首页 > 最新文献

2009 IEEE/IFIP International Conference on Dependable Systems & Networks最新文献

英文 中文
On the effectiveness of low latency anonymous network in the presence of timing attack 低延迟匿名网络在存在定时攻击时的有效性研究
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270306
Jinghe Jin, Xinyuan Wang
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel measurement of the distortion of the packet timing between the incoming and the outgoing flows to and from the anonymous network and it uses wavelet based analysis to measure the variability of the distortion. To the best of our knowledge, our approach is the first practical method that can quantitatively measure the packet timing distortion between flows that may have gone through such transformations as flow mixing/spliting/merging, adding chaff, packet dropping. To validate our anonymity metric, we have conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer.com and have used the timing attack results as the ground truth for validating our anonymity metric. We have found strong correlation between our anonymity metric and the timing attack results. Our metric measurements and timing attack results show that the circuit rotation in Tor network could significantly increase its resistance to timing attack at the cost of more timing disturbances to the normal users. In addition, we have found that adding constant rate chaff (i.e. cover traffic) has diminishing effect in anonymizing packet flows.
在本文中,我们引入了一种新的度量,可以定量地衡量所有匿名网络在存在定时攻击时的实际有效性(即匿名性)。我们的度量是基于一种新颖的测量方法,测量进出匿名网络的输入和输出流之间的数据包时间畸变,并使用基于小波的分析来测量畸变的可变性。据我们所知,我们的方法是第一个可以定量测量流之间数据包时序失真的实用方法,这些流可能经历了诸如流混合/分裂/合并、添加箔条、数据包掉落等转换。为了验证我们的匿名度量,我们对各种部署的匿名网络(如Tor, anonymizer.com)进行了实时定时攻击,并使用定时攻击结果作为验证我们的匿名度量的基础事实。我们发现匿名度量和定时攻击结果之间存在很强的相关性。我们的度量测量和时序攻击结果表明,Tor网络中的电路旋转可以显著提高其对时序攻击的抵抗力,但代价是对正常用户造成更多的时序干扰。此外,我们发现添加恒定速率箔条(即覆盖流量)对匿名数据包流的影响越来越小。
{"title":"On the effectiveness of low latency anonymous network in the presence of timing attack","authors":"Jinghe Jin, Xinyuan Wang","doi":"10.1109/DSN.2009.5270306","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270306","url":null,"abstract":"In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel measurement of the distortion of the packet timing between the incoming and the outgoing flows to and from the anonymous network and it uses wavelet based analysis to measure the variability of the distortion. To the best of our knowledge, our approach is the first practical method that can quantitatively measure the packet timing distortion between flows that may have gone through such transformations as flow mixing/spliting/merging, adding chaff, packet dropping. To validate our anonymity metric, we have conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer.com and have used the timing attack results as the ground truth for validating our anonymity metric. We have found strong correlation between our anonymity metric and the timing attack results. Our metric measurements and timing attack results show that the circuit rotation in Tor network could significantly increase its resistance to timing attack at the cost of more timing disturbances to the normal users. In addition, we have found that adding constant rate chaff (i.e. cover traffic) has diminishing effect in anonymizing packet flows.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134374295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design and development of a proof-of-concept platooning application using the HIDENETS architecture 使用HIDENETS架构设计和开发概念验证队列应用程序
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270334
Luis Marques, A. Casimiro, M. Calha
This paper describes the design and development of a proof-of-concept platooning application, which operates in a mobile and dynamic environment and makes use of architectural and middleware solutions that were proposed in the scope of the HIDENETS project. With this application it is possible to demonstrate the practical feasibility of a hybrid system architecture, with realms of operation with distinct synchrony properties, and the benefits of adopting such architecture. In particular, we show that it is possible to improve the performance and behavior of the platooning application, which operates over an intrinsically uncertain environment (due to mobility and wireless communication), and still secure fundamental safety-critical requirements.
本文描述了一个概念验证队列应用程序的设计和开发,该应用程序在移动和动态环境中运行,并利用了在HIDENETS项目范围内提出的架构和中间件解决方案。通过这个应用程序,可以演示混合系统体系结构的实际可行性,以及具有不同同步属性的操作领域,以及采用这种体系结构的好处。特别是,我们展示了在本质上不确定的环境(由于移动性和无线通信)中运行的队列应用程序的性能和行为有可能得到改善,并且仍然可以确保基本的安全关键要求。
{"title":"Design and development of a proof-of-concept platooning application using the HIDENETS architecture","authors":"Luis Marques, A. Casimiro, M. Calha","doi":"10.1109/DSN.2009.5270334","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270334","url":null,"abstract":"This paper describes the design and development of a proof-of-concept platooning application, which operates in a mobile and dynamic environment and makes use of architectural and middleware solutions that were proposed in the scope of the HIDENETS project. With this application it is possible to demonstrate the practical feasibility of a hybrid system architecture, with realms of operation with distinct synchrony properties, and the benefits of adopting such architecture. In particular, we show that it is possible to improve the performance and behavior of the platooning application, which operates over an intrinsically uncertain environment (due to mobility and wireless communication), and still secure fundamental safety-critical requirements.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code 所见即所得:一种在Linux代码中查找API协议和bug的声明性方法
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270354
J. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, H. Stuart, Gilles Muller
Eliminating OS bugs is essential to ensuring the reliability of infrastructures ranging from embedded systems to servers. Several tools based on static analysis have been proposed for finding bugs in OS code. They have, however, emphasized scalability over usability, making it difficult to focus the tools on specific kinds of bugs and to relate the results to patterns in the source code. We propose a declarative approach to bug finding in Linux OS code using a control-flow based program search engine. Our approach is WYSIWIB (What You See Is Where It Bugs), since the programmer expresses specifications for bug finding using a syntax close to that of ordinary C code. The key advantage of our approach is that search specifications can be easily tailored, to eliminate false positives or catch more bugs. We present three case studies that have allowed us to find hundreds of potential bugs.
消除操作系统错误对于确保从嵌入式系统到服务器的基础设施的可靠性至关重要。已经提出了几种基于静态分析的工具来查找操作系统代码中的错误。然而,他们强调可伸缩性而不是可用性,这使得很难将工具集中在特定类型的错误上,并将结果与源代码中的模式联系起来。我们提出了一种使用基于控制流的程序搜索引擎在Linux操作系统代码中查找bug的声明式方法。我们的方法是WYSIWIB(所见即所错),因为程序员使用接近普通C代码的语法来表达查找错误的规范。我们的方法的主要优点是,搜索规范可以很容易地定制,以消除误报或捕获更多的错误。我们提供了三个案例研究,它们帮助我们发现了数百个潜在的bug。
{"title":"WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code","authors":"J. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, H. Stuart, Gilles Muller","doi":"10.1109/DSN.2009.5270354","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270354","url":null,"abstract":"Eliminating OS bugs is essential to ensuring the reliability of infrastructures ranging from embedded systems to servers. Several tools based on static analysis have been proposed for finding bugs in OS code. They have, however, emphasized scalability over usability, making it difficult to focus the tools on specific kinds of bugs and to relate the results to patterns in the source code. We propose a declarative approach to bug finding in Linux OS code using a control-flow based program search engine. Our approach is WYSIWIB (What You See Is Where It Bugs), since the programmer expresses specifications for bug finding using a syntax close to that of ordinary C code. The key advantage of our approach is that search specifications can be easily tailored, to eliminate false positives or catch more bugs. We present three case studies that have allowed us to find hundreds of potential bugs.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Fail-Aware Untrusted Storage 故障感知不可信存储
C. Cachin, I. Keidar, A. Shraer
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence not fully trusted by the clients. We introduce the abstraction of a fail-aware untrusted service, with meaningful semantics even when the provider is faulty. In the common case, when the provider is correct, such a service guarantees consistency (linearizability) and liveness (wait-freedom) of all operations. In addition, the service always provides accurate and complete consistency and failure detection. We illustrate our new abstraction by presenting a Fail-Aware Untrusted STorage service (FAUST). Existing storage protocols in this model guarantee so-called forking semantics. We observe, however, that none of the previously suggested protocols suffice for implementing fail-aware untrusted storage with the desired liveness and consistency properties (at least wait-freedom and linearizability when the server is correct). We present a new storage protocol, which does not suffer from this limitation, and implements a new consistency notion, called weak fork-linearizability. We show how to extend this protocol to provide eventual consistency and failure awareness in FAUST.
我们考虑一组通过在线服务提供商进行协作的客户端,该服务提供商容易受到攻击,因此不受客户端完全信任。我们引入了故障感知的不受信任服务的抽象,即使在提供者出现故障时也具有有意义的语义。在通常情况下,当提供者正确时,这样的服务保证所有操作的一致性(线性化)和活动性(无等待)。此外,该服务始终提供准确完整的一致性和故障检测。我们通过提供故障感知不受信任存储服务(FAUST)来说明我们的新抽象。该模型中的现有存储协议保证了所谓的分叉语义。然而,我们注意到,前面建议的协议都不足以实现具有所需的活跃性和一致性属性(至少在服务器正确时具有等待自由和线性性)的故障感知不可信存储。我们提出了一种新的存储协议,它不受这种限制,并实现了一个新的一致性概念,称为弱分叉线性化。我们将展示如何扩展该协议以在FAUST中提供最终的一致性和故障感知。
{"title":"Fail-Aware Untrusted Storage","authors":"C. Cachin, I. Keidar, A. Shraer","doi":"10.1137/090751062","DOIUrl":"https://doi.org/10.1137/090751062","url":null,"abstract":"We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence not fully trusted by the clients. We introduce the abstraction of a fail-aware untrusted service, with meaningful semantics even when the provider is faulty. In the common case, when the provider is correct, such a service guarantees consistency (linearizability) and liveness (wait-freedom) of all operations. In addition, the service always provides accurate and complete consistency and failure detection. We illustrate our new abstraction by presenting a Fail-Aware Untrusted STorage service (FAUST). Existing storage protocols in this model guarantee so-called forking semantics. We observe, however, that none of the previously suggested protocols suffice for implementing fail-aware untrusted storage with the desired liveness and consistency properties (at least wait-freedom and linearizability when the server is correct). We present a new storage protocol, which does not suffer from this limitation, and implements a new consistency notion, called weak fork-linearizability. We show how to extend this protocol to provide eventual consistency and failure awareness in FAUST.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Sharing end-user negative symptoms for improving overlay network dependability 共享最终用户的负面症状,以提高覆盖网络的可靠性
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270328
Yongning Tang, E. Al-Shaer
The dependability of overlay services rely on the overlay network's capabilities to effectively diagnose and recover faults (e.g., link failures, overlay node outages). However, overlay applications bring to overlay fault diagnosis new challenges, which include large-scale deployment, inaccessible underlying network information, dynamic symptom-fault causality relationship, and multi-layer complexity. In this paper, we develop an evidential overlay fault diagnosis framework (called DigOver) to tackle these challenges. Firstly, the DigOver identifies a set of potential faulty components based on shared end-user observed negative symptoms. Then, each potential faulty component is evaluated to quantify its fault likelihood and the corresponding evaluation uncertainty. Finally, the DigOver dynamically constructs a plausible fault graph to locate the root causes of end-user observed negative symptoms.
覆盖服务的可靠性依赖于覆盖网络有效诊断和恢复故障(例如,链路故障,覆盖节点中断)的能力。然而,叠加应用给叠加故障诊断带来了大规模部署、底层网络信息不可访问、症状-故障因果关系动态性、多层复杂性等新的挑战。在本文中,我们开发了一个证据覆盖故障诊断框架(称为DigOver)来解决这些挑战。首先,DigOver根据共享的最终用户观察到的负面症状识别一组潜在故障组件。然后,对每个潜在故障部件进行评估,量化其故障可能性和相应的评估不确定性。最后,DigOver动态构建一个合理的故障图,以定位最终用户观察到的阴性症状的根本原因。
{"title":"Sharing end-user negative symptoms for improving overlay network dependability","authors":"Yongning Tang, E. Al-Shaer","doi":"10.1109/DSN.2009.5270328","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270328","url":null,"abstract":"The dependability of overlay services rely on the overlay network's capabilities to effectively diagnose and recover faults (e.g., link failures, overlay node outages). However, overlay applications bring to overlay fault diagnosis new challenges, which include large-scale deployment, inaccessible underlying network information, dynamic symptom-fault causality relationship, and multi-layer complexity. In this paper, we develop an evidential overlay fault diagnosis framework (called DigOver) to tackle these challenges. Firstly, the DigOver identifies a set of potential faulty components based on shared end-user observed negative symptoms. Then, each potential faulty component is evaluated to quantify its fault likelihood and the corresponding evaluation uncertainty. Finally, the DigOver dynamically constructs a plausible fault graph to locate the root causes of end-user observed negative symptoms.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129353524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Language level checkpointing support for stream processing applications 对流处理应用程序的语言级检查点支持
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270344
Gabriela Jacques-Silva, B. Gedik, H. Andrade, Kun-Lung Wu
Many streaming applications demand continuous processing of live data with little or no downtime, therefore, making high-availability a crucial operational requirement. Fault tolerance techniques are generally expensive and when directly applied to streaming systems with stringent throughput and latency requirements, they might incur a prohibitive performance overhead. This paper describes a flexible, light-weight fault tolerance solution in the context of the SPADE language and the System S distributed stream processing engine. We devised language extensions so users can define and parameterize check-point policies easily. This configurable fault tolerance solution is implemented through code generation in SPADE, which reduces the overall application fault tolerance costs by incurring them only for the parts of the application that require it. In this paper we focus on the overall design of our checkpoint mechanism and we also describe an incremental checkpointing algorithm that is suitable for on-the-fly processing of high-rate data streams.
许多流应用程序需要在很少或没有停机时间的情况下连续处理实时数据,因此,高可用性成为关键的操作需求。容错技术通常是昂贵的,当直接应用于具有严格吞吐量和延迟需求的流系统时,它们可能会导致令人望而却步的性能开销。本文在SPADE语言和System S分布式流处理引擎的背景下,描述了一种灵活、轻量级的容错解决方案。我们设计了语言扩展,以便用户可以轻松地定义和参数化检查点策略。这种可配置的容错解决方案是通过在SPADE中生成代码来实现的,它通过只对应用程序中需要容错的部分产生容错,从而降低了应用程序的总体容错成本。本文重点介绍了检查点机制的总体设计,并描述了一种适用于高速数据流实时处理的增量检查点算法。
{"title":"Language level checkpointing support for stream processing applications","authors":"Gabriela Jacques-Silva, B. Gedik, H. Andrade, Kun-Lung Wu","doi":"10.1109/DSN.2009.5270344","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270344","url":null,"abstract":"Many streaming applications demand continuous processing of live data with little or no downtime, therefore, making high-availability a crucial operational requirement. Fault tolerance techniques are generally expensive and when directly applied to streaming systems with stringent throughput and latency requirements, they might incur a prohibitive performance overhead. This paper describes a flexible, light-weight fault tolerance solution in the context of the SPADE language and the System S distributed stream processing engine. We devised language extensions so users can define and parameterize check-point policies easily. This configurable fault tolerance solution is implemented through code generation in SPADE, which reduces the overall application fault tolerance costs by incurring them only for the parts of the application that require it. In this paper we focus on the overall design of our checkpoint mechanism and we also describe an incremental checkpointing algorithm that is suitable for on-the-fly processing of high-rate data streams.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Analyzing the process of installing rogue software 分析恶意软件的安装过程
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270293
R. Berthier, Jorge Arjona, M. Cukier
This practical experience report presents the results of an experiment aimed at understanding the sequence of malicious actions following a remote compromise. The type of rogue software installed during attacks was used to classify and understand sequences of malicious actions. For this experiment, we used four Linux target computers running SSH with simple passwords. During the eight-month data collection period, we recorded a total of 1,171 attack sessions. In these sessions, attackers typed a total of 20,335 commands that we categorized into 24 specific actions. These actions were analyzed based on the type of rogue software installed by attackers.
这篇实践经验报告介绍了一个实验的结果,旨在了解远程入侵后恶意行为的顺序。在攻击期间安装的恶意软件类型用于分类和理解恶意操作的序列。在这个实验中,我们使用四台运行SSH的Linux目标计算机,使用简单的密码。在8个月的数据收集期间,我们总共记录了1171次攻击会话。在这些会话中,攻击者总共输入了20,335个命令,我们将其分类为24个特定操作。这些行为是根据攻击者安装的恶意软件类型进行分析的。
{"title":"Analyzing the process of installing rogue software","authors":"R. Berthier, Jorge Arjona, M. Cukier","doi":"10.1109/DSN.2009.5270293","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270293","url":null,"abstract":"This practical experience report presents the results of an experiment aimed at understanding the sequence of malicious actions following a remote compromise. The type of rogue software installed during attacks was used to classify and understand sequences of malicious actions. For this experiment, we used four Linux target computers running SSH with simple passwords. During the eight-month data collection period, we recorded a total of 1,171 attack sessions. In these sessions, attackers typed a total of 20,335 commands that we categorized into 24 specific actions. These actions were analyzed based on the type of rogue software installed by attackers.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Exploiting refactoring in formal verification 在正式验证中利用重构
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270355
Xiang Yin, J. Knight, Westley Weimer
In previous work, we introduced Echo, a new approach to the formal verification of the functional correctness of software. Part of what makes Echo practical is a technique called verification refactoring. The program to be verified is mechanically refactored specifically to facilitate verification. After refactoring, the program is documented with low-level annotations, and a specification is extracted mechanically. Proofs that the semantics of the refactored program are equivalent to those of the original program, that the code conforms to the annotations, and that the extracted specification implies the program's original specification constitute the verification argument. In this paper, we discuss verification refactoring and illustrate it with a case study of the verification of an optimized implementation of the Advanced Encryption Standard (AES) against its official specification. We compare the practicality of verification using refactoring with traditional correctness proofs and refinement, and we assess its efficacy using seeded defects.
在之前的工作中,我们介绍了Echo,一种用于正式验证软件功能正确性的新方法。使Echo实用的部分原因是一种称为验证重构的技术。要验证的程序被机械地重构,以方便验证。重构之后,用低级注释记录程序,并机械地提取规范。证明重构程序的语义与原始程序的语义相等,代码符合注释,以及提取的规范暗示程序的原始规范构成验证参数。在本文中,我们讨论验证重构,并通过对高级加密标准(AES)的优化实现进行验证的案例研究来说明它。我们比较了使用重构的验证的实用性与传统的正确性证明和改进,并使用种子缺陷评估了其有效性。
{"title":"Exploiting refactoring in formal verification","authors":"Xiang Yin, J. Knight, Westley Weimer","doi":"10.1109/DSN.2009.5270355","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270355","url":null,"abstract":"In previous work, we introduced Echo, a new approach to the formal verification of the functional correctness of software. Part of what makes Echo practical is a technique called verification refactoring. The program to be verified is mechanically refactored specifically to facilitate verification. After refactoring, the program is documented with low-level annotations, and a specification is extracted mechanically. Proofs that the semantics of the refactored program are equivalent to those of the original program, that the code conforms to the annotations, and that the extracted specification implies the program's original specification constitute the verification argument. In this paper, we discuss verification refactoring and illustrate it with a case study of the verification of an optimized implementation of the Advanced Encryption Standard (AES) against its official specification. We compare the practicality of verification using refactoring with traditional correctness proofs and refinement, and we assess its efficacy using seeded defects.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
RRE: A game-theoretic intrusion Response and Recovery Engine 一个博弈论的入侵响应与恢复引擎
Pub Date : 2009-06-01 DOI: 10.1109/DSN.2009.5270307
Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in automated response techniques. In this paper, we propose a new approach to automated response called the Response and Recovery Engine (RRE). Our engine employs a game-theoretic response strategy against adversaries modeled as opponents in a two-player Stackelberg stochastic game. RRE applies attack-response trees to analyze undesired security events and their countermeasures using Boolean logic to combine lower-level attack consequences. In addition, RRE accounts for uncertainties in intrusion detection alert notifications. RRE then chooses optimal response actions by solving a partially observable competitive Markov decision process that is automatically derived from attack-response trees. Experimental results show that RRE, using Snort's alerts, can protect large networks for which attack-response trees have more than 900 nodes.
面对快速扩散的入侵,保持网络计算系统的可用性和完整性不仅需要在检测算法上取得进步,而且需要在自动响应技术上取得进步。在本文中,我们提出了一种新的自动响应方法,称为响应和恢复引擎(RRE)。我们的引擎采用了一种博弈论的响应策略,将对手建模为双玩家Stackelberg随机博弈中的对手。RRE应用攻击响应树来分析不需要的安全事件及其对策,使用布尔逻辑来组合较低级别的攻击后果。此外,RRE考虑了入侵检测警报通知中的不确定性。然后,RRE通过求解由攻击-响应树自动生成的部分可观察竞争马尔可夫决策过程来选择最优响应行动。实验结果表明,使用Snort的警报,RRE可以保护攻击响应树有超过900个节点的大型网络。
{"title":"RRE: A game-theoretic intrusion Response and Recovery Engine","authors":"Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley","doi":"10.1109/DSN.2009.5270307","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270307","url":null,"abstract":"Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in automated response techniques. In this paper, we propose a new approach to automated response called the Response and Recovery Engine (RRE). Our engine employs a game-theoretic response strategy against adversaries modeled as opponents in a two-player Stackelberg stochastic game. RRE applies attack-response trees to analyze undesired security events and their countermeasures using Boolean logic to combine lower-level attack consequences. In addition, RRE accounts for uncertainties in intrusion detection alert notifications. RRE then chooses optimal response actions by solving a partially observable competitive Markov decision process that is automatically derived from attack-response trees. Experimental results show that RRE, using Snort's alerts, can protect large networks for which attack-response trees have more than 900 nodes.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Fluid modeling and control for server system performance and availability 服务器系统性能和可用性的流体建模和控制
Pub Date : 2009-06-01 DOI: 10.1109/DSN.2009.5270311
Luc Malrait, S. Bouchenak, N. Marchand
Although server technology provides a means to support a wide range of online services and applications, their ad-hoc configuration poses significant challenges to the performance, availability and economical costs of applications. In this paper, we examine the impact of server configuration on the central tradeoff between service performance and availability. First, we present a server model as a nonlinear continuous-time model using fluid approximations. Second, we develop admission control of server systems for an optimal configuration. We provide two control laws for two different QoS objectives. AM-C is an availability-maximizing admission control that achieves the highest service availability given a fixed performance constraint; and PM-C is a performance-maximizing admission control that meets a desired availability target with the highest performance. We evaluate our fluid model and control techniques on the TPC-C industry-standard benchmark. Our experiments show that the proposed techniques improve performance by up to 30 % while guaranteeing availability constraints.
尽管服务器技术提供了一种支持广泛的在线服务和应用程序的方法,但它们的特别配置对应用程序的性能、可用性和经济成本提出了重大挑战。在本文中,我们将研究服务器配置对服务性能和可用性之间的中心权衡的影响。首先,我们提出了一个服务器模型作为非线性连续时间模型使用流体近似。其次,我们开发了最优配置的服务器系统的准入控制。我们为两个不同的QoS目标提供了两个控制律。AM-C是一种可用性最大化的准入控制,在给定固定的性能约束条件下实现最高的服务可用性;PM-C是一种性能最大化的准入控制,它以最高的性能满足期望的可用性目标。我们在TPC-C工业标准基准上评估了我们的流体模型和控制技术。我们的实验表明,在保证可用性约束的情况下,所提出的技术将性能提高了30%。
{"title":"Fluid modeling and control for server system performance and availability","authors":"Luc Malrait, S. Bouchenak, N. Marchand","doi":"10.1109/DSN.2009.5270311","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270311","url":null,"abstract":"Although server technology provides a means to support a wide range of online services and applications, their ad-hoc configuration poses significant challenges to the performance, availability and economical costs of applications. In this paper, we examine the impact of server configuration on the central tradeoff between service performance and availability. First, we present a server model as a nonlinear continuous-time model using fluid approximations. Second, we develop admission control of server systems for an optimal configuration. We provide two control laws for two different QoS objectives. AM-C is an availability-maximizing admission control that achieves the highest service availability given a fixed performance constraint; and PM-C is a performance-maximizing admission control that meets a desired availability target with the highest performance. We evaluate our fluid model and control techniques on the TPC-C industry-standard benchmark. Our experiments show that the proposed techniques improve performance by up to 30 % while guaranteeing availability constraints.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128005429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2009 IEEE/IFIP International Conference on Dependable Systems & Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1