首页 > 最新文献

2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing最新文献

英文 中文
Formal Verification of Industrial Software with Dynamic Memory Management 工业软件动态内存管理的形式化验证
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.19
S. Labbé, Arnaud Sangnier
Tool-based analytic techniques such as formal verification may be used to justify the quality, correctness and dependability of software involved in digital control systems. This paper reports on the development and application of a tool-based methodology, the purpose of which is the formal verification of freedom from intrinsic software faults related to dynamic memory management. The paper introduces the operational and research context in the power generation industry, in which this work takes place. The theoretical framework and the tool at the cornerstone of the methodology are then presented. The paper also presents the practical aspects of the research: software under analysis, experimental results and lessons learned. The results are seen promising, as the methodology scales accurately in identified conditions of analysis, and has a number of perspectives which are currently under study in ongoing work.
基于工具的分析技术,如形式验证,可用于证明数字控制系统中涉及的软件的质量、正确性和可靠性。本文报告了一种基于工具的方法的开发和应用,其目的是正式验证与动态内存管理相关的内在软件故障的自由。本文介绍了发电行业的运作和研究背景,并在其中进行了这项工作。理论框架和工具在方法论的基石,然后提出。文章还介绍了研究的实践方面:软件分析、实验结果和经验教训。结果被认为是有希望的,因为该方法在确定的分析条件下准确地衡量,并且有一些目前正在进行的工作中研究的观点。
{"title":"Formal Verification of Industrial Software with Dynamic Memory Management","authors":"S. Labbé, Arnaud Sangnier","doi":"10.1109/PRDC.2010.19","DOIUrl":"https://doi.org/10.1109/PRDC.2010.19","url":null,"abstract":"Tool-based analytic techniques such as formal verification may be used to justify the quality, correctness and dependability of software involved in digital control systems. This paper reports on the development and application of a tool-based methodology, the purpose of which is the formal verification of freedom from intrinsic software faults related to dynamic memory management. The paper introduces the operational and research context in the power generation industry, in which this work takes place. The theoretical framework and the tool at the cornerstone of the methodology are then presented. The paper also presents the practical aspects of the research: software under analysis, experimental results and lessons learned. The results are seen promising, as the methodology scales accurately in identified conditions of analysis, and has a number of perspectives which are currently under study in ongoing work.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123210190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Searching Representative and Low Cost Fault Models for Intermittent Faults in Microcontrollers: A Case Study 寻找具有代表性和低成本的微控制器间歇故障模型:一个案例研究
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.18
J. Gracia, D. Gil, J. Baraza, L. J. Saiz, P. Gil
Intermittent faults are expected to be a great challenge in VLSI circuits. The complexity of manufacturing processes, provoking residues and process variations, and special wear out mechanisms, may increase the presence of such faults. This work presents a case study of the effects of intermittent faults on the behavior of a commercial micro controller. By using VHDL-based fault injection, particularly saboteurs, we have injected different intermittent fault models in the micro controller buses, as they are critical locations, potentially sensitive to intermittent faults. We have compared the impact and the feasibility of implementation of the fault models, in order to select a representative and low cost intermittent fault load. The applied methodology can be generalized to inject intermittent faults in other locations, such as registers and memory, and to validate the dependability of critical systems.
间歇性故障预计是VLSI电路中的一个巨大挑战。制造过程的复杂性,引发残留物和工艺变化,以及特殊的磨损机制,可能会增加此类故障的存在。这项工作提出了间歇性故障对商业微控制器行为影响的案例研究。通过使用基于vhdl的故障注入,特别是破坏者,我们在微控制器总线中注入了不同的间歇性故障模型,因为它们是关键位置,对间歇性故障可能很敏感。通过对各故障模型实施的影响和可行性进行比较,以选择具有代表性且成本较低的间歇性故障负荷。应用的方法可以推广到注入间歇故障在其他位置,如寄存器和存储器,并验证关键系统的可靠性。
{"title":"Searching Representative and Low Cost Fault Models for Intermittent Faults in Microcontrollers: A Case Study","authors":"J. Gracia, D. Gil, J. Baraza, L. J. Saiz, P. Gil","doi":"10.1109/PRDC.2010.18","DOIUrl":"https://doi.org/10.1109/PRDC.2010.18","url":null,"abstract":"Intermittent faults are expected to be a great challenge in VLSI circuits. The complexity of manufacturing processes, provoking residues and process variations, and special wear out mechanisms, may increase the presence of such faults. This work presents a case study of the effects of intermittent faults on the behavior of a commercial micro controller. By using VHDL-based fault injection, particularly saboteurs, we have injected different intermittent fault models in the micro controller buses, as they are critical locations, potentially sensitive to intermittent faults. We have compared the impact and the feasibility of implementation of the fault models, in order to select a representative and low cost intermittent fault load. The applied methodology can be generalized to inject intermittent faults in other locations, such as registers and memory, and to validate the dependability of critical systems.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128183937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Composition Kernel: A Multi-core Processor Virtualization Layer for Highly Functional Embedded Systems 复合内核:用于高功能嵌入式系统的多核处理器虚拟化层
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.11
T. Nakajima, Y. Kinebuchi, Alexandre Courbot, H. Shimada, Tsung-Han Lin, Hitoshi Mitake
In this paper, we propose a composition kernel where multiple OS kernels are running on top of a very thin hardware abstraction layer. A composition kernel can reduce the engineering cost of developing an embedded system by reusing existing OS kernels and application with minimum modification without assuming special hardware supports.
在本文中,我们提出了一个组合内核,其中多个操作系统内核运行在一个非常薄的硬件抽象层之上。复合内核可以通过重用现有的操作系统内核和应用程序来减少开发嵌入式系统的工程成本,而不需要特殊的硬件支持。
{"title":"Composition Kernel: A Multi-core Processor Virtualization Layer for Highly Functional Embedded Systems","authors":"T. Nakajima, Y. Kinebuchi, Alexandre Courbot, H. Shimada, Tsung-Han Lin, Hitoshi Mitake","doi":"10.1109/PRDC.2010.11","DOIUrl":"https://doi.org/10.1109/PRDC.2010.11","url":null,"abstract":"In this paper, we propose a composition kernel where multiple OS kernels are running on top of a very thin hardware abstraction layer. A composition kernel can reduce the engineering cost of developing an embedded system by reusing existing OS kernels and application with minimum modification without assuming special hardware supports.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach 基础设施即服务云的端到端性能分析:一种交互随机模型方法
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.30
R. Ghosh, Kishor S. Trivedi, V. Naik, Dong Seong Kim
Handling diverse client demands and managing unexpected failures without degrading performance are two key promises of a cloud delivered service. However, evaluation of a cloud service quality becomes difficult as the scale and complexity of a cloud system increases. In a cloud environment, service request from a user goes through a variety of provider specific processing steps from the instant it is submitted until the service is fully delivered. Measurement-based evaluation of cloud service quality is expensive especially if many configurations, workload scenarios, and management methods are to be analyzed. To overcome these difficulties, in this paper we propose a general analytic model based approach for an end-to-end perform ability analysis of a cloud service. We illustrate our approach using Infrastructure-as-a-Service (IaaS) cloud, where service availability and provisioning response delays are two key QoS metrics. A novelty of our approach is in reducing the complexity of analysis by dividing the overall model into sub-models and then obtaining the overall solution by iteration over individual sub-model solutions. In contrast to a single one-level monolithic model, our approach yields a high fidelity model that is tractable and scalable. Our approach and underlying models can be readily extended to other types of cloud services and are applicable to public, private and hybrid clouds.
处理不同的客户需求和管理意外故障而不降低性能是云交付服务的两个关键承诺。然而,随着云系统的规模和复杂性的增加,云服务质量的评估变得越来越困难。在云环境中,来自用户的服务请求从提交的那一刻起,到服务完全交付为止,要经历各种特定于提供商的处理步骤。基于度量的云服务质量评估是非常昂贵的,特别是在需要分析许多配置、工作负载场景和管理方法的情况下。为了克服这些困难,本文提出了一种基于通用分析模型的方法,用于云服务的端到端执行能力分析。我们使用基础设施即服务(IaaS)云来说明我们的方法,其中服务可用性和供应响应延迟是两个关键的QoS指标。我们方法的新颖之处在于通过将整体模型划分为子模型,然后通过迭代各个子模型解决方案来获得整体解决方案,从而降低了分析的复杂性。与单一的单级整体模型相比,我们的方法产生了一个易于处理和可扩展的高保真模型。我们的方法和底层模型可以很容易地扩展到其他类型的云服务,并且适用于公共云、私有云和混合云。
{"title":"End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach","authors":"R. Ghosh, Kishor S. Trivedi, V. Naik, Dong Seong Kim","doi":"10.1109/PRDC.2010.30","DOIUrl":"https://doi.org/10.1109/PRDC.2010.30","url":null,"abstract":"Handling diverse client demands and managing unexpected failures without degrading performance are two key promises of a cloud delivered service. However, evaluation of a cloud service quality becomes difficult as the scale and complexity of a cloud system increases. In a cloud environment, service request from a user goes through a variety of provider specific processing steps from the instant it is submitted until the service is fully delivered. Measurement-based evaluation of cloud service quality is expensive especially if many configurations, workload scenarios, and management methods are to be analyzed. To overcome these difficulties, in this paper we propose a general analytic model based approach for an end-to-end perform ability analysis of a cloud service. We illustrate our approach using Infrastructure-as-a-Service (IaaS) cloud, where service availability and provisioning response delays are two key QoS metrics. A novelty of our approach is in reducing the complexity of analysis by dividing the overall model into sub-models and then obtaining the overall solution by iteration over individual sub-model solutions. In contrast to a single one-level monolithic model, our approach yields a high fidelity model that is tractable and scalable. Our approach and underlying models can be readily extended to other types of cloud services and are applicable to public, private and hybrid clouds.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133821429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown Participants 一种改进的未知参与者容错共识的知识连通性条件
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.20
Jichiang Tsai, Che-Cheng Chang
For self-organized networks that possess highly decentralized and self-organized natures, neither the identity nor the number of processes is known to all participants at the beginning of the computation because no central authority exists to initialize each participant with some context information. Hence, consensus, which is essential to solving the agreement problem, in such networks cannot be achieved in the ways for traditional fixed networks. To address this problem of Consensus with Unknown Participants (CUP), a variant of the traditional consensus problem was proposed in the literature, by relaxing the requirement for the original knowledge owned by every process about all participants in the computation. Correspondingly, the CUP problem considering process crashes was also introduced, called the Fault-Tolerant Consensus with Unknown Participants (FT-CUP) problem. In this paper, we propose a knowledge connectivity condition sufficient for solving the FT-CUP problem, which is improved from the one proposed in our previous work.
对于具有高度分散和自组织性质的自组织网络,在计算开始时,所有参与者都不知道身份和进程的数量,因为不存在中央权威机构来用一些上下文信息初始化每个参与者。因此,在这种网络中,无法以传统固定网络的方式实现共识,而共识对于解决协议问题至关重要。为了解决未知参与者的共识问题,文献中提出了传统共识问题的一种变体,通过放宽每个过程对计算中所有参与者的原始知识的要求。相应的,还引入了考虑进程崩溃的CUP问题,称为未知参与者容错共识(FT-CUP)问题。在本文中,我们提出了一个足以解决FT-CUP问题的知识连通性条件,该条件是在我们之前的工作中提出的基础上改进的。
{"title":"An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown Participants","authors":"Jichiang Tsai, Che-Cheng Chang","doi":"10.1109/PRDC.2010.20","DOIUrl":"https://doi.org/10.1109/PRDC.2010.20","url":null,"abstract":"For self-organized networks that possess highly decentralized and self-organized natures, neither the identity nor the number of processes is known to all participants at the beginning of the computation because no central authority exists to initialize each participant with some context information. Hence, consensus, which is essential to solving the agreement problem, in such networks cannot be achieved in the ways for traditional fixed networks. To address this problem of Consensus with Unknown Participants (CUP), a variant of the traditional consensus problem was proposed in the literature, by relaxing the requirement for the original knowledge owned by every process about all participants in the computation. Correspondingly, the CUP problem considering process crashes was also introduced, called the Fault-Tolerant Consensus with Unknown Participants (FT-CUP) problem. In this paper, we propose a knowledge connectivity condition sufficient for solving the FT-CUP problem, which is improved from the one proposed in our previous work.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Propagation of Intermittent Hardware Faults in Programs 间歇性硬件故障在程序中的传播建模
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.52
L. Rashid, K. Pattabiraman, S. Gopalakrishnan
Intermittent hardware faults are bursts of errors that last from a few CPU cycles to a few seconds. Recent studies have shown that intermittent fault rates are increasing due to technology scaling and are likely to be a significant concern in future systems. We study the impact of intermittent hardware faults in programs. A simulation-based fault-injection campaign shows that the majority of the intermittent faults lead to program crashes. We build a crash model and a program model that represents the data dependencies in a fault-free execution of the program. We then use this model to glean information about when the program crashes and the extent of fault propagation. Empirical validation of our model using fault-injection experiment shows that it predicts almost all actual crash-causing intermittent faults, and in 93% of the considered faults the prediction is accurate within 100 instructions. Further, the model is found to be more than two orders of magnitude faster than equivalent fault-injection experiments performed with a microprocessor simulator.
间歇性硬件故障是持续几个CPU周期到几秒钟的突发错误。最近的研究表明,由于技术规模的扩大,间歇性故障率正在增加,这可能是未来系统的一个重要问题。我们研究了程序中间歇性硬件故障的影响。基于仿真的故障注入活动表明,大多数间歇性故障会导致程序崩溃。我们建立了一个崩溃模型和一个程序模型,它们表示程序在无故障执行中的数据依赖关系。然后,我们使用该模型收集有关程序何时崩溃和故障传播程度的信息。用故障注入实验对我们的模型进行了经验验证,结果表明,该模型预测了几乎所有实际导致崩溃的间歇性故障,并且在93%的考虑故障中,预测在100个指令内准确。此外,发现该模型比用微处理器模拟器进行的等效故障注入实验快两个数量级以上。
{"title":"Modeling the Propagation of Intermittent Hardware Faults in Programs","authors":"L. Rashid, K. Pattabiraman, S. Gopalakrishnan","doi":"10.1109/PRDC.2010.52","DOIUrl":"https://doi.org/10.1109/PRDC.2010.52","url":null,"abstract":"Intermittent hardware faults are bursts of errors that last from a few CPU cycles to a few seconds. Recent studies have shown that intermittent fault rates are increasing due to technology scaling and are likely to be a significant concern in future systems. We study the impact of intermittent hardware faults in programs. A simulation-based fault-injection campaign shows that the majority of the intermittent faults lead to program crashes. We build a crash model and a program model that represents the data dependencies in a fault-free execution of the program. We then use this model to glean information about when the program crashes and the extent of fault propagation. Empirical validation of our model using fault-injection experiment shows that it predicts almost all actual crash-causing intermittent faults, and in 93% of the considered faults the prediction is accurate within 100 instructions. Further, the model is found to be more than two orders of magnitude faster than equivalent fault-injection experiments performed with a microprocessor simulator.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
P-Bus: Programming Interface Layer for Safe OS Kernel Extensions 安全操作系统内核扩展的编程接口层
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.31
H. Fujita, Motohiko Matsuda, T. Maeda, Shin'ichi Miura, Y. Ishikawa
P-Bus, a new programming interface layer for safe kernel extensions is proposed. P-Bus introduces a new programming interface on top of the Linux kernel in order to give formal specifications to the interface, and to improve portability of extensions. New extensions, called P-Components, are verified with a model checker MKencha to see whether a component is compliant with rules which should be obeyed to implement extensions properly. A network driver has been implemented as a P-Component and verified with MKencha. MKencha has found two bugs in the component.
提出了一种新的安全内核扩展编程接口层P-Bus。P-Bus在Linux内核之上引入了一个新的编程接口,以便为接口提供正式的规范,并提高扩展的可移植性。新的扩展(称为P-Components)使用模型检查器MKencha进行验证,以查看组件是否符合正确实现扩展应遵守的规则。网络驱动程序已经作为P-Component实现,并通过MKencha进行了验证。MKencha在该组件中发现了两个bug。
{"title":"P-Bus: Programming Interface Layer for Safe OS Kernel Extensions","authors":"H. Fujita, Motohiko Matsuda, T. Maeda, Shin'ichi Miura, Y. Ishikawa","doi":"10.1109/PRDC.2010.31","DOIUrl":"https://doi.org/10.1109/PRDC.2010.31","url":null,"abstract":"P-Bus, a new programming interface layer for safe kernel extensions is proposed. P-Bus introduces a new programming interface on top of the Linux kernel in order to give formal specifications to the interface, and to improve portability of extensions. New extensions, called P-Components, are verified with a model checker MKencha to see whether a component is compliant with rules which should be obeyed to implement extensions properly. A network driver has been implemented as a P-Component and verified with MKencha. MKencha has found two bugs in the component.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126521777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Replacement Strategy for Canary Flip-Flops 金丝雀人字拖的替代策略
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.46
Yuji Kunitake, Toshinori Sato, H. Yasuura
The deep sub micron semiconductor technologies increase parameter variations. The increase in parameter variations requires excessive design margin that has serious impact on performance and power consumption. In order to eliminate the excessive design margin, we are investigating canary Flip-Flop (FF). Canary FF requires additional circuits consisting of an FF and a comparator. Thus, it suffers large area overhead. In order to reduce the area overhead, this paper proposes a selective replacement method for canary FF and evaluates it. In the case of Renesas’s M32R processor, the area overhead of 2% is achieved.
深亚微米半导体技术增加了参数的变化。参数变化的增加需要过多的设计余量,这对性能和功耗有严重影响。为了消除过多的设计余量,我们正在研究金丝雀触发器(FF)。金丝雀FF需要由FF和比较器组成的额外电路。因此,它承受很大的面积开销。为了减少面积开销,本文提出了一种金丝雀FF的选择性替换方法,并对其进行了评价。在瑞萨M32R处理器的情况下,实现了2%的面积开销。
{"title":"A Replacement Strategy for Canary Flip-Flops","authors":"Yuji Kunitake, Toshinori Sato, H. Yasuura","doi":"10.1109/PRDC.2010.46","DOIUrl":"https://doi.org/10.1109/PRDC.2010.46","url":null,"abstract":"The deep sub micron semiconductor technologies increase parameter variations. The increase in parameter variations requires excessive design margin that has serious impact on performance and power consumption. In order to eliminate the excessive design margin, we are investigating canary Flip-Flop (FF). Canary FF requires additional circuits consisting of an FF and a comparator. Thus, it suffers large area overhead. In order to reduce the area overhead, this paper proposes a selective replacement method for canary FF and evaluates it. In the case of Renesas’s M32R processor, the area overhead of 2% is achieved.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128209716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Dynamic Multilayer Routing to Achieve Location-Hiding 实现位置隐藏的动态多层路由
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.23
H. Beitollahi, Geert Deconinck
Overlay networks are used as proxies which mediate communication between an application and its users with-out revealing the application’s location (IP address). The capability that users can communicate with an application without knowing its location is called location-hiding. Al-though recent years have provided little literature about location-hiding such as Tor or anonymous web publishing, most Internet activities where anonymity is desired require only sender and relationship anonymity, thereby location-hiding needs more academic effort. This paper proposes a novel architecture to achieve location-hiding. We describe the design of a dynamic multilayer routing (DMR) where users can communicate withan application without knowing any information about its location (its IP address). The essential factors of DMR protocol are multi-layering, reconfiguration and host-diversity. The goal of DMR is to overcome or reduce several draw-backs of static structure based techniques. Through analytical analysis, this paper provides a de-tailed study of DMR architecture and shows that DMR is completely strong against penetration attacks. Our analysis shows that attackers have a negligible chance (e.g., 10−8)to penetrate the architecture and disclose the application’slocation.
覆盖网络被用作代理,在应用程序和它的用户之间调解通信,而不暴露应用程序的位置(IP地址)。用户可以在不知道应用程序位置的情况下与它通信的功能称为位置隐藏。尽管近年来关于位置隐藏(如Tor或匿名网络发布)的文献很少,但大多数希望匿名的互联网活动只要求发送者和关系匿名,因此位置隐藏需要更多的学术努力。本文提出了一种新的实现位置隐藏的体系结构。我们描述了动态多层路由(DMR)的设计,其中用户可以在不知道其位置(其IP地址)的任何信息的情况下在应用程序内进行通信。DMR协议的基本要素是多层、可重构和主机多样性。DMR的目标是克服或减少基于静态结构的技术的几个缺点。通过分析分析,本文对DMR体系结构进行了详细的研究,表明DMR对渗透攻击具有很强的抵抗能力。我们的分析表明,攻击者有一个可以忽略不计的机会(例如,10−8)穿透架构并泄露应用程序的位置。
{"title":"Dynamic Multilayer Routing to Achieve Location-Hiding","authors":"H. Beitollahi, Geert Deconinck","doi":"10.1109/PRDC.2010.23","DOIUrl":"https://doi.org/10.1109/PRDC.2010.23","url":null,"abstract":"Overlay networks are used as proxies which mediate communication between an application and its users with-out revealing the application’s location (IP address). The capability that users can communicate with an application without knowing its location is called location-hiding. Al-though recent years have provided little literature about location-hiding such as Tor or anonymous web publishing, most Internet activities where anonymity is desired require only sender and relationship anonymity, thereby location-hiding needs more academic effort. This paper proposes a novel architecture to achieve location-hiding. We describe the design of a dynamic multilayer routing (DMR) where users can communicate withan application without knowing any information about its location (its IP address). The essential factors of DMR protocol are multi-layering, reconfiguration and host-diversity. The goal of DMR is to overcome or reduce several draw-backs of static structure based techniques. Through analytical analysis, this paper provides a de-tailed study of DMR architecture and shows that DMR is completely strong against penetration attacks. Our analysis shows that attackers have a negligible chance (e.g., 10−8)to penetrate the architecture and disclose the application’slocation.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hierarchical Model for Reliability Analysis of Sensor Networks 传感器网络可靠性分析的层次模型
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.25
Dong Seong Kim, R. Ghosh, Kishor S. Trivedi
Prior to field deployment, mission critical sensor networks should be analyzed for high reliability assurance. Past research only focused on reliability models for sensor node or network in isolation. This paper presents a comprehensive approach for reliability analysis of a cluster-based sensor network. We use a three-level hierarchical model for sensor networks using fault trees and use Markov chains at the bottom level to model the reliability of individual sensor nodes. We summarize the developed models, showcase the initial numerical results and outline the future avenues of research in the following sections.
在现场部署之前,需要对关键任务传感器网络进行分析,以确保高可靠性。以往的研究主要集中在孤立的传感器节点或网络的可靠性模型上。本文提出了一种基于集群的传感器网络可靠性综合分析方法。我们使用故障树对传感器网络进行三层分层模型,并在底层使用马尔可夫链对单个传感器节点的可靠性进行建模。我们总结了已开发的模型,展示了初步的数值结果,并在以下部分概述了未来的研究途径。
{"title":"A Hierarchical Model for Reliability Analysis of Sensor Networks","authors":"Dong Seong Kim, R. Ghosh, Kishor S. Trivedi","doi":"10.1109/PRDC.2010.25","DOIUrl":"https://doi.org/10.1109/PRDC.2010.25","url":null,"abstract":"Prior to field deployment, mission critical sensor networks should be analyzed for high reliability assurance. Past research only focused on reliability models for sensor node or network in isolation. This paper presents a comprehensive approach for reliability analysis of a cluster-based sensor network. We use a three-level hierarchical model for sensor networks using fault trees and use Markov chains at the bottom level to model the reliability of individual sensor nodes. We summarize the developed models, showcase the initial numerical results and outline the future avenues of research in the following sections.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1