首页 > 最新文献

2014 Tenth European Dependable Computing Conference最新文献

英文 中文
A DSL-Supported Workflow for the Automated Assembly of Large Stochastic Models 支持dsl的大型随机模型自动装配工作流
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.33
Leonardo Montecchi, P. Lollini, A. Bondavalli
Dependability and performance analysis of modern systems is facing great challenges: their scale is growing, they are becoming massively distributed, interconnected, and evolving. Such complexity makes model-based assessment a difficult and time-consuming task. For the evaluation of large systems, reusable sub models are typically adopted as an effective way to address the complexity and improve the maintanability of models. Approaches based on Stochastic Petri Nets often compose sub models by state-sharing, following predefined "patterns", depending on the scenario of interest. However, such composition patterns are typically not formalized. Clearly defining libraries of reusable sub models, together with valid patterns for their composition, would allow complex models to be automatically assembled, based on a high-level description of the scenario to be evaluated. The contribution of this paper to this problem is twofold: on one hand we describe our workflow for the automated generation of large per formability models, on the other hand we introduce the TMDL language, a DSL to concretely support the workflow. After introducing the approach and the language, we detail their implementation within the Eclipse modeling platform, and briefly show its usage through an example.
现代系统的可靠性和性能分析正面临着巨大的挑战:它们的规模正在增长,它们正变得大规模分布、相互连接和不断发展。这种复杂性使得基于模型的评估成为一项困难且耗时的任务。对于大型系统的评估,通常采用可重用子模型作为解决模型复杂性和提高模型可维护性的有效方法。基于随机Petri网的方法通常通过状态共享组成子模型,遵循预定义的“模式”,取决于感兴趣的场景。然而,这样的组合模式通常没有形式化。清晰地定义可重用子模型库,以及它们组合的有效模式,将允许基于要评估的场景的高级描述自动组装复杂模型。本文对该问题的贡献有两个方面:一方面,我们描述了自动生成大型可成形模型的工作流程;另一方面,我们引入了TMDL语言,一种具体支持工作流的DSL。在介绍了该方法和语言之后,我们将详细介绍它们在Eclipse建模平台中的实现,并通过一个示例简要展示其用法。
{"title":"A DSL-Supported Workflow for the Automated Assembly of Large Stochastic Models","authors":"Leonardo Montecchi, P. Lollini, A. Bondavalli","doi":"10.1109/EDCC.2014.33","DOIUrl":"https://doi.org/10.1109/EDCC.2014.33","url":null,"abstract":"Dependability and performance analysis of modern systems is facing great challenges: their scale is growing, they are becoming massively distributed, interconnected, and evolving. Such complexity makes model-based assessment a difficult and time-consuming task. For the evaluation of large systems, reusable sub models are typically adopted as an effective way to address the complexity and improve the maintanability of models. Approaches based on Stochastic Petri Nets often compose sub models by state-sharing, following predefined \"patterns\", depending on the scenario of interest. However, such composition patterns are typically not formalized. Clearly defining libraries of reusable sub models, together with valid patterns for their composition, would allow complex models to be automatically assembled, based on a high-level description of the scenario to be evaluated. The contribution of this paper to this problem is twofold: on one hand we describe our workflow for the automated generation of large per formability models, on the other hand we introduce the TMDL language, a DSL to concretely support the workflow. After introducing the approach and the language, we detail their implementation within the Eclipse modeling platform, and briefly show its usage through an example.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards a Dependability Control Center for Large Software Landscapes (Short Paper) 面向大型软件景观的可靠性控制中心(短文)
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.12
Florian Fittkau, A. Hoorn, W. Hasselbring
Manual management of dependability while operating large software systems - including failure detection, diagnosis, repair, and prevention activities - is time-consuming and error-prone. Various automatic approaches supporting these activities have been proposed, e.g., to detect and diagnose performance degradation effects caused by software aging and to execute reactive or proactive rejuvenation actions. However, users often mistrust fully-automatic dependability management approaches due to a lack of control over the change actions conducted to the business-critical software landscape. Building trust for automatic systems is challenging. In this paper, we present our envisioned control center for a semi-automatic management of large software landscapes, featured by a graphical user interface including interactive system visualizations. The control center will provide a reusable platform for integrating techniques for dependability management, including monitoring, and analyzing a system's dependability during production as well as for planning and executing reactive or proactive change actions to the software landscape.
在操作大型软件系统时,手工管理可靠性——包括故障检测、诊断、修复和预防活动——既耗时又容易出错。已经提出了各种支持这些活动的自动方法,例如,检测和诊断由软件老化引起的性能下降影响,并执行反应性或主动恢复操作。然而,用户经常不信任全自动的可靠性管理方法,因为缺乏对业务关键软件环境的变更操作的控制。建立对自动系统的信任是具有挑战性的。在本文中,我们提出了我们设想的控制中心,用于大型软件景观的半自动管理,其特点是图形用户界面,包括交互式系统可视化。控制中心将提供一个可重用的平台,用于集成可靠性管理技术,包括在生产过程中监控和分析系统的可靠性,以及计划和执行对软件环境的反应性或主动性更改操作。
{"title":"Towards a Dependability Control Center for Large Software Landscapes (Short Paper)","authors":"Florian Fittkau, A. Hoorn, W. Hasselbring","doi":"10.1109/EDCC.2014.12","DOIUrl":"https://doi.org/10.1109/EDCC.2014.12","url":null,"abstract":"Manual management of dependability while operating large software systems - including failure detection, diagnosis, repair, and prevention activities - is time-consuming and error-prone. Various automatic approaches supporting these activities have been proposed, e.g., to detect and diagnose performance degradation effects caused by software aging and to execute reactive or proactive rejuvenation actions. However, users often mistrust fully-automatic dependability management approaches due to a lack of control over the change actions conducted to the business-critical software landscape. Building trust for automatic systems is challenging. In this paper, we present our envisioned control center for a semi-automatic management of large software landscapes, featured by a graphical user interface including interactive system visualizations. The control center will provide a reusable platform for integrating techniques for dependability management, including monitoring, and analyzing a system's dependability during production as well as for planning and executing reactive or proactive change actions to the software landscape.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117116909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking 基于随机博弈的DNS带宽放大攻击的概率模型检验分析
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.37
Tushar Deshpande, P. Katsaros, S. Smolka, S. Stoller
The Domain Name System (DNS) is an Internet-wide, hierarchical naming system used to translate domain names into numeric IP addresses. Any disruption of DNS service can have serious consequences. We present a formal game-theoretic analysis of a notable threat to DNS, namely the bandwidth amplification attack (BAA), and the countermeasures designed to defend against it. We model the DNS BAA as a two-player, turn-based, zero-sum stochastic game between an attacker and a defender. The attacker attempts to flood a victim DNS server with malicious traffic by choosing an appropriate number of zombie machines with which to attack. In response, the defender chooses among five BAA countermeasures, each of which seeks to increase the amount of legitimate traffic the victim server processes. To simplify the model and optimize the analysis, our model does not explicitly track the handling of each packet. Instead, our model is based on calculations of the rates at which the relevant kinds of events occur in each state. We use our game-based model of DNS BAA to generate optimal attack strategies, which vary the number of zombies, and optimal defense strategies, which aim to enhance the utility of the BAA countermeasures by combining them in advantageous ways. The goal of these strategies is to optimize the attacker's and defender's payoffs, which are defined using probabilistic reward-based properties, and are measured in terms of the attacker's ability to minimize the volume of legitimate traffic that is processed, and the defender's ability to maximize the volume of legitimate traffic that is processed.
域名系统(DNS)是一个互联网范围内的分层命名系统,用于将域名转换为数字IP地址。任何DNS服务的中断都可能导致严重的后果。我们提出了一个正式的博弈论分析对DNS的显著威胁,即带宽放大攻击(BAA),并设计了防御它的对策。我们将DNS BAA建模为攻击者和防御者之间的双人、回合制、零和随机博弈。攻击者通过选择适当数量的僵尸机器进行攻击,试图用恶意流量淹没受害者DNS服务器。作为响应,防御者从五种BAA对策中选择,每一种对策都旨在增加受害服务器处理的合法流量。为了简化模型并优化分析,我们的模型没有显式地跟踪每个数据包的处理。相反,我们的模型是基于对相关事件在每个州发生的速率的计算。我们利用基于博弈的DNS BAA模型,生成了改变僵尸数量的最优攻击策略和最优防御策略,旨在通过将它们以有利的方式组合在一起,提高BAA对策的效用。这些策略的目标是优化攻击者和防御者的收益,这些收益使用基于概率奖励的属性来定义,并根据攻击者最小化处理的合法流量的能力和防御者最大化处理的合法流量的能力来衡量。
{"title":"Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking","authors":"Tushar Deshpande, P. Katsaros, S. Smolka, S. Stoller","doi":"10.1109/EDCC.2014.37","DOIUrl":"https://doi.org/10.1109/EDCC.2014.37","url":null,"abstract":"The Domain Name System (DNS) is an Internet-wide, hierarchical naming system used to translate domain names into numeric IP addresses. Any disruption of DNS service can have serious consequences. We present a formal game-theoretic analysis of a notable threat to DNS, namely the bandwidth amplification attack (BAA), and the countermeasures designed to defend against it. We model the DNS BAA as a two-player, turn-based, zero-sum stochastic game between an attacker and a defender. The attacker attempts to flood a victim DNS server with malicious traffic by choosing an appropriate number of zombie machines with which to attack. In response, the defender chooses among five BAA countermeasures, each of which seeks to increase the amount of legitimate traffic the victim server processes. To simplify the model and optimize the analysis, our model does not explicitly track the handling of each packet. Instead, our model is based on calculations of the rates at which the relevant kinds of events occur in each state. We use our game-based model of DNS BAA to generate optimal attack strategies, which vary the number of zombies, and optimal defense strategies, which aim to enhance the utility of the BAA countermeasures by combining them in advantageous ways. The goal of these strategies is to optimize the attacker's and defender's payoffs, which are defined using probabilistic reward-based properties, and are measured in terms of the attacker's ability to minimize the volume of legitimate traffic that is processed, and the defender's ability to maximize the volume of legitimate traffic that is processed.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Deviation Estimation between Distributed Data Streams 分布式数据流之间的偏差估计
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.27
E. Anceaume, Yann Busnel
The analysis of massive data streams is fundamental in many monitoring applications. In particular, for networks operators, it is a recurrent and crucial issue to determine whether huge data streams, received at their monitored devices, are correlated or not as it may reveal the presence of malicious activities in the network system. We propose a metric, called our metric, that allows to evaluate the correlation between distributed streams. This metric is inspired from classical metric in statistics and probability theory, and as such allows us to understand how observed quantities change together, and in which proportion. We then propose to estimate the our metric in the data stream model. In this model, functions are estimated on a huge sequence of data items, in an online fashion, and with a very small amount of memory with respect to both the size of the input stream and the values domain from which data items are drawn. We give upper and lower bounds on the quality of the our metric, and provide both local and distributed algorithms that additively approximates the our metric among n data streams by using math cal Oleft((1/varepsilon)log(1/delta)left(log N + log mright)right) bits of space for each of the n nodes, where N is the domain value from which data items are drawn, and m is the maximal stream's length. To the best of our knowledge, such a metric has never been proposed so far.
分析海量数据流是许多监控应用的基础。特别是,对于网络运营商来说,确定其监控设备接收到的巨大数据流是否相关是一个反复出现的关键问题,因为它可能会揭示网络系统中存在恶意活动。我们提出了一个度量,称为我们的度量,它允许评估分布式流之间的相关性。这个度量的灵感来自于统计学和概率论中的经典度量,因此我们可以理解观察到的量是如何一起变化的,以及以何种比例变化的。然后,我们建议在数据流模型中估计我们的度量。在此模型中,以在线方式对大量数据项序列进行函数估计,并且相对于输入流的大小和从中绘制数据项的值域而言,使用非常少的内存。我们给出了度量质量的上界和下界,并提供了本地和分布式算法,通过使用数学称为olleft ((1/varepsilon)log(1/delta)left(log n + log mright)right)位空间来加法近似n个数据流中的度量,其中n是绘制数据项的域值,m是最大流的长度。据我们所知,迄今为止还没有人提出过这样的度量标准。
{"title":"Deviation Estimation between Distributed Data Streams","authors":"E. Anceaume, Yann Busnel","doi":"10.1109/EDCC.2014.27","DOIUrl":"https://doi.org/10.1109/EDCC.2014.27","url":null,"abstract":"The analysis of massive data streams is fundamental in many monitoring applications. In particular, for networks operators, it is a recurrent and crucial issue to determine whether huge data streams, received at their monitored devices, are correlated or not as it may reveal the presence of malicious activities in the network system. We propose a metric, called our metric, that allows to evaluate the correlation between distributed streams. This metric is inspired from classical metric in statistics and probability theory, and as such allows us to understand how observed quantities change together, and in which proportion. We then propose to estimate the our metric in the data stream model. In this model, functions are estimated on a huge sequence of data items, in an online fashion, and with a very small amount of memory with respect to both the size of the input stream and the values domain from which data items are drawn. We give upper and lower bounds on the quality of the our metric, and provide both local and distributed algorithms that additively approximates the our metric among n data streams by using math cal Oleft((1/varepsilon)log(1/delta)left(log N + log mright)right) bits of space for each of the n nodes, where N is the domain value from which data items are drawn, and m is the maximal stream's length. To the best of our knowledge, such a metric has never been proposed so far.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122060660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Markov Modeling of Availability and Unavailability Data 可用性和不可用性数据的马尔可夫建模
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.22
P. Buchholz, J. Kriege
Markov models are often used in performance and dependability analysis and allow a precise and numerically stable computation of many result measures including those which result from rare events. It is, however, known that simple exponential distributions, which are the base of Markov modeling, cannot adequately describe the duration of availability or unavailability intervals of components in a distributed system. Commonly used in modeling those durations are Weibull, log-normal or Pareto distributions that can also capture a possibly heavy tailed behavior but cannot be analyzed analytically or numerically. An alternative to applying the mentioned distributions in modeling availability or unavailability intervals are phase type distributions and Markovian arrival processes that still result in a Markov model. Based on experiments for a large number of publically available availability traces, we show that phase type distributions are a flexible alternative to other commonly known distributions and even more that Markov models can be easily extended to capture also correlation in the length of availability or unavailability intervals.
马尔可夫模型经常用于性能和可靠性分析,它允许对许多结果度量进行精确和数值稳定的计算,包括那些由罕见事件引起的结果度量。然而,众所周知,作为马尔可夫建模基础的简单指数分布不能充分描述分布式系统中组件的可用性或不可用间隔的持续时间。通常用于建模这些持续时间的是威布尔分布,对数正态分布或帕累托分布,这些分布也可以捕获可能的重尾行为,但无法进行分析或数值分析。在可用性或不可用性区间建模中应用上述分布的另一种选择是阶段类型分布和马尔可夫到达过程,它们仍然会导致马尔可夫模型。基于对大量公开可用性跟踪的实验,我们表明阶段类型分布是其他已知分布的灵活替代方案,甚至马尔可夫模型可以很容易地扩展到捕获可用性或不可用间隔长度的相关性。
{"title":"Markov Modeling of Availability and Unavailability Data","authors":"P. Buchholz, J. Kriege","doi":"10.1109/EDCC.2014.22","DOIUrl":"https://doi.org/10.1109/EDCC.2014.22","url":null,"abstract":"Markov models are often used in performance and dependability analysis and allow a precise and numerically stable computation of many result measures including those which result from rare events. It is, however, known that simple exponential distributions, which are the base of Markov modeling, cannot adequately describe the duration of availability or unavailability intervals of components in a distributed system. Commonly used in modeling those durations are Weibull, log-normal or Pareto distributions that can also capture a possibly heavy tailed behavior but cannot be analyzed analytically or numerically. An alternative to applying the mentioned distributions in modeling availability or unavailability intervals are phase type distributions and Markovian arrival processes that still result in a Markov model. Based on experiments for a large number of publically available availability traces, we show that phase type distributions are a flexible alternative to other commonly known distributions and even more that Markov models can be easily extended to capture also correlation in the length of availability or unavailability intervals.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132465352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Speculative Software Modification and its Use in Securing SOUP 投机性软件修改及其在保护SOUP中的应用
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.29
Benjamin D. Rodes, J. Knight
We present an engineering process model for generating software modifications that is designed to be used when either most or all development artifacts about the software, including the source code, are unavailable. This kind of software, commonly called Software Of Unknown Provenance (SOUP), raises many doubts about the existence and adequacy of desired dependability properties, for example security. These doubts motivate some users to apply modifications to enhance dependability properties of the software, however, without necessary development artifacts, modifications are made in a state of uncertainty and risk. We investigate enhancing dependability through software modification in the presence of these risks as an engineering problem and introduce an engineering process for generating software modifications called Speculative Software Modification (SSM). We present the motivation and guiding principles of SSM, and a case study of SSM applied to protect software against buffer overflow attacks when only the binary is available.
我们提出了一个用于生成软件修改的工程过程模型,该模型被设计为在大多数或所有关于软件的开发工件(包括源代码)不可用时使用。这种类型的软件,通常称为未知来源的软件(SOUP),引起了许多关于期望的可靠性属性(例如安全性)是否存在和是否充足的疑问。这些疑问促使一些用户应用修改来增强软件的可靠性属性,然而,如果没有必要的开发工件,则修改是在不确定和有风险的状态下进行的。我们研究了在存在这些风险的情况下通过软件修改来提高可靠性,并将其作为一个工程问题,并引入了一个用于生成软件修改的工程过程,称为推测性软件修改(SSM)。我们介绍了SSM的动机和指导原则,并研究了SSM在只有二进制文件可用时保护软件免受缓冲区溢出攻击的案例。
{"title":"Speculative Software Modification and its Use in Securing SOUP","authors":"Benjamin D. Rodes, J. Knight","doi":"10.1109/EDCC.2014.29","DOIUrl":"https://doi.org/10.1109/EDCC.2014.29","url":null,"abstract":"We present an engineering process model for generating software modifications that is designed to be used when either most or all development artifacts about the software, including the source code, are unavailable. This kind of software, commonly called Software Of Unknown Provenance (SOUP), raises many doubts about the existence and adequacy of desired dependability properties, for example security. These doubts motivate some users to apply modifications to enhance dependability properties of the software, however, without necessary development artifacts, modifications are made in a state of uncertainty and risk. We investigate enhancing dependability through software modification in the presence of these risks as an engineering problem and introduce an engineering process for generating software modifications called Speculative Software Modification (SSM). We present the motivation and guiding principles of SSM, and a case study of SSM applied to protect software against buffer overflow attacks when only the binary is available.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121156822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Approach for Assessing the Impact of Dependability on Usability: Application to Interactive Cockpits 一种评估可靠性对可用性影响的方法:在交互式驾驶舱中的应用
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.17
Camille Fayollas, C. Martinie, Philippe A. Palanque, Y. Déléris, J. Fabre, D. Navarre
A cockpit (also called flight deck) is an interactive environment of an aircraft which enables both pilot and first officer to monitor the aircraft systems and to control them. Allowing the crew to control aircraft systems through display unit by using keyboard and cursor control unit is one of the main novelties in the new generation cockpits based on ARINC 661 standard. Currently only secondary aircraft systems are managed using such interactive cockpits. Generalisation to other aircraft systems would require introducing mechanisms aiming at ensuring the fault-tolerance of such interaction in cockpits. Such mechanisms would allow designers to take into account the new functions' safety requirement. However, it is possible that such mechanisms may have consequences (positive and/or negative ones) on the crew activities. This paper reports studies that have been performed on fault-tolerance mechanisms in the domain of ARINC 661 interactive cockpits. More precisely this paper focuses on interactive systems, showing how these fault-tolerance mechanisms (mainly redundancy as segregation and diversity are not exemplified here) could affect the usability of the interactive system, making both the tasks of the crew members and their training more complex. We propose a generic approach to analyse the trade-offs between dependability and usability in a software interactive cockpit environment.
驾驶舱(也称为飞行甲板)是飞机的一个互动环境,使飞行员和副驾驶能够监视飞机系统并控制它们。允许机组人员通过使用键盘和光标控制单元通过显示单元控制飞机系统是基于arinc661标准的新一代驾驶舱的主要新颖之处之一。目前只有二级飞机系统使用这种交互式驾驶舱进行管理。推广到其他飞机系统将需要引入旨在确保驾驶舱中这种相互作用容错的机制。这样的机制将允许设计者考虑到新功能的安全要求。然而,这种机制可能会对乘员活动产生影响(积极的和/或消极的)。本文报道了arinc661交互式座舱领域容错机制的研究。更准确地说,本文关注的是交互系统,展示了这些容错机制(主要是冗余作为隔离和多样性,这里没有举例说明)如何影响交互系统的可用性,使机组成员的任务和他们的培训更加复杂。我们提出了一种通用的方法来分析软件交互座舱环境中可靠性和可用性之间的权衡。
{"title":"An Approach for Assessing the Impact of Dependability on Usability: Application to Interactive Cockpits","authors":"Camille Fayollas, C. Martinie, Philippe A. Palanque, Y. Déléris, J. Fabre, D. Navarre","doi":"10.1109/EDCC.2014.17","DOIUrl":"https://doi.org/10.1109/EDCC.2014.17","url":null,"abstract":"A cockpit (also called flight deck) is an interactive environment of an aircraft which enables both pilot and first officer to monitor the aircraft systems and to control them. Allowing the crew to control aircraft systems through display unit by using keyboard and cursor control unit is one of the main novelties in the new generation cockpits based on ARINC 661 standard. Currently only secondary aircraft systems are managed using such interactive cockpits. Generalisation to other aircraft systems would require introducing mechanisms aiming at ensuring the fault-tolerance of such interaction in cockpits. Such mechanisms would allow designers to take into account the new functions' safety requirement. However, it is possible that such mechanisms may have consequences (positive and/or negative ones) on the crew activities. This paper reports studies that have been performed on fault-tolerance mechanisms in the domain of ARINC 661 interactive cockpits. More precisely this paper focuses on interactive systems, showing how these fault-tolerance mechanisms (mainly redundancy as segregation and diversity are not exemplified here) could affect the usability of the interactive system, making both the tasks of the crew members and their training more complex. We propose a generic approach to analyse the trade-offs between dependability and usability in a software interactive cockpit environment.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Modified Hamming Codes to Enhance Short Burst Error Detection in Semiconductor Memories (Short Paper) 改进汉明码增强半导体存储器短突发错误检测(短文)
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.25
L. J. Saiz, P. Gil, J. Baraza-Calvo, Juan-Carlos Ruiz-Garcia, D. Gil, J. Gracia
Error correction codes are used in semiconductor memories to protect information against errors. Simple error correction codes are preferred due to their low redundancy and encoding/decoding latency. Hamming codes are simple and can be easily built for any word length. They only allow single error correction, so a multiple error can lead to a wrong decoding. Multiple errors often manifest as burst errors, and they are becoming more frequent as integration scale increases. This paper proposes modified Hamming codes, with the same redundancy and coverage as the original versions, but adding short burst error detection. Three code examples, with different error correction and detection capabilities, are presented. They are especially well-suited for memories, where the length of the data word is commonly a power of 2, and low redundancy and fast and simple encoder and decoder circuits are required.
在半导体存储器中使用纠错码来防止信息出错。简单的纠错码由于其低冗余和编码/解码延迟是首选。汉明码很简单,可以很容易地为任何单词长度构建。它们只允许单个错误纠正,因此多个错误可能导致错误解码。多重误差通常表现为突发误差,并随着积分规模的增大而日益频繁。本文提出了一种改进的汉明码,其冗余和覆盖范围与原始版本相同,但增加了短突发错误检测。给出了三个具有不同纠错和检测能力的代码示例。它们特别适合于存储器,其中数据字的长度通常是2的幂次,并且需要低冗余和快速简单的编码器和解码器电路。
{"title":"Modified Hamming Codes to Enhance Short Burst Error Detection in Semiconductor Memories (Short Paper)","authors":"L. J. Saiz, P. Gil, J. Baraza-Calvo, Juan-Carlos Ruiz-Garcia, D. Gil, J. Gracia","doi":"10.1109/EDCC.2014.25","DOIUrl":"https://doi.org/10.1109/EDCC.2014.25","url":null,"abstract":"Error correction codes are used in semiconductor memories to protect information against errors. Simple error correction codes are preferred due to their low redundancy and encoding/decoding latency. Hamming codes are simple and can be easily built for any word length. They only allow single error correction, so a multiple error can lead to a wrong decoding. Multiple errors often manifest as burst errors, and they are becoming more frequent as integration scale increases. This paper proposes modified Hamming codes, with the same redundancy and coverage as the original versions, but adding short burst error detection. Three code examples, with different error correction and detection capabilities, are presented. They are especially well-suited for memories, where the length of the data word is commonly a power of 2, and low redundancy and fast and simple encoder and decoder circuits are required.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130168886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On MILS I/O Sharing Targeting Avionic Systems MILS I/O共享瞄准航空电子系统研究
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.35
Kevin Mueller, G. Sigl, B. Triquet, M. Paulitsch
This paper discusses strategies for I/O sharing in Multiple Independent Levels of Security (MILS) systems mostly deployed in the special environment of avionic systems. MILS system designs are promising approaches for handling the increasing complexity of functionally integrated systems, where multiple applications run concurrently on the same hardware platform. Such integrated systems, also known as Integrated Modular Avionics (IMA) in the aviation industry, require communication to remote systems located outside of the hosting hardware platform. One possible solution is to provide each partition, the isolated runtime environment of an application, a direct interface to the communication's hardware controller. Nevertheless, this approach requires a special design of the hardware itself. This paper discusses efficient system architectures for I/O sharing in the environment of high-criticality embedded systems and the exemplary analysis of Free scale's proprietary Data Path Acceleration Architecture (DPAA) with respect to generic hardware requirements. Based on this analysis we also discuss the development of possible architectures matching with the MILS approach. Even though the analysis focuses on avionics it is equally applicable to automotive architectures such as Auto SAR.
本文讨论了多独立安全层(MILS)系统在航空电子系统特殊环境下的I/O共享策略。MILS系统设计是处理功能集成系统日益复杂的有前途的方法,其中多个应用程序并发地运行在同一硬件平台上。这种集成系统,在航空工业中也被称为集成模块化航空电子设备(IMA),需要与位于主机硬件平台之外的远程系统进行通信。一种可能的解决方案是为每个分区(应用程序的隔离运行时环境)提供与通信硬件控制器的直接接口。然而,这种方法需要硬件本身的特殊设计。本文讨论了在高临界嵌入式系统环境中用于I/O共享的高效系统架构,并就通用硬件需求对Free scale专有的数据路径加速架构(DPAA)进行了示例性分析。在此分析的基础上,我们还讨论了与MILS方法相匹配的可能架构的开发。尽管该分析侧重于航空电子设备,但它同样适用于汽车架构,如Auto SAR。
{"title":"On MILS I/O Sharing Targeting Avionic Systems","authors":"Kevin Mueller, G. Sigl, B. Triquet, M. Paulitsch","doi":"10.1109/EDCC.2014.35","DOIUrl":"https://doi.org/10.1109/EDCC.2014.35","url":null,"abstract":"This paper discusses strategies for I/O sharing in Multiple Independent Levels of Security (MILS) systems mostly deployed in the special environment of avionic systems. MILS system designs are promising approaches for handling the increasing complexity of functionally integrated systems, where multiple applications run concurrently on the same hardware platform. Such integrated systems, also known as Integrated Modular Avionics (IMA) in the aviation industry, require communication to remote systems located outside of the hosting hardware platform. One possible solution is to provide each partition, the isolated runtime environment of an application, a direct interface to the communication's hardware controller. Nevertheless, this approach requires a special design of the hardware itself. This paper discusses efficient system architectures for I/O sharing in the environment of high-criticality embedded systems and the exemplary analysis of Free scale's proprietary Data Path Acceleration Architecture (DPAA) with respect to generic hardware requirements. Based on this analysis we also discuss the development of possible architectures matching with the MILS approach. Even though the analysis focuses on avionics it is equally applicable to automotive architectures such as Auto SAR.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123188332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Layered Model for Structuring Automotive Safety Arguments (Short Paper) 构建汽车安全参数的分层模型(短文)
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.24
J. Birch, R. Rivett, I. Habli, Ben Bradshaw, J. Botham, Dave Higham, H. Monkhouse, R. Palin
We present a model for structuring automotive safety arguments comprising four different, yet interrelated, layers of safety claims. The layered model is structured by the rationale behind safety requirements, their relationship to corresponding physical artefact(s) and hazardous events, the means used in their development and the environment in which safety activities are undertaken. The layered approach allows for focus and clarity in communicating and assessing the functional safety of automotive Electrical/Electronic systems, particularly in the context of the automotive standard ISO 26262.
我们提出了一个模型,用于构建汽车安全论点,包括四个不同的,但相互关联的安全主张层。分层模型是由安全需求背后的基本原理、它们与相应的物理人工制品和危险事件的关系、开发过程中使用的手段以及进行安全活动的环境构成的。这种分层的方法使得沟通和评估汽车电气/电子系统的功能安全更加专注和清晰,特别是在汽车标准ISO 26262的背景下。
{"title":"A Layered Model for Structuring Automotive Safety Arguments (Short Paper)","authors":"J. Birch, R. Rivett, I. Habli, Ben Bradshaw, J. Botham, Dave Higham, H. Monkhouse, R. Palin","doi":"10.1109/EDCC.2014.24","DOIUrl":"https://doi.org/10.1109/EDCC.2014.24","url":null,"abstract":"We present a model for structuring automotive safety arguments comprising four different, yet interrelated, layers of safety claims. The layered model is structured by the rationale behind safety requirements, their relationship to corresponding physical artefact(s) and hazardous events, the means used in their development and the environment in which safety activities are undertaken. The layered approach allows for focus and clarity in communicating and assessing the functional safety of automotive Electrical/Electronic systems, particularly in the context of the automotive standard ISO 26262.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122815204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 Tenth European Dependable Computing Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1