首页 > 最新文献

2009 IEEE/IFIP International Conference on Dependable Systems & Networks最新文献

英文 中文
Parametric NdRFT for the derivation of optimal repair strategies 最优修复策略的参数NdRFT推导
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270312
M. Beccuti, G. Franceschinis, D. Raiteri, S. Haddad
Non deterministic Repairable Fault Trees (NdRFT) are a recently proposed modeling formalism for the study of optimal repair strategies: they are based on the widely adopted Fault Tree formalism, but in addition to the failure modes, NdRFTs allow to define possible repair actions. In a previous pa per the formalism has been introduced together with an analysis method and a tool allowing to automatically derive the best repair strategy to be applied in each state. The analysis technique is based on the generation and solution of a Markov Decision Process. In this paper we present an extension, ParNdRFT, that allows to exploit the presence of redundancy to reduce the complexity of the model and of the analysis. It is based on the translation of the ParNdRFT in to a Markov Decision Well-Formed Net, i.e. a model specified by means of an High Level Petri Net formalism. The translated model can be efficiently solved thanks to existing algorithms that generate a reduced state space automatically exploiting the model symmetries.
非确定性可修复故障树(NdRFT)是最近提出的一种用于研究最优修复策略的建模形式:它们基于广泛采用的故障树形式,但除了故障模式外,NdRFT还允许定义可能的修复动作。在之前的一篇文章中,已经介绍了形式主义以及一种分析方法和一种工具,可以自动导出在每种状态下应用的最佳修复策略。该分析技术基于马尔可夫决策过程的生成和求解。在本文中,我们提出了一个扩展,ParNdRFT,它允许利用冗余的存在来降低模型和分析的复杂性。它基于将ParNdRFT转换为马尔可夫决策良构网,即通过高级Petri网形式主义指定的模型。由于现有的算法可以自动利用模型对称性生成简化的状态空间,因此可以有效地求解平移模型。
{"title":"Parametric NdRFT for the derivation of optimal repair strategies","authors":"M. Beccuti, G. Franceschinis, D. Raiteri, S. Haddad","doi":"10.1109/DSN.2009.5270312","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270312","url":null,"abstract":"Non deterministic Repairable Fault Trees (NdRFT) are a recently proposed modeling formalism for the study of optimal repair strategies: they are based on the widely adopted Fault Tree formalism, but in addition to the failure modes, NdRFTs allow to define possible repair actions. In a previous pa per the formalism has been introduced together with an analysis method and a tool allowing to automatically derive the best repair strategy to be applied in each state. The analysis technique is based on the generation and solution of a Markov Decision Process. In this paper we present an extension, ParNdRFT, that allows to exploit the presence of redundancy to reduce the complexity of the model and of the analysis. It is based on the translation of the ParNdRFT in to a Markov Decision Well-Formed Net, i.e. a model specified by means of an High Level Petri Net formalism. The translated model can be efficiently solved thanks to existing algorithms that generate a reduced state space automatically exploiting the model symmetries.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125784912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
HC-BGP: A light-weight and flexible scheme for securing prefix ownership HC-BGP:一种轻量级、灵活的前缀所有权保护方案
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270359
Ying Zhang, Zheng Zhang, Z. Morley Mao, Y. C. Hu
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of misconfiguration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the Internet routing system that misleads victim's traffic to the attacker AS. Previous secure routing proposals, e.g., S-BGP, have relied on the global public key infrastructure (PKI), which creates deployment burdens. In this paper, we propose an efficient cryptographic mechanism, HC-BGP, using hash chains and regular public/private key pairs to ensure prefix ownership certificates. HC-BGP is computationally more efficient than previously proposed secure routing schemes, and it is also more flexible for supporting various traffic engineering goals. Our scheme can efficiently prevent common prefix hijacking attacks which announce routes with false origins, including both prefix and sub-prefix hijacking attacks.
边界网关协议(BGP)是互联网基础设施的基本组成部分。然而,由于网络之间存在隐式的信任假设,Internet路由仍然很容易受到各种类型的错误配置和攻击。前缀劫持就是这样一种错误行为,攻击者AS向Internet路由系统注入虚假路由,将受害者的流量误导到攻击者AS。以前的安全路由建议,如S-BGP,都依赖于全球公钥基础设施(PKI),这造成了部署负担。本文提出了一种高效的加密机制HC-BGP,该机制使用哈希链和常规公钥/私钥对来确保前缀所有权证书。HC-BGP在计算效率上比以前提出的安全路由方案要高,并且在支持各种流量工程目标方面也更加灵活。该方案可以有效地防止常见的前缀劫持攻击,包括前缀劫持攻击和子前缀劫持攻击。
{"title":"HC-BGP: A light-weight and flexible scheme for securing prefix ownership","authors":"Ying Zhang, Zheng Zhang, Z. Morley Mao, Y. C. Hu","doi":"10.1109/DSN.2009.5270359","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270359","url":null,"abstract":"The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing remains quite vulnerable to various types of misconfiguration and attacks. Prefix hijacking is one such misbehavior where an attacker AS injects false routes to the Internet routing system that misleads victim's traffic to the attacker AS. Previous secure routing proposals, e.g., S-BGP, have relied on the global public key infrastructure (PKI), which creates deployment burdens. In this paper, we propose an efficient cryptographic mechanism, HC-BGP, using hash chains and regular public/private key pairs to ensure prefix ownership certificates. HC-BGP is computationally more efficient than previously proposed secure routing schemes, and it is also more flexible for supporting various traffic engineering goals. Our scheme can efficiently prevent common prefix hijacking attacks which announce routes with false origins, including both prefix and sub-prefix hijacking attacks.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring 基于信息理论的复杂软件系统故障自动检测与诊断
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270324
Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward
Management metrics of complex software systems exhibit stable correlations which can enable fault detection and diagnosis. Current approaches use specific analytic forms, typically linear, for modeling correlations. In this paper we use Normalized Mutual Information as a similarity measure to identify clusters of correlated metrics, without knowing the specific form. We show how we can apply the Wilcoxon Rank-Sum test to identify anomalous behaviour. We present two diagnosis algorithms to locate faulty components: RatioScore, based on the Jaccard Coefficient, and SigScore, which incorporates knowledge of component dependencies. We evaluate our mechanisms in the context of a complex enterprise application. Through fault-injection experiments, we show that we can detect 17 out of 22 faults without any false positives. We diagnose the faulty component in the top five anomaly scores 7 times out of 17 using SigScore, which is 40% better than when system structure is ignored.
复杂软件系统的管理指标表现出稳定的相关性,可以实现故障检测和诊断。目前的方法使用特定的分析形式,通常是线性的,来建模相关性。在本文中,我们使用归一化互信息作为相似性度量来识别相关度量簇,而不知道具体形式。我们展示了如何应用Wilcoxon秩和检验来识别异常行为。我们提出了两种诊断算法来定位故障组件:基于Jaccard系数的RatioScore和包含组件依赖关系知识的SigScore。我们在复杂的企业应用程序上下文中评估我们的机制。通过故障注入实验,我们可以检测出22个故障中的17个,没有任何误报。我们使用SigScore在17次异常评分中7次诊断出前5个异常评分中的故障组件,这比忽略系统结构时好40%。
{"title":"Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring","authors":"Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward","doi":"10.1109/DSN.2009.5270324","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270324","url":null,"abstract":"Management metrics of complex software systems exhibit stable correlations which can enable fault detection and diagnosis. Current approaches use specific analytic forms, typically linear, for modeling correlations. In this paper we use Normalized Mutual Information as a similarity measure to identify clusters of correlated metrics, without knowing the specific form. We show how we can apply the Wilcoxon Rank-Sum test to identify anomalous behaviour. We present two diagnosis algorithms to locate faulty components: RatioScore, based on the Jaccard Coefficient, and SigScore, which incorporates knowledge of component dependencies. We evaluate our mechanisms in the context of a complex enterprise application. Through fault-injection experiments, we show that we can detect 17 out of 22 faults without any false positives. We diagnose the faulty component in the top five anomaly scores 7 times out of 17 using SigScore, which is 40% better than when system structure is ignored.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Data management mechanisms for embedded system gateways 嵌入式系统网关的数据管理机制
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270339
Justin Ray, P. Koopman
It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to protect each part of the interconnected system from faults and attacks which propagate from the other side. One architectural approach is to add a gateway to the embedded system to receive Internet traffic and disperse data to the embedded system, but there is no clear recipe for building such gateways. Since Internet routers commonly use queues to manage traffic, we examine the effectiveness of queues for the embedded system gateway domain. We perform a series of experiments to evaluate the effectiveness of the queue mechanism and various queue management techniques. We show that queues can exhibit poor performance in the context of real-time embedded system gateways due to problems with message latency and dropped messages. We then introduce the concept of a filter mechanism and show that a simple filter mechanism can outper-form queue mechanisms when used in the gateway to manage real-time state-oriented data streams.
将传统的嵌入式系统网络连接到Internet上进行远程监控、高级控制和集成,已经变得越来越普遍。有必要保护互联系统的每个部分免受来自另一端的故障和攻击。一种架构方法是向嵌入式系统添加网关,以接收Internet流量并将数据分散到嵌入式系统,但是没有构建这种网关的明确方法。由于互联网路由器通常使用队列来管理流量,我们研究了嵌入式系统网关域队列的有效性。我们执行了一系列的实验来评估队列机制和各种队列管理技术的有效性。我们表明,由于消息延迟和丢失消息的问题,队列在实时嵌入式系统网关上下文中可能表现出较差的性能。然后,我们介绍了过滤器机制的概念,并展示了当在网关中使用简单的过滤器机制来管理实时面向状态的数据流时,它可以优于队列机制。
{"title":"Data management mechanisms for embedded system gateways","authors":"Justin Ray, P. Koopman","doi":"10.1109/DSN.2009.5270339","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270339","url":null,"abstract":"It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to protect each part of the interconnected system from faults and attacks which propagate from the other side. One architectural approach is to add a gateway to the embedded system to receive Internet traffic and disperse data to the embedded system, but there is no clear recipe for building such gateways. Since Internet routers commonly use queues to manage traffic, we examine the effectiveness of queues for the embedded system gateway domain. We perform a series of experiments to evaluate the effectiveness of the queue mechanism and various queue management techniques. We show that queues can exhibit poor performance in the context of real-time embedded system gateways due to problems with message latency and dropped messages. We then introduce the concept of a filter mechanism and show that a simple filter mechanism can outper-form queue mechanisms when used in the gateway to manage real-time state-oriented data streams.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Overloading vulnerability of VoIP networks VoIP网络过载漏洞
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270310
Hemant Sengar
Internet is vulnerable to overloading caused by flash crowds and distributed denial-of-service (DDoS) attacks. Recently vo ice over IP (VoIP), an Internet-based service is experiencing a phenomenal growth. As its deployment spreads, VoIP systems are likely to become attack targets, of which flooding lists high, perhaps due to its simplicity and the abundance of tool support. The DDoS attacks and flash crowds degrade the performance of call processing server to the point where it becomes sluggish and even unresponsive. The network administrator's dilemma is that how to give a differential treatment to malicious and legitimate call requests that differ in intent, but not in content. In this paper, we show that DDoS attacks and flash crowds, while similar in the message structure and the number of INVITEs they generate, exhibit different traffic patterns and hence making them distinguishable. We also introduce a new entropy-based approach to detect those DDoS attacks that masquerade as flash crowds. Our approach is based on an observation that the creation of malicious sessions has certain effects on entropy of the call durations; hence, a change in the entropy provides an important clue for mimicry attack detection. As an overloading preventive measure, we exploit the SIP protocol's inbuilt reliability mechanism and exponential backoff timer values to regulate and distinguish legitimates call requests from the spoofed ones.
互联网很容易受到闪电人群和分布式拒绝服务(DDoS)攻击造成的过载的影响。最近,一种基于互联网的网络电话服务(VoIP)正经历着惊人的增长。随着VoIP系统的广泛部署,它很可能成为攻击的目标,可能是由于它的简单性和丰富的工具支持。DDoS攻击和flash人群降低了呼叫处理服务器的性能,使其变得迟钝甚至无响应。网络管理员的困境是,如何区别对待意图不同而内容不同的恶意和合法呼叫请求。在本文中,我们证明了DDoS攻击和闪电人群虽然在消息结构和它们产生的邀请数量上相似,但表现出不同的流量模式,从而使它们具有可区分性。我们还引入了一种新的基于熵的方法来检测那些伪装成闪电人群的DDoS攻击。我们的方法是基于一个观察,即恶意会话的创建对调用持续时间的熵有一定的影响;因此,熵的变化为模仿攻击检测提供了重要线索。作为一种过载预防措施,我们利用SIP协议内置的可靠性机制和指数回退定时器值来调节和区分合法的呼叫请求和欺骗的呼叫请求。
{"title":"Overloading vulnerability of VoIP networks","authors":"Hemant Sengar","doi":"10.1109/DSN.2009.5270310","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270310","url":null,"abstract":"Internet is vulnerable to overloading caused by flash crowds and distributed denial-of-service (DDoS) attacks. Recently vo ice over IP (VoIP), an Internet-based service is experiencing a phenomenal growth. As its deployment spreads, VoIP systems are likely to become attack targets, of which flooding lists high, perhaps due to its simplicity and the abundance of tool support. The DDoS attacks and flash crowds degrade the performance of call processing server to the point where it becomes sluggish and even unresponsive. The network administrator's dilemma is that how to give a differential treatment to malicious and legitimate call requests that differ in intent, but not in content. In this paper, we show that DDoS attacks and flash crowds, while similar in the message structure and the number of INVITEs they generate, exhibit different traffic patterns and hence making them distinguishable. We also introduce a new entropy-based approach to detect those DDoS attacks that masquerade as flash crowds. Our approach is based on an observation that the creation of malicious sessions has certain effects on entropy of the call durations; hence, a change in the entropy provides an important clue for mimicry attack detection. As an overloading preventive measure, we exploit the SIP protocol's inbuilt reliability mechanism and exponential backoff timer values to regulate and distinguish legitimates call requests from the spoofed ones.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130348301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks WSEC DNS:保护递归DNS解析器免受投毒攻击
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270363
R. Perdisci, M. Antonakakis, Xiapu Luo, Wenke Lee
Recently, a new attack for poisoning the cache of Recursive DNS (RDNS) resolvers was discovered and revealed to the public. In response, major DNS vendors released a patch to their software. However, the released patch does not completely protect DNS servers from cache poisoning attacks in a number of practical scenarios. DNSSEC seems to offer a definitive solution to the vulnerabilities of the DNS protocol, but unfortunately DNSSEC has not yet been widely deployed. In this paper, we proposeWild-card SECure DNS (WSEC DNS), a novel solution to DNS cache poisoning attacks. WSEC DNS relies on existing properties of the DNS protocol and is based on wild-card domain names. We show that WSEC DNS is able to decrease the probability of success of cache poisoning attacks by several orders of magnitude. That is, with WSEC DNS in place, an attacker has to persistently run a cache poisoning attack for years, before having a non-negligible chance of success. Furthermore, WSEC DNS offers complete backward compatibility to DNS servers that may for any reason decide not to implement it, therefore allowing an incremental large-scale deployment. Contrary to DNSSEC, WSEC DNS is deployable immediately because it does not have the technical and political problems that have so far hampered a large-scale deployment of DNSSEC.
最近,一种新的针对递归DNS (RDNS)解析器缓存投毒的攻击被发现并公之于众。作为回应,主要的DNS供应商发布了他们软件的补丁。然而,在许多实际场景中,发布的补丁并不能完全保护DNS服务器免受缓存中毒攻击。DNSSEC似乎为DNS协议的漏洞提供了一个明确的解决方案,但不幸的是,DNSSEC尚未得到广泛部署。本文提出了一种针对DNS缓存投毒攻击的新解决方案——通配符安全DNS (WSEC DNS)。WSEC DNS依赖于DNS协议的现有属性,并基于通配符域名。我们表明,WSEC DNS能够将缓存中毒攻击的成功概率降低几个数量级。也就是说,在WSEC DNS到位的情况下,攻击者必须持续运行缓存中毒攻击数年,才能获得不可忽视的成功机会。此外,WSEC DNS为可能出于任何原因决定不实现它的DNS服务器提供了完全的向后兼容性,因此允许增量大规模部署。与DNSSEC相反,WSEC DNS可以立即部署,因为它不存在迄今为止阻碍DNSSEC大规模部署的技术和政治问题。
{"title":"WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks","authors":"R. Perdisci, M. Antonakakis, Xiapu Luo, Wenke Lee","doi":"10.1109/DSN.2009.5270363","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270363","url":null,"abstract":"Recently, a new attack for poisoning the cache of Recursive DNS (RDNS) resolvers was discovered and revealed to the public. In response, major DNS vendors released a patch to their software. However, the released patch does not completely protect DNS servers from cache poisoning attacks in a number of practical scenarios. DNSSEC seems to offer a definitive solution to the vulnerabilities of the DNS protocol, but unfortunately DNSSEC has not yet been widely deployed. In this paper, we proposeWild-card SECure DNS (WSEC DNS), a novel solution to DNS cache poisoning attacks. WSEC DNS relies on existing properties of the DNS protocol and is based on wild-card domain names. We show that WSEC DNS is able to decrease the probability of success of cache poisoning attacks by several orders of magnitude. That is, with WSEC DNS in place, an attacker has to persistently run a cache poisoning attack for years, before having a non-negligible chance of success. Furthermore, WSEC DNS offers complete backward compatibility to DNS servers that may for any reason decide not to implement it, therefore allowing an incremental large-scale deployment. Contrary to DNSSEC, WSEC DNS is deployable immediately because it does not have the technical and political problems that have so far hampered a large-scale deployment of DNSSEC.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Flexible multicast authentication for time-triggered embedded control network applications 时间触发嵌入式控制网络应用的灵活组播认证
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270342
Christopher Szilagyi, P. Koopman
Security for wired embedded networks is becoming a greater concern as connectivity to the outside world increases. Protocols used in these networks omit support for authenticating messages to prevent masquerade and replay attacks. The unique constraints of embedded control systems make incorporating existing multicast authentication schemes impractical. Our approach provides multicast authentication for time-triggered applications by validating truncated message authentication codes (MACs) across multiple packets. We extend this approach to tolerate occasional invalid MACs, analyze our approach through simulated at-tacks, and give an upper bound on the probability of successful attack. This approach allows a tradeoff among per-packet authentication cost, application le vel latency, tolerance to invalid MACs, and probability of induced failure, while satisfying typical embedded system constraints.
随着与外界连接的增加,有线嵌入式网络的安全性日益受到关注。在这些网络中使用的协议忽略了对消息进行身份验证以防止伪装和重放攻击的支持。嵌入式控制系统的独特限制使得合并现有的组播认证方案不切实际。我们的方法通过跨多个数据包验证截断的消息认证码(mac),为时间触发的应用程序提供多播认证。我们将这种方法扩展到容忍偶尔的无效mac,通过模拟攻击分析我们的方法,并给出成功攻击概率的上界。这种方法在满足典型嵌入式系统约束的同时,允许在每包身份验证成本、应用程序级别延迟、对无效mac的容错性和诱导故障的概率之间进行权衡。
{"title":"Flexible multicast authentication for time-triggered embedded control network applications","authors":"Christopher Szilagyi, P. Koopman","doi":"10.1109/DSN.2009.5270342","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270342","url":null,"abstract":"Security for wired embedded networks is becoming a greater concern as connectivity to the outside world increases. Protocols used in these networks omit support for authenticating messages to prevent masquerade and replay attacks. The unique constraints of embedded control systems make incorporating existing multicast authentication schemes impractical. Our approach provides multicast authentication for time-triggered applications by validating truncated message authentication codes (MACs) across multiple packets. We extend this approach to tolerate occasional invalid MACs, analyze our approach through simulated at-tacks, and give an upper bound on the probability of successful attack. This approach allows a tradeoff among per-packet authentication cost, application le vel latency, tolerance to invalid MACs, and probability of induced failure, while satisfying typical embedded system constraints.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127702710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Effectiveness of machine checks for error diagnostics 机器检查错误诊断的有效性
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270290
Nikhil Pandit, Z. Kalbarczyk, R. Iyer
Machine Check Architecture (MCA) is a processor internal architecture subsystem that detects and logs correctable and uncorrectable errors in the data or control paths in each CPU core and the Northbridge. These errors include parity errors associated with caches, TLBs, ECC errors associated with caches and DRAM, and system bus errors. This paper reports on an experimental study on: (i) monitoring a computing cluster for machine checks and using this data to identify patterns that can be employed for error diagnostics and (ii) introducing faults into the machine to understand the resulting machine checks and correlate this data with relevant performance metrics.
MCA (Machine Check Architecture,机器检查体系结构)是处理器内部体系结构子系统,用于检测和记录每个CPU核心和北桥的数据或控制路径中的可纠正和不可纠正错误。这些错误包括与缓存、tlb相关的奇偶校验错误、与缓存和DRAM相关的ECC错误以及系统总线错误。本文报告了一项实验研究:(i)监控计算集群的机器检查,并使用这些数据来识别可用于错误诊断的模式;(ii)将故障引入机器以了解结果机器检查并将这些数据与相关性能指标相关联。
{"title":"Effectiveness of machine checks for error diagnostics","authors":"Nikhil Pandit, Z. Kalbarczyk, R. Iyer","doi":"10.1109/DSN.2009.5270290","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270290","url":null,"abstract":"Machine Check Architecture (MCA) is a processor internal architecture subsystem that detects and logs correctable and uncorrectable errors in the data or control paths in each CPU core and the Northbridge. These errors include parity errors associated with caches, TLBs, ECC errors associated with caches and DRAM, and system bus errors. This paper reports on an experimental study on: (i) monitoring a computing cluster for machine checks and using this data to identify patterns that can be employed for error diagnostics and (ii) introducing faults into the machine to understand the resulting machine checks and correlate this data with relevant performance metrics.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122157004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Emμcode: Masking hard faults in complex functional units Emμcode:屏蔽复杂功能单元中的硬故障
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270304
N. Weaver, J. H. Kelm, M. Frank
This paper presents Emμcode, a technique for masking hard faults in modern microprocessors that provides graceful performance degradation. Emμcode employs microcode traces with control flow that replace an original instruction once a fault is detected. Emμcode adds lightweight microarchitectural hardware to assist in correcting hard faults in larger structures, such as SIMD execution units found in contemporary microprocessors, where replication is infeasible. Key challenges in implementing microcode traces include maintaining proper architectural state and the optimization of trace code. We are able to significantly optimize traces by exploiting dynamic trace behavior and by performing minor modifications to the microarchitecture. We find that removing hard to predict branches is important for optimizing traces. Emμcode uses partial predication, new microcode operations, and the full use of the microcode's flexibility and visibility to create fast traces. This paper studies the viability of implementing SIMD floating point arithmetic operations found in modern x86 processors using Emμcode traces. Our results show that for programs with 1 to 5 percent of the dynamic instructions replaced by Emμcode, a graceful performance degradation of only 1.3x to 4x is achievable.
本文介绍了Emμcode,这是一种用于掩盖现代微处理器中的硬故障的技术,它提供了优雅的性能下降。Emμcode采用带有控制流的微码跟踪,一旦检测到故障就替换原始指令。Emμcode添加了轻量级微架构硬件,以帮助纠正大型结构中的硬故障,例如当代微处理器中发现的SIMD执行单元,其中复制是不可行的。实现微代码跟踪的关键挑战包括维护适当的体系结构状态和跟踪代码的优化。我们能够通过利用动态跟踪行为和对微架构进行微小的修改来显著地优化跟踪。我们发现去除难以预测的分支对于优化轨迹很重要。Emμcode使用部分预测,新的微码操作,并充分利用微码的灵活性和可见性来创建快速跟踪。本文研究了在现代x86处理器中使用Emμcode跟踪实现SIMD浮点算术运算的可行性。我们的结果表明,对于用emμ代码替换1%到5%的动态指令的程序,可以实现仅1.3到4倍的优雅性能下降。
{"title":"Emμcode: Masking hard faults in complex functional units","authors":"N. Weaver, J. H. Kelm, M. Frank","doi":"10.1109/DSN.2009.5270304","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270304","url":null,"abstract":"This paper presents Emμcode, a technique for masking hard faults in modern microprocessors that provides graceful performance degradation. Emμcode employs microcode traces with control flow that replace an original instruction once a fault is detected. Emμcode adds lightweight microarchitectural hardware to assist in correcting hard faults in larger structures, such as SIMD execution units found in contemporary microprocessors, where replication is infeasible. Key challenges in implementing microcode traces include maintaining proper architectural state and the optimization of trace code. We are able to significantly optimize traces by exploiting dynamic trace behavior and by performing minor modifications to the microarchitecture. We find that removing hard to predict branches is important for optimizing traces. Emμcode uses partial predication, new microcode operations, and the full use of the microcode's flexibility and visibility to create fast traces. This paper studies the viability of implementing SIMD floating point arithmetic operations found in modern x86 processors using Emμcode traces. Our results show that for programs with 1 to 5 percent of the dynamic instructions replaced by Emμcode, a graceful performance degradation of only 1.3x to 4x is achievable.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115810420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models Möbius 2.3:用于大型复杂系统模型的可靠性、安全性和性能评估的可扩展工具
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270318
T. Courtney, Shravan Gaonkar, K. Keefe, Eric Rozier, W. Sanders
Möbius 2.3 is an extensible dependability, security, and performance modeling environment for large-scale discrete-event systems. It provides multiple model formalisms and solution techniques, facilitating the representation of each part of a system in the formalism that is most appropriate for it, and the application of the solution method or methods best-suited to estimating the system's behavior. Since its initial release in 2001, many advances have been made in Möbius's design and implementation that have strengthened its place in the modeling and analysis community. With almost a decade of widespread academic and industrial use, Möbius has proven itself to be useful in a wide variety of modeling situations. This paper documents the current feature set of Möbius 2.3, emphasizing recent significant enhancements.
Möbius 2.3是用于大规模离散事件系统的可扩展可靠性、安全性和性能建模环境。它提供了多种模型形式化和解决方案技术,便于用最适合系统的形式化表示系统的每个部分,以及最适合估计系统行为的解决方法或方法的应用。自2001年首次发布以来,Möbius的设计和实现取得了许多进步,加强了它在建模和分析社区中的地位。随着近十年的广泛学术和工业使用,Möbius已经证明了自己在各种建模情况下是有用的。本文记录了Möbius 2.3的当前特性集,强调了最近的重要增强。
{"title":"Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models","authors":"T. Courtney, Shravan Gaonkar, K. Keefe, Eric Rozier, W. Sanders","doi":"10.1109/DSN.2009.5270318","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270318","url":null,"abstract":"Möbius 2.3 is an extensible dependability, security, and performance modeling environment for large-scale discrete-event systems. It provides multiple model formalisms and solution techniques, facilitating the representation of each part of a system in the formalism that is most appropriate for it, and the application of the solution method or methods best-suited to estimating the system's behavior. Since its initial release in 2001, many advances have been made in Möbius's design and implementation that have strengthened its place in the modeling and analysis community. With almost a decade of widespread academic and industrial use, Möbius has proven itself to be useful in a wide variety of modeling situations. This paper documents the current feature set of Möbius 2.3, emphasizing recent significant enhancements.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133407319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
期刊
2009 IEEE/IFIP International Conference on Dependable Systems & Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1