Search Based Software Engineering (SBST). The contribution is three-fold. The first is an ML driven property targeting search strategy. It uses a deep neural network to process execution trace information to yield a likelihood score of a presence of a crash, which is in turn used as a fitness function for search. This method clearly outperforms the baseline search technique. The second contribution is a method for defining a property agnostic search landscape. This is achieved by training an autoencoder on a corpus of execution traces to produce a \"latent space\" representation. The expectation is to observe a tendency for arbitrary properties of executions to group in distinct regions of the latent space. Location in this space would in turn be used to direct an SBST process. The third contribution is to augment an automated tool with a generative model. The intention is to produce approximately valid input seeds that would target desired locations of a fitness landscape. These contributions will provide novel ideas for future research in the intersection of SBST and ML.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120954854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Software Defects Based on Cognitive Error Theories 基于认知错误理论的软件缺陷预测
Fuqun Huang, L. Strigini
As the primary cause of software defects, human error is the key to understanding and perhaps to predicting and preventing software defects. However, little research has been done to forecast software defects based on defects' cognitive nature. This paper proposes an idea for predicting software defects by applying the current scientific understanding of human error mechanisms. This new prediction method is based on the main causal mechanism underlying software defects: an error-prone scenario triggers a sequence of human error modes. Preliminary evidence for supporting this idea is presented.
作为软件缺陷的主要原因,人为错误是理解、预测和预防软件缺陷的关键。然而,基于缺陷的认知性质对软件缺陷进行预测的研究很少。本文提出了一种通过应用当前对人为错误机制的科学理解来预测软件缺陷的思想。这种新的预测方法基于软件缺陷的主要因果机制:一个容易出错的场景触发一系列人为错误模式。提出了支持这一观点的初步证据。
{"title":"Predicting Software Defects Based on Cognitive Error Theories","authors":"Fuqun Huang, L. Strigini","doi":"10.1109/ISSREW.2018.00-16","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00-16","url":null,"abstract":"As the primary cause of software defects, human error is the key to understanding and perhaps to predicting and preventing software defects. However, little research has been done to forecast software defects based on defects' cognitive nature. This paper proposes an idea for predicting software defects by applying the current scientific understanding of human error mechanisms. This new prediction method is based on the main causal mechanism underlying software defects: an error-prone scenario triggers a sequence of human error modes. Preliminary evidence for supporting this idea is presented.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ConfGuru - A System for Fully Automated Debugging of Configuration Errors 一个完全自动调试配置错误的系统
A. Andrzejak, Matthias Iacsa
Software applications routinely offer configuration settings to adapt them to specific deployment requirements. The number of available configuration options and their dependencies increase the likelihood of introducing configuration mistakes, with costly faults typically manifesting in a production environment. Automated diagnosis of configuration errors can help here, yet the practical value and acceptance of the proposed solutions depend - besides sufficient accuracy - on satisfying some non-functional requirements. These include: (i) low intrusiveness (i.e. little runtime data/instrumentation), (ii) full automation of the diagnosis process, and (iii) fast computation of a diagnosis. In this work we propose ConfGuru, an approach and a tool which attempts to fulfill all three of these requirements. ConfGuru complements and improves upon ConfDoctor, our previous (semi-automated) approach for diagnosis of configuration errors. ConfGuru adds a fast static analysis approach to identify all code locations where option values are read (so-called Option Read Points (ORPs)) in a targeted application. Previously, these locations needed to be found manually, severely limiting adoption of ConfDoctor for new targets. Furthermore, due to algorithmic optimizations we can reduce the total time for computing a diagnosis to below a minute, and streamline the analysis process. Our evaluation shows that ConfGuru can diagnose configuration errors and extract ORPs from a variety of applications with an accuracy matching previous semi-automated approaches. Simultaneously, it offers fast adaptation to new target applications and well as full process automation, and has low response time. This makes ConfGuru suitable as a practical configuration error diagnosis tool or a service for real-world scenarios.
软件应用程序通常提供配置设置,以使其适应特定的部署需求。可用配置选项的数量及其依赖关系增加了引入配置错误的可能性,而代价高昂的错误通常会在生产环境中出现。配置错误的自动诊断在这里可以提供帮助,但是所建议的解决方案的实用价值和接受程度,除了足够的准确性之外,还取决于是否满足一些非功能需求。这些包括:(i)低侵入性(即很少的运行时数据/仪器),(ii)诊断过程的完全自动化,以及(iii)诊断的快速计算。在这项工作中,我们提出了ConfGuru,一种尝试满足所有这三个需求的方法和工具。ConfGuru补充并改进了ConfDoctor,这是我们之前用于诊断配置错误的(半自动)方法。ConfGuru添加了一种快速的静态分析方法来识别目标应用程序中读取选项值的所有代码位置(所谓的选项读取点(orp))。以前,需要手动找到这些位置,这严重限制了ConfDoctor对新目标的采用。此外,由于算法优化,我们可以将计算诊断的总时间减少到一分钟以下,并简化分析过程。我们的评估表明,ConfGuru可以诊断配置错误,并从各种应用程序中提取orp,其精度与以前的半自动方法相匹配。同时,它提供了快速适应新的目标应用程序和全过程自动化,并具有较低的响应时间。这使得ConfGuru适合作为一种实用的配置错误诊断工具或服务用于实际场景。
{"title":"ConfGuru - A System for Fully Automated Debugging of Configuration Errors","authors":"A. Andrzejak, Matthias Iacsa","doi":"10.1109/ISSREW.2018.00010","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00010","url":null,"abstract":"Software applications routinely offer configuration settings to adapt them to specific deployment requirements. The number of available configuration options and their dependencies increase the likelihood of introducing configuration mistakes, with costly faults typically manifesting in a production environment. Automated diagnosis of configuration errors can help here, yet the practical value and acceptance of the proposed solutions depend - besides sufficient accuracy - on satisfying some non-functional requirements. These include: (i) low intrusiveness (i.e. little runtime data/instrumentation), (ii) full automation of the diagnosis process, and (iii) fast computation of a diagnosis. In this work we propose ConfGuru, an approach and a tool which attempts to fulfill all three of these requirements. ConfGuru complements and improves upon ConfDoctor, our previous (semi-automated) approach for diagnosis of configuration errors. ConfGuru adds a fast static analysis approach to identify all code locations where option values are read (so-called Option Read Points (ORPs)) in a targeted application. Previously, these locations needed to be found manually, severely limiting adoption of ConfDoctor for new targets. Furthermore, due to algorithmic optimizations we can reduce the total time for computing a diagnosis to below a minute, and streamline the analysis process. Our evaluation shows that ConfGuru can diagnose configuration errors and extract ORPs from a variety of applications with an accuracy matching previous semi-automated approaches. Simultaneously, it offers fast adaptation to new target applications and well as full process automation, and has low response time. This makes ConfGuru suitable as a practical configuration error diagnosis tool or a service for real-world scenarios.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"4 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Message from the WoSoCer 2018 Workshop Chairs 2018世界足球锦标赛工作坊主席致辞
H. Alemzadeh, B. Gallina, R. Natella, Kateryna Netkachova, R. Pietrantuono, Nuno Silva
{"title":"Message from the WoSoCer 2018 Workshop Chairs","authors":"H. Alemzadeh, B. Gallina, R. Natella, Kateryna Netkachova, R. Pietrantuono, Nuno Silva","doi":"10.1109/issrew.2018.00-43","DOIUrl":"https://doi.org/10.1109/issrew.2018.00-43","url":null,"abstract":"","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Supervised Learning to Guide the Selection of Software Inspectors in Industry
Maninder Singh, G. Walia, Anurag Goswami
Software development is a multi-phase process that starts with requirement engineering. Requirements elicited from different stakeholders are documented in natural language (NL) software requirement specification (SRS) document. Due to the inherent ambiguity of NL, SRS is prone to faults (e.g., ambiguity, incorrectness, inconsistency). To find and fix faults early (where they are cheapest to find), companies routinely employ inspections, where skilled inspectors are selected to review the SRS and log faults. While other researchers have attempted to understand the factors (experience and learning styles) that can guide the selection of effective inspectors but could not report improved results. This study analyzes the reading patterns (RPs) of inspectors recorded by eye-tracking equipment and evaluates their abilities to find various fault-types. The inspectors' characteristics are selected by employing ML algorithms to find the most common RPs w.r.t each fault-types. Our results show that our approach could guide the inspector selection with an accuracy ranging between 79.3% and 94% for various fault-types.
软件开发是一个从需求工程开始的多阶段过程。从不同涉众中引出的需求记录在自然语言(NL)软件需求规范(SRS)文档中。由于NL固有的模糊性,SRS容易出现错误(如歧义、不正确、不一致)。为了尽早发现和修复故障(在最便宜的地方发现故障),公司通常采用检查,选择熟练的检查人员来检查SRS并记录故障。而其他研究人员试图了解的因素(经验和学习风格),可以指导有效的检查员的选择,但不能报告改善的结果。本研究分析了眼动追踪设备记录的检查员的阅读模式(RPs),并评估了他们发现各种故障类型的能力。通过使用ML算法来选择检查员的特征,以找到每种故障类型中最常见的rp。我们的结果表明,我们的方法可以指导检查员的选择,准确率在79.3%到94%之间。
{"title":"Using Supervised Learning to Guide the Selection of Software Inspectors in Industry","authors":"Maninder Singh, G. Walia, Anurag Goswami","doi":"10.1109/ISSREW.2018.00-38","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00-38","url":null,"abstract":"Software development is a multi-phase process that starts with requirement engineering. Requirements elicited from different stakeholders are documented in natural language (NL) software requirement specification (SRS) document. Due to the inherent ambiguity of NL, SRS is prone to faults (e.g., ambiguity, incorrectness, inconsistency). To find and fix faults early (where they are cheapest to find), companies routinely employ inspections, where skilled inspectors are selected to review the SRS and log faults. While other researchers have attempted to understand the factors (experience and learning styles) that can guide the selection of effective inspectors but could not report improved results. This study analyzes the reading patterns (RPs) of inspectors recorded by eye-tracking equipment and evaluates their abilities to find various fault-types. The inspectors' characteristics are selected by employing ML algorithms to find the most common RPs w.r.t each fault-types. Our results show that our approach could guide the inspector selection with an accuracy ranging between 79.3% and 94% for various fault-types.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133364332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robotics Software Engineering and Certification: Issues and Challenges 机器人软件工程与认证:问题与挑战
R. Pietrantuono, S. Russo
As robots become increasingly intelligent and autonomous, spread well beyond the traditional area of industrial automation, and find many new critical applications - from robotics medicine to anthropic domains - we advocate the need for certification for robotics software. We discuss some relevant issues in robotics software engineering and certification, and outline some important challenges for the dependable software engineering community.
随着机器人变得越来越智能和自主,远远超出了传统的工业自动化领域,并发现了许多新的关键应用-从机器人医学到人类领域-我们主张需要对机器人软件进行认证。我们讨论了机器人软件工程和认证中的一些相关问题,并概述了可靠软件工程社区面临的一些重要挑战。
{"title":"Robotics Software Engineering and Certification: Issues and Challenges","authors":"R. Pietrantuono, S. Russo","doi":"10.1109/ISSREW.2018.00023","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00023","url":null,"abstract":"As robots become increasingly intelligent and autonomous, spread well beyond the traditional area of industrial automation, and find many new critical applications - from robotics medicine to anthropic domains - we advocate the need for certification for robotics software. We discuss some relevant issues in robotics software engineering and certification, and outline some important challenges for the dependable software engineering community.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
ISSRE 2018 Industry Track Committees ISSRE 2018行业跟踪委员会
{"title":"ISSRE 2018 Industry Track Committees","authors":"","doi":"10.1109/issrew.2018.00-57","DOIUrl":"https://doi.org/10.1109/issrew.2018.00-57","url":null,"abstract":"","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware UFO - IoT设备固件中的隐藏后门发现和安全验证
Chin-Wei Tien, Tsung-Ta Tsai, Ing-Yi Chen, S. Kuo
Recently, the use of embedded devices such as WiFi APs, IP CAM, and drones in Internet of Things (IoT) applications has become more widespread. These embedded devices are connected to networks and are often used for critical services. Thus, they receive significant attention from hackers who attempt to find a major intrusion vector in IoT applications. Hackers focus on identifying hidden backdoors in embedded devices to gain full remote access; if they gain access, they can cause significant damage to critical infrastructures. Therefore, to improve embedded device security, this study introduces Universal Firmware vulnerability Observer (UFO); UFO is a firmware vulnerability discovery system, which can automatically perform tasks such as reversing firmware embedded filesystem, identifying vulnerability, and exploring password leaks to meet the IoT firmware security verification standards, including OWASP, UL-2900, and ICSA Labs. In addition, we design a Shell Script Dependency algorithm to help identify hidden backdoor problems by discovering suspicious shell script execution paths in the extracted firmware filesystem. We use 237 real-world embedded device firmware files to evaluate UFO. The results indicate that the effectiveness of reversing firmware binary is 96%, which is significantly higher than that of open source tools. Besides, we also conclude that 73% of firmware files contain Common Vulnerabilities and Exposures in their embedded Linux kernel, 22% of firmware files can leak login passwords, and 6% of firmware files contain hidden backdoors. Moreover, we reported hidden backdoor problems to two IoT device vendors in Taiwan and received their confirmation. UFO can be successfully used for verifying firmware security and discovering hidden backdoor threats in commercial IoT devices.
最近,在物联网(IoT)应用中使用WiFi ap, IP CAM和无人机等嵌入式设备变得越来越普遍。这些嵌入式设备连接到网络,通常用于关键服务。因此,它们受到试图在物联网应用中找到主要入侵向量的黑客的极大关注。黑客专注于识别嵌入式设备中隐藏的后门,以获得完全的远程访问权限;如果他们进入,他们可能会对关键基础设施造成重大破坏。因此,为了提高嵌入式设备的安全性,本研究引入了通用固件漏洞观察者(Universal Firmware vulnerability Observer, UFO);UFO是一个固件漏洞发现系统,可以自动执行固件嵌入式文件系统反转、漏洞识别、密码泄露探索等任务,满足物联网固件安全验证标准,包括OWASP、UL-2900、ICSA Labs等。此外,我们设计了一个Shell脚本依赖算法,通过在提取的固件文件系统中发现可疑的Shell脚本执行路径来帮助识别隐藏的后门问题。我们使用237个真实的嵌入式设备固件文件来评估UFO。结果表明,反转固件二进制文件的有效性为96%,显著高于开源工具。此外,我们还得出结论,73%的固件文件在其嵌入式Linux内核中包含常见漏洞和暴露,22%的固件文件可以泄露登录密码,6%的固件文件包含隐藏后门。此外,我们向台湾的两家物联网设备供应商报告了隐藏的后门问题,并得到了他们的确认。UFO可以成功用于验证固件安全性和发现商业物联网设备中隐藏的后门威胁。
{"title":"UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware","authors":"Chin-Wei Tien, Tsung-Ta Tsai, Ing-Yi Chen, S. Kuo","doi":"10.1109/ISSREW.2018.00-37","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00-37","url":null,"abstract":"Recently, the use of embedded devices such as WiFi APs, IP CAM, and drones in Internet of Things (IoT) applications has become more widespread. These embedded devices are connected to networks and are often used for critical services. Thus, they receive significant attention from hackers who attempt to find a major intrusion vector in IoT applications. Hackers focus on identifying hidden backdoors in embedded devices to gain full remote access; if they gain access, they can cause significant damage to critical infrastructures. Therefore, to improve embedded device security, this study introduces Universal Firmware vulnerability Observer (UFO); UFO is a firmware vulnerability discovery system, which can automatically perform tasks such as reversing firmware embedded filesystem, identifying vulnerability, and exploring password leaks to meet the IoT firmware security verification standards, including OWASP, UL-2900, and ICSA Labs. In addition, we design a Shell Script Dependency algorithm to help identify hidden backdoor problems by discovering suspicious shell script execution paths in the extracted firmware filesystem. We use 237 real-world embedded device firmware files to evaluate UFO. The results indicate that the effectiveness of reversing firmware binary is 96%, which is significantly higher than that of open source tools. Besides, we also conclude that 73% of firmware files contain Common Vulnerabilities and Exposures in their embedded Linux kernel, 22% of firmware files can leak login passwords, and 6% of firmware files contain hidden backdoors. Moreover, we reported hidden backdoor problems to two IoT device vendors in Taiwan and received their confirmation. UFO can be successfully used for verifying firmware security and discovering hidden backdoor threats in commercial IoT devices.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Dependability Certification Guidelines for NFVIs through Fault Injection NFVIs故障注入可靠性认证指南
Domenico Cotroneo, L. Simone, R. Natella
Network Function Virtualization (NFV) is an emerging networking paradigm that offers new ways of creating, deploying, and managing networking services, by turning physical network functions into virtualized one. The NFV paradigm heavily relies on cloud computing and virtualization technologies to provide carrier-grade services. The certification process of NFV systems is an open and critical question to ensure that the delivered network service provides specific guarantees about performance and dependability. In this paper, we propose potential guidelines for evaluating the reliability of NFV Infrastructures (NFVIs), with the aim of verifying whether NFVIs satisfy its reliability and performance requirements even in presence of faults. The guidelines are described as a set of key practices to be followed, in terms of inputs, activities, and outputs. These practices are intended to be conducted by companies that want to evaluate the reliability of their NFVI against quantitative performance, availability, and fault tolerance objectives, and to get precise feedback on how to improve its fault tolerance.
网络功能虚拟化(NFV)是一种新兴的网络范例,它通过将物理网络功能转化为虚拟化的网络功能,提供了创建、部署和管理网络服务的新方法。NFV模式在很大程度上依赖于云计算和虚拟化技术来提供运营商级服务。NFV系统的认证过程是一个开放和关键的问题,以确保交付的网络服务提供有关性能和可靠性的具体保证。在本文中,我们提出了评估NFV基础设施(NFVIs)可靠性的潜在准则,目的是验证NFVIs在存在故障的情况下是否满足其可靠性和性能要求。这些指导方针被描述为一组需要遵循的关键实践,包括投入、活动和产出。这些实践旨在由希望根据定量性能、可用性和容错目标评估NFVI可靠性的公司执行,并获得关于如何改进其容错的精确反馈。
{"title":"Dependability Certification Guidelines for NFVIs through Fault Injection","authors":"Domenico Cotroneo, L. Simone, R. Natella","doi":"10.1109/ISSREW.2018.00025","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00025","url":null,"abstract":"Network Function Virtualization (NFV) is an emerging networking paradigm that offers new ways of creating, deploying, and managing networking services, by turning physical network functions into virtualized one. The NFV paradigm heavily relies on cloud computing and virtualization technologies to provide carrier-grade services. The certification process of NFV systems is an open and critical question to ensure that the delivered network service provides specific guarantees about performance and dependability. In this paper, we propose potential guidelines for evaluating the reliability of NFV Infrastructures (NFVIs), with the aim of verifying whether NFVIs satisfy its reliability and performance requirements even in presence of faults. The guidelines are described as a set of key practices to be followed, in terms of inputs, activities, and outputs. These practices are intended to be conducted by companies that want to evaluate the reliability of their NFVI against quantitative performance, availability, and fault tolerance objectives, and to get precise feedback on how to improve its fault tolerance.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Training Industry Practitioners to Investigate the Human Error Causes of Requirements Faults 培训行业从业者调查需求错误的人为错误原因
K. Manjunath, Vaibhav Anu, G. Walia, Gary L. Bradshaw
This paper reports an industrial study that was conducted to evaluate whether human error training procedures and instrumentation created by authors can be used to train industry software practitioners on human errors that occur during requirements engineering process. Industry practitioners were trained (using an on-line audio-visual package) to analyze requirements faults and map them to underlying human errors (i.e., the root causes of faults). Results of the study show that even though our training helped practitioners in gaining knowledge about requirements phase human errors, parts of the training procedures need to be improved. Additionally, practitioners also reported mechanisms to prevent human errors from happening during the requirements engineering process. These mechanisms can help organizations create interventions (like checklists) that can help software developers avoid committing human errors, thereby preventing faults that are caused due to these errors.
本文报告了一项工业研究,该研究旨在评估作者创建的人为错误培训程序和仪器是否可以用于培训需求工程过程中发生的人为错误的工业软件从业者。行业从业者接受了培训(使用在线视听包)来分析需求错误,并将它们映射到潜在的人为错误(即,错误的根本原因)。研究的结果表明,尽管我们的培训帮助实践者获得了关于需求阶段人为错误的知识,但是部分培训过程需要改进。此外,从业者还报告了在需求工程过程中防止人为错误发生的机制。这些机制可以帮助组织创建可以帮助软件开发人员避免犯人为错误的干预措施(如检查清单),从而防止由于这些错误而导致的故障。
{"title":"Training Industry Practitioners to Investigate the Human Error Causes of Requirements Faults","authors":"K. Manjunath, Vaibhav Anu, G. Walia, Gary L. Bradshaw","doi":"10.1109/ISSREW.2018.00-31","DOIUrl":"https://doi.org/10.1109/ISSREW.2018.00-31","url":null,"abstract":"This paper reports an industrial study that was conducted to evaluate whether human error training procedures and instrumentation created by authors can be used to train industry software practitioners on human errors that occur during requirements engineering process. Industry practitioners were trained (using an on-line audio-visual package) to analyze requirements faults and map them to underlying human errors (i.e., the root causes of faults). Results of the study show that even though our training helped practitioners in gaining knowledge about requirements phase human errors, parts of the training procedures need to be improved. Additionally, practitioners also reported mechanisms to prevent human errors from happening during the requirements engineering process. These mechanisms can help organizations create interventions (like checklists) that can help software developers avoid committing human errors, thereby preventing faults that are caused due to these errors.","PeriodicalId":321448,"journal":{"name":"2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116493712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1