首页 > 最新文献

2009 IEEE/IFIP International Conference on Dependable Systems & Networks最新文献

英文 中文
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence 动态系统属性的远程认证:提供完整的系统完整性证据
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270348
Chongkyung Kil, E. C. Sezer, Ahmed M. Azab, P. Ning, Xiaolan Zhang
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties of the system. To address this problem we present a novel remote dynamic attestation system named ReDAS (Remote Dynamic Attestation System) that provides integrity evidence for dynamic system properties. Such dynamic system properties represent the runtime behavior of the attested system, and enable an attester to prove its runtime integrity to a remote party. ReDAS currently provides two types of dynamic system properties for running applications: structural integrity and global data integrity. In this work, we present the challenges of remote dynamic attestation, provide an in-depth security analysis and introduce a first step towards providing a complete runtime dynamic attestation framework. Our prototype implementation and evaluation with real-world applications show that we can improve on current static attestation techniques with an average performance overhead of 8%.
系统完整性的远程认证是可信计算的重要组成部分。然而,目前的远程认证技术只能提供系统静态属性的完整性证明。为了解决这个问题,我们提出了一种新的远程动态认证系统,称为ReDAS(远程动态认证系统),它为动态系统属性提供完整性证据。这样的动态系统属性表示被证明系统的运行时行为,并使证明者能够向远程方证明其运行时完整性。ReDAS目前为运行的应用程序提供了两种类型的动态系统属性:结构完整性和全局数据完整性。在这项工作中,我们提出了远程动态认证的挑战,提供了深入的安全分析,并介绍了提供完整的运行时动态认证框架的第一步。我们对实际应用程序的原型实现和评估表明,我们可以在平均性能开销为8%的情况下改进当前的静态认证技术。
{"title":"Remote attestation to dynamic system properties: Towards providing complete system integrity evidence","authors":"Chongkyung Kil, E. C. Sezer, Ahmed M. Azab, P. Ning, Xiaolan Zhang","doi":"10.1109/DSN.2009.5270348","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270348","url":null,"abstract":"Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties of the system. To address this problem we present a novel remote dynamic attestation system named ReDAS (Remote Dynamic Attestation System) that provides integrity evidence for dynamic system properties. Such dynamic system properties represent the runtime behavior of the attested system, and enable an attester to prove its runtime integrity to a remote party. ReDAS currently provides two types of dynamic system properties for running applications: structural integrity and global data integrity. In this work, we present the challenges of remote dynamic attestation, provide an in-depth security analysis and introduce a first step towards providing a complete runtime dynamic attestation framework. Our prototype implementation and evaluation with real-world applications show that we can improve on current static attestation techniques with an average performance overhead of 8%.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Processor reliability enhancement through compiler-directed register file peak temperature reduction 通过编译器定向寄存器文件峰值温度降低处理器可靠性增强
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270305
Chengmo Yang, A. Orailoglu
Each semiconductor technology generation brings us closer to the imminent processor architecture heat wall, with all its associated adverse effects on system performance and reliability. Temperature hotspots not only accelerate the physical failure mechanisms such as electromigration and dielectric breakdown, but furthermore make the system more vulnerable to timing-related intermittent failures. Traditional thermal management techniques suffer from considerable performance overhead as the entire processor needs to be stalled or slowed down to preclude heat accumulation. Given the significant temporal and spatial variations of the chip-wide temperature, we propose in this paper a technique that directly targets one of the resources that is most likely to overheat in current processors, namely, the register files. Instead of duplicating or physically distributing the register file, we suggest to attain power density control through exploiting the extant spatial slack associated with register file accesses. Based on application-specific access profiles, a compiler-directed register shuffling strategy is proposed to deterministically construct the logical to physical register mapping in a rotating manner. Simulation results confirm that the proposed technique attains, within a limited hardware budget and negligible performance degradation, effective reduction in peak temperature and hence in the expected fault rates for the entire chip.
每一代半导体技术都使我们更接近即将到来的处理器架构热墙,以及其对系统性能和可靠性的所有相关不利影响。温度热点不仅加速了电迁移和介质击穿等物理失效机制,而且使系统更容易发生与时间相关的间歇性失效。传统的热管理技术存在相当大的性能开销,因为整个处理器需要停止或减速以防止热量积聚。考虑到芯片范围内温度的显著时空变化,我们在本文中提出了一种直接针对当前处理器中最有可能过热的资源之一的技术,即寄存器文件。我们建议通过利用与寄存器文件访问相关的现有空间松弛来实现功率密度控制,而不是复制或物理分布寄存器文件。基于特定应用程序的访问配置文件,提出了一种编译器导向的寄存器变换策略,以旋转的方式确定地构建逻辑寄存器到物理寄存器的映射。仿真结果证实,所提出的技术在有限的硬件预算和可忽略不计的性能下降的情况下,有效地降低了峰值温度,从而降低了整个芯片的预期故障率。
{"title":"Processor reliability enhancement through compiler-directed register file peak temperature reduction","authors":"Chengmo Yang, A. Orailoglu","doi":"10.1109/DSN.2009.5270305","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270305","url":null,"abstract":"Each semiconductor technology generation brings us closer to the imminent processor architecture heat wall, with all its associated adverse effects on system performance and reliability. Temperature hotspots not only accelerate the physical failure mechanisms such as electromigration and dielectric breakdown, but furthermore make the system more vulnerable to timing-related intermittent failures. Traditional thermal management techniques suffer from considerable performance overhead as the entire processor needs to be stalled or slowed down to preclude heat accumulation. Given the significant temporal and spatial variations of the chip-wide temperature, we propose in this paper a technique that directly targets one of the resources that is most likely to overheat in current processors, namely, the register files. Instead of duplicating or physically distributing the register file, we suggest to attain power density control through exploiting the extant spatial slack associated with register file accesses. Based on application-specific access profiles, a compiler-directed register shuffling strategy is proposed to deterministically construct the logical to physical register mapping in a rotating manner. Simulation results confirm that the proposed technique attains, within a limited hardware budget and negligible performance degradation, effective reduction in peak temperature and hence in the expected fault rates for the entire chip.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Stretching gossip with live streaming 用直播传播八卦
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270330
Davide Frey, R. Guerraoui, Anne-Marie Kermarrec, Maxime Monod, Vivien Quéma
Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. They are also considered highly flexible, namely tunable at will to increase their robustness and adapt to churn. So far however, they have mainly been evaluated through simulation, very often assuming ideal settings. Instead, in this paper, we report on an extensive study of gossip protocols, deployed on a 230 Planetlab node testbed, in the context of a challenging video streaming application in environments with constrained bandwidths. More precisely, we assess the impact of varying the well known knobs of gossip, fanout and refresh rate, in various upload-bandwidth distributions and churn. Our results show that in such challenging contexts, the performance of gossip protocols may be hampered by high fanout values. We also show that the more proactive a gossip protocol, the better it copes with churn. For instance, when 20% of the nodes simultaneously crash, 70% of the remaining nodes do not suffer any loss in stream quality, while the others only experience a performance decrease for an average of 5 seconds around the churn event.
基于八卦的信息传播协议被认为易于部署、可扩展和适应网络动态。它们也被认为是高度灵活的,即可以随意调整以增加其稳健性并适应变化。然而,到目前为止,它们主要是通过模拟来评估的,通常是假设理想的设置。相反,在本文中,我们报告了对八卦协议的广泛研究,该研究部署在230 Planetlab节点测试平台上,在带宽受限环境下具有挑战性的视频流应用的背景下。更准确地说,我们评估了在各种上传带宽分布和流失中,改变众所周知的八卦、扇出和刷新率旋钮的影响。我们的研究结果表明,在这种具有挑战性的环境中,高扇出值可能会阻碍八卦协议的性能。我们还表明,八卦协议越积极主动,就越能更好地应对用户流失。例如,当20%的节点同时崩溃时,70%的剩余节点不会遭受流质量的任何损失,而其他节点在中断事件周围平均只会经历5秒的性能下降。
{"title":"Stretching gossip with live streaming","authors":"Davide Frey, R. Guerraoui, Anne-Marie Kermarrec, Maxime Monod, Vivien Quéma","doi":"10.1109/DSN.2009.5270330","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270330","url":null,"abstract":"Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. They are also considered highly flexible, namely tunable at will to increase their robustness and adapt to churn. So far however, they have mainly been evaluated through simulation, very often assuming ideal settings. Instead, in this paper, we report on an extensive study of gossip protocols, deployed on a 230 Planetlab node testbed, in the context of a challenging video streaming application in environments with constrained bandwidths. More precisely, we assess the impact of varying the well known knobs of gossip, fanout and refresh rate, in various upload-bandwidth distributions and churn. Our results show that in such challenging contexts, the performance of gossip protocols may be hampered by high fanout values. We also show that the more proactive a gossip protocol, the better it copes with churn. For instance, when 20% of the nodes simultaneously crash, 70% of the remaining nodes do not suffer any loss in stream quality, while the others only experience a performance decrease for an average of 5 seconds around the churn event.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID) 估算N+1冗余独立磁盘阵列(RAID)可靠性的简单公式
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270303
J. Elerath
This paper develops an equation that provides a good approximation of the expected number of double-disk failures (data losses) in an (N+1) redundant array of inexpensive disks (RAID) as a function of time. This paper includes the statistical bases for the equation, sources of error and inaccuracies due to approximations, and limitations of its use. The equation is simple and can be evaluated using a hand held calculator or basic spreadsheet. Accuracy depends on four input distributions, which include operational failures, operational failure restorations, latent defects, and data scrubbing. Failure and restoration distributions may represent non-homogeneous Poisson processes and, therefore, not have constant rates. Results of the equations are compared to two other hand calculation methods, to a highly accurate Monte Carlo simulation, and to actual field data for more than 10,000 RAID groups composed of 14 drives.
本文开发了一个方程,该方程提供了双磁盘故障(数据丢失)在(N+1)冗余廉价磁盘(RAID)阵列中作为时间函数的预期数量的良好近似值。本文包括该方程的统计基础,由于近似而产生的误差和不准确性的来源,以及其使用的局限性。这个公式很简单,可以用一个手持计算器或基本的电子表格来计算。准确性取决于四个输入分布,其中包括操作失败、操作失败恢复、潜在缺陷和数据清除。失效和恢复分布可能代表非齐次泊松过程,因此不具有恒定的速率。将这些方程的结果与另外两种手工计算方法、高度精确的蒙特卡罗模拟以及由14个驱动器组成的10,000多个RAID组的实际现场数据进行了比较。
{"title":"A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID)","authors":"J. Elerath","doi":"10.1109/DSN.2009.5270303","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270303","url":null,"abstract":"This paper develops an equation that provides a good approximation of the expected number of double-disk failures (data losses) in an (N+1) redundant array of inexpensive disks (RAID) as a function of time. This paper includes the statistical bases for the equation, sources of error and inaccuracies due to approximations, and limitations of its use. The equation is simple and can be evaluated using a hand held calculator or basic spreadsheet. Accuracy depends on four input distributions, which include operational failures, operational failure restorations, latent defects, and data scrubbing. Failure and restoration distributions may represent non-homogeneous Poisson processes and, therefore, not have constant rates. Results of the equations are compared to two other hand calculation methods, to a highly accurate Monte Carlo simulation, and to actual field data for more than 10,000 RAID groups composed of 14 drives.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115397194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
VNsnap: Taking snapshots of virtual networked environments with minimal downtime VNsnap:以最小的停机时间对虚拟网络环境进行快照
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270298
Ardalan Kangarlou, P. Eugster, Dongyan Xu
A virtual networked environment (VNE) consists of virtual machines (VMs) connected by a virtual network. It has been adopted to create “virtual infrastructures” for individual users on a shared cloud computing infrastructure. The ability to take snapshots of an entire VNE — including images of the VMs with their execution, communication and storage states — yields a unique approach to reliability as a snapshot can restore the operation of an entire virtual infrastructure. We present VNsnap, a system that takes distributed snapshots of VNEs. Unlike existing distributed snapshot/checkpointing solutions, VNsnap does not require any modifications to the applications, libraries, or (guest) operating systems running in the VMs. Furthermore, VNsnap incurs only seconds of downtime as much of the snapshot operation takes place concurrently with the VNE's normal operation. We have implemented VNsnap on top of Xen. Our experiments with real-world parallel and distributed applications demonstrate VNsnap's effectiveness and efficiency.
虚拟网络环境(VNE)是指通过虚拟网络连接在一起的虚拟机。它已被用于在共享云计算基础设施上为个人用户创建“虚拟基础设施”。对整个虚拟网络进行快照的能力——包括虚拟机的执行、通信和存储状态的映像——产生了一种独特的可靠性方法,因为快照可以恢复整个虚拟基础设施的运行。我们介绍了VNsnap,一个对vne进行分布式快照的系统。与现有的分布式快照/检查点解决方案不同,VNsnap不需要对虚拟机中运行的应用程序、库或(客户)操作系统进行任何修改。此外,VNsnap只会导致几秒钟的停机时间,因为大部分快照操作与VNE的正常操作同时进行。我们已经在Xen之上实现了VNsnap。我们对现实世界的并行和分布式应用程序的实验证明了VNsnap的有效性和效率。
{"title":"VNsnap: Taking snapshots of virtual networked environments with minimal downtime","authors":"Ardalan Kangarlou, P. Eugster, Dongyan Xu","doi":"10.1109/DSN.2009.5270298","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270298","url":null,"abstract":"A virtual networked environment (VNE) consists of virtual machines (VMs) connected by a virtual network. It has been adopted to create “virtual infrastructures” for individual users on a shared cloud computing infrastructure. The ability to take snapshots of an entire VNE — including images of the VMs with their execution, communication and storage states — yields a unique approach to reliability as a snapshot can restore the operation of an entire virtual infrastructure. We present VNsnap, a system that takes distributed snapshots of VNEs. Unlike existing distributed snapshot/checkpointing solutions, VNsnap does not require any modifications to the applications, libraries, or (guest) operating systems running in the VMs. Furthermore, VNsnap incurs only seconds of downtime as much of the snapshot operation takes place concurrently with the VNE's normal operation. We have implemented VNsnap on top of Xen. Our experiments with real-world parallel and distributed applications demonstrate VNsnap's effectiveness and efficiency.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121543638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Report generation for simulation traces with Traviando 使用Traviando生成模拟跟踪的报告
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270317
P. Kemper
Any model-based evaluation of the dependability of a system requires validation and verification to justify that its results are meaningful. Modern modeling frameworks enable us to create and evaluate models of great complexity. However, we believe that much more can be done to support a modeler in ensuring that the dynamic behavior of an executable simulation model is consistent with the modeler's understanding. In this paper, we describe a new command line version of Traviando that reads an execution trace of a discrete event simulation and generates a set of HTML formatted web pages to document properties that it recognizes from its input. Those properties include characteristics of state variables as well as changes to state variables that are performed by events. The point is to highlight the content of a simulation run in a format that is immediately accessible and understandable.
任何基于模型的系统可靠性评估都需要确认和验证,以证明其结果是有意义的。现代建模框架使我们能够创建和评估非常复杂的模型。然而,我们相信,在确保可执行仿真模型的动态行为与建模者的理解一致方面,可以做更多的工作来支持建模者。在本文中,我们描述了Traviando的一个新的命令行版本,它读取离散事件模拟的执行跟踪,并生成一组HTML格式的网页来记录它从输入中识别的属性。这些属性包括状态变量的特征以及由事件执行的对状态变量的更改。重点是突出模拟的内容,以一种可以立即访问和理解的格式运行。
{"title":"Report generation for simulation traces with Traviando","authors":"P. Kemper","doi":"10.1109/DSN.2009.5270317","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270317","url":null,"abstract":"Any model-based evaluation of the dependability of a system requires validation and verification to justify that its results are meaningful. Modern modeling frameworks enable us to create and evaluate models of great complexity. However, we believe that much more can be done to support a modeler in ensuring that the dynamic behavior of an executable simulation model is consistent with the modeler's understanding. In this paper, we describe a new command line version of Traviando that reads an execution trace of a discrete event simulation and generates a set of HTML formatted web pages to document properties that it recognizes from its input. Those properties include characteristics of state variables as well as changes to state variables that are performed by events. The point is to highlight the content of a simulation run in a format that is immediately accessible and understandable.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126458050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories 用鲁棒非线性码代替线性汉明码可以提高存储器的可靠性
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270297
Zhen Wang, M. Karpovsky, Konrad J. Kulikowski
Linear single-error-correcting, double-error-detecting (SEC-DED) codes used in the design of reliable memories cannot detect and can miscorrect errors with large Hamming weights. We propose protection for memory devices based on extended Vasil'ev codes. These nonlinear SECDED codes have a minimum distance of four, fewer undetectable errors and fewer errors that are miscorrected than linear codes with the same dimension and redundancy. The extended Vasil'ev codes can provide for higher reliability in the presence of repeating errors or high rate of multibitupsets. As far as we know, our paper is the only one discussing application of efficient nonlinear codes for design of reliable memories. The proposed approach can be applied to RAM, ROM, FLASH and disk memories with relatively low hardware overhead.
用于可靠存储器设计的线性单纠错双纠错(SEC-DED)码不能检测并能纠错具有较大汉明权值的错误。我们提出了基于扩展Vasil'ev代码的存储设备保护。与具有相同维数和冗余度的线性码相比,这些非线性SECDED码的最小距离为4,不可检测错误更少,错误纠正更少。扩展的Vasil'ev码可以在存在重复错误或高多位干扰率的情况下提供更高的可靠性。据我们所知,本文是唯一一篇讨论有效非线性编码在可靠存储器设计中的应用的论文。所提出的方法可以应用于RAM, ROM, FLASH和磁盘存储器,硬件开销相对较低。
{"title":"Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories","authors":"Zhen Wang, M. Karpovsky, Konrad J. Kulikowski","doi":"10.1109/DSN.2009.5270297","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270297","url":null,"abstract":"Linear single-error-correcting, double-error-detecting (SEC-DED) codes used in the design of reliable memories cannot detect and can miscorrect errors with large Hamming weights. We propose protection for memory devices based on extended Vasil'ev codes. These nonlinear SECDED codes have a minimum distance of four, fewer undetectable errors and fewer errors that are miscorrected than linear codes with the same dimension and redundancy. The extended Vasil'ev codes can provide for higher reliability in the presence of repeating errors or high rate of multibitupsets. As far as we know, our paper is the only one discussing application of efficient nonlinear codes for design of reliable memories. The proposed approach can be applied to RAM, ROM, FLASH and disk memories with relatively low hardware overhead.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
From assessment to standardised benchmarking: Will it happen? What could we do about it? 从评估到标准化基准:会发生吗?我们能做些什么呢?
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270325
H. Madeira, I. Majzik
Cost pressure, short time to market, and increased complexity are responsible for an evident increase of the failure rate of computing systems, while the cost of failures is growing rapidly, as a result of an unprecedented degree of dependence of our society on computing systems. The combination of these factors has created a dependability and security gap that is often perceived by users as a lack of trustworthiness in computer applications, and that is in fact undermining the network and service infrastructures that constitute the very core of the knowledge-based society.
成本压力、上市时间短以及复杂性的增加是计算系统故障率明显增加的原因,而故障的成本也在迅速增长,这是我们社会对计算系统前所未有的依赖程度的结果。这些因素的结合造成了可靠性和安全性的差距,用户通常认为这是计算机应用程序缺乏可信度,这实际上正在破坏构成知识社会核心的网络和服务基础设施。
{"title":"From assessment to standardised benchmarking: Will it happen? What could we do about it?","authors":"H. Madeira, I. Majzik","doi":"10.1109/DSN.2009.5270325","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270325","url":null,"abstract":"Cost pressure, short time to market, and increased complexity are responsible for an evident increase of the failure rate of computing systems, while the cost of failures is growing rapidly, as a result of an unprecedented degree of dependence of our society on computing systems. The combination of these factors has created a dependability and security gap that is often perceived by users as a lack of trustworthiness in computer applications, and that is in fact undermining the network and service infrastructures that constitute the very core of the knowledge-based society.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing transactional quality of service in event stream processing middleware 在事件流处理中间件中提供事务性服务质量
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270343
R. Strom, C. Dorai
We present an efficient algorithm for providing transactional guarantees when federating a transactional object store with a stream processing engine. The object store allows transactions to programmatically access and update persistent tables as inmemory map objects. The stream processing engine processes continuous queries on events from designated map objects to generate continuously updated derived views. Stream processing traditionally provides an “eventual correctness” guarantee; however our clients insisted upon a uniform transactional quality of service for the federated system: in particular, the system must guarantee that no transaction can observe an updated map object and a stale value of a derived view. A straightforward approach would entail executing all stream processing within the scope of transactions, and this comes at a performance cost. Our approach, based on a hybrid optimistic concurrency control technique, allows stream processing to proceed in parallel, usually after commit time. We present our algorithm along with experimental performance evaluations of both approaches.
我们提出了一种高效的算法,用于在将事务性对象存储与流处理引擎联合时提供事务性保证。对象存储允许事务以编程方式访问和更新作为内存映射对象的持久表。流处理引擎处理对来自指定映射对象的事件的连续查询,以生成不断更新的派生视图。流处理传统上提供了“最终正确性”保证;然而,我们的客户坚持要求联邦系统具有统一的事务服务质量:特别是,系统必须保证没有事务可以观察到更新的映射对象和派生视图的过时值。一种直接的方法需要执行事务范围内的所有流处理,而这是以性能为代价的。我们的方法基于混合乐观并发控制技术,允许流处理并行进行,通常在提交时间之后。我们提出了我们的算法以及两种方法的实验性能评估。
{"title":"Providing transactional quality of service in event stream processing middleware","authors":"R. Strom, C. Dorai","doi":"10.1109/DSN.2009.5270343","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270343","url":null,"abstract":"We present an efficient algorithm for providing transactional guarantees when federating a transactional object store with a stream processing engine. The object store allows transactions to programmatically access and update persistent tables as inmemory map objects. The stream processing engine processes continuous queries on events from designated map objects to generate continuously updated derived views. Stream processing traditionally provides an “eventual correctness” guarantee; however our clients insisted upon a uniform transactional quality of service for the federated system: in particular, the system must guarantee that no transaction can observe an updated map object and a stale value of a derived view. A straightforward approach would entail executing all stream processing within the scope of transactions, and this comes at a performance cost. Our approach, based on a hybrid optimistic concurrency control technique, allows stream processing to proceed in parallel, usually after commit time. We present our algorithm along with experimental performance evaluations of both approaches.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verme: Worm containment in overlay networks 蠕虫:覆盖网络中的蠕虫遏制
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270341
Filipe Freitas, Edgar Marques, R. Rodrigues, Carlos Ribeiro, Paulo Ferreira, Luís E. T. Rodrigues
Topological worms, such as those that propagate by following links in an overlay network, have the potential to spread faster than traditional random scanning worms because they have knowledge of a subset of the overlay nodes, and choose these nodes to propagate themselves; and also because they can avoid traditional detection mechanisms. Furthermore, this worm propagation strategy is likely to become prevalent as the deployment of networks with a sparse address space, such as IPv6, makes the traditional random scanning strategy futile.
拓扑蠕虫,例如那些通过覆盖网络中的链接传播的蠕虫,有可能比传统的随机扫描蠕虫传播得更快,因为它们知道覆盖节点的子集,并选择这些节点自己传播;也因为它们可以避开传统的检测机制。此外,随着地址空间稀疏的网络(如IPv6)的部署,使得传统的随机扫描策略无效,这种蠕虫传播策略可能会变得普遍。
{"title":"Verme: Worm containment in overlay networks","authors":"Filipe Freitas, Edgar Marques, R. Rodrigues, Carlos Ribeiro, Paulo Ferreira, Luís E. T. Rodrigues","doi":"10.1109/DSN.2009.5270341","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270341","url":null,"abstract":"Topological worms, such as those that propagate by following links in an overlay network, have the potential to spread faster than traditional random scanning worms because they have knowledge of a subset of the overlay nodes, and choose these nodes to propagate themselves; and also because they can avoid traditional detection mechanisms. Furthermore, this worm propagation strategy is likely to become prevalent as the deployment of networks with a sparse address space, such as IPv6, makes the traditional random scanning strategy futile.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115542558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2009 IEEE/IFIP International Conference on Dependable Systems & Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1