首页 > 最新文献

2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)最新文献

英文 中文
Deriving Fault Locating Test Cases from Constrained Covering Arrays 从约束覆盖阵列中导出故障定位测试用例
Hao Jin, Tatsuhiro Tsuchiya
Combinatorial Interaction Testing (CIT) is a well practiced strategy for testing of software systems. Ordinary CIT detects faults caused by interactions of parameters but cannot locate faulty interactions. This paper addresses the problem of adding fault localization capability to CIT. This is done by means of fault locating suites of test cases, which are named constrained locating arrays. An algorithm that derives a constrained locating array from a test suite for ordinary CIT is proposed. Experimental results show that the new algorithm can construct constrained locating arrays for fairly large sized problem instances in reasonable time.
组合交互测试(CIT)是一种实践良好的软件系统测试策略。普通CIT可以检测到参数交互导致的故障,但无法定位故障交互。本文解决了在CIT中增加故障定位能力的问题,这是通过测试用例的故障定位套件来实现的,这些测试用例被称为约束定位阵列。提出了一种从普通CIT测试套件中提取约束定位数组的算法。实验结果表明,该算法可以在合理的时间内对较大规模的问题实例构造约束定位数组。
{"title":"Deriving Fault Locating Test Cases from Constrained Covering Arrays","authors":"Hao Jin, Tatsuhiro Tsuchiya","doi":"10.1109/PRDC.2018.00044","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00044","url":null,"abstract":"Combinatorial Interaction Testing (CIT) is a well practiced strategy for testing of software systems. Ordinary CIT detects faults caused by interactions of parameters but cannot locate faulty interactions. This paper addresses the problem of adding fault localization capability to CIT. This is done by means of fault locating suites of test cases, which are named constrained locating arrays. An algorithm that derives a constrained locating array from a test suite for ordinary CIT is proposed. Experimental results show that the new algorithm can construct constrained locating arrays for fairly large sized problem instances in reasonable time.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127965472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SSCMSD - Single-Symbol Correction Multi-symbol Detection for DRAM Subsystem DRAM子系统的单符号校正多符号检测
Ravikiran Yeleswarapu, Arun Kumar Somani
As DRAM technology continues to evolve towards smaller feature sizes and increased densities, faults in DRAM subsystem are becoming more severe. Current servers mostly use CHIPKILL based schemes to tolerate up-to one/two symbol errors per DRAM beat. Multi-symbol errors arising due to faults in multiple data buses and chips may not be detected by these schemes. In this paper, we introduce Single Symbol Correction Multiple Symbol Detection (SSCMSD) - a novel error handling scheme to correct single-symbol errors and detect multi-symbol ones. Here, we use a hash in combination with ECC to avoid silent data corruptions (SDCs). We employ 32-bit Spookyhash along with Reed-Solomon code to implement SSCMSD for a x4 based DDRx system. Our simulations show that the proposed scheme effectively prevents SDCs in the presence of multiple symbol errors. For this design, we need 19 chips per rank (storage overhead of 18.75 percent), 76 data bus-lines and additional hash-logic at the memory controller.
随着DRAM技术不断向更小的特征尺寸和更高的密度发展,DRAM子系统的故障也越来越严重。当前的服务器大多使用基于CHIPKILL的方案来容忍每个DRAM节拍最多一/两个符号错误。这些方案可能无法检测到由多个数据总线和芯片故障引起的多符号错误。本文介绍了单符号校正多符号检测(SSCMSD)——一种新的错误处理方案,用于校正单符号错误和检测多符号错误。在这里,我们将散列与ECC结合使用,以避免静默数据损坏(sdc)。我们使用32位Spookyhash和Reed-Solomon代码为基于x4的DDRx系统实现SSCMSD。仿真结果表明,该方案可以有效地防止存在多个符号错误的sdc。对于这个设计,我们需要每个等级19个芯片(存储开销为18.75%)、76条数据总线和内存控制器上的额外哈希逻辑。
{"title":"SSCMSD - Single-Symbol Correction Multi-symbol Detection for DRAM Subsystem","authors":"Ravikiran Yeleswarapu, Arun Kumar Somani","doi":"10.1109/PRDC.2018.00012","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00012","url":null,"abstract":"As DRAM technology continues to evolve towards smaller feature sizes and increased densities, faults in DRAM subsystem are becoming more severe. Current servers mostly use CHIPKILL based schemes to tolerate up-to one/two symbol errors per DRAM beat. Multi-symbol errors arising due to faults in multiple data buses and chips may not be detected by these schemes. In this paper, we introduce Single Symbol Correction Multiple Symbol Detection (SSCMSD) - a novel error handling scheme to correct single-symbol errors and detect multi-symbol ones. Here, we use a hash in combination with ECC to avoid silent data corruptions (SDCs). We employ 32-bit Spookyhash along with Reed-Solomon code to implement SSCMSD for a x4 based DDRx system. Our simulations show that the proposed scheme effectively prevents SDCs in the presence of multiple symbol errors. For this design, we need 19 chips per rank (storage overhead of 18.75 percent), 76 data bus-lines and additional hash-logic at the memory controller.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber-Physical Security of an Electric Microgrid 微电网的网络物理安全
Prashanth Palaniswamy, B. McMillin
Cyber-Physical Systems (CPS) are physical systems that are controlled or monitored by computer-based systems. CPS are a combination of computation, networking, and physical processes. As CPS are a combination of various diverse components, they are vulnerable to several security threats. Moreover, there are many different security domains (not just high/low, nor are they necessarily hierarchical). This paper utilizes previouslydeveloped Multiple Security Domain Nondeducibility to uncover potential integrity vulnerabilities in an electric microgrid. These are then mitigated, to the extent possible, by adding executable invariants on system operation. Implementation on the Electric Power and Intelligent Control (EPIC) testbed at the Singapore University of Technology and Design are reported. Limitations of the design and successes/shortcomings of attack mitigation are reported.
信息物理系统(CPS)是由基于计算机的系统控制或监视的物理系统。CPS是计算、网络和物理过程的组合。由于CPS是各种不同组件的组合,因此容易受到多种安全威胁。此外,存在许多不同的安全域(不仅仅是高/低,也不一定是分层的)。本文利用先前开发的多安全域不可演绎性来发现微电网中潜在的完整性漏洞。然后,通过在系统操作上添加可执行不变量,尽可能地减轻这些问题。本文报道了新加坡科技设计大学电力与智能控制(EPIC)试验台的实现情况。报告了攻击缓解的设计局限性和成功/缺点。
{"title":"Cyber-Physical Security of an Electric Microgrid","authors":"Prashanth Palaniswamy, B. McMillin","doi":"10.1109/PRDC.2018.00018","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00018","url":null,"abstract":"Cyber-Physical Systems (CPS) are physical systems that are controlled or monitored by computer-based systems. CPS are a combination of computation, networking, and physical processes. As CPS are a combination of various diverse components, they are vulnerable to several security threats. Moreover, there are many different security domains (not just high/low, nor are they necessarily hierarchical). This paper utilizes previouslydeveloped Multiple Security Domain Nondeducibility to uncover potential integrity vulnerabilities in an electric microgrid. These are then mitigated, to the extent possible, by adding executable invariants on system operation. Implementation on the Electric Power and Intelligent Control (EPIC) testbed at the Singapore University of Technology and Design are reported. Limitations of the design and successes/shortcomings of attack mitigation are reported.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130582060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DynPolAC: Dynamic Policy-Based Access Control for IoT Systems DynPolAC:物联网系统的动态策略访问控制
Mehdi Karimibiuki, Ekta Aggarwal, K. Pattabiraman, A. Ivanov
In the near future, Internet-of-Things (IoT) systems will be comprised of autonomous, highly interactive and moving objects that require frequent handshakes to exchange information in time intervals of seconds. Examples of such systems are drones and self-driving cars. In these scenarios, data integrity, confidentiality, and privacy protection are of critical importance. Further, updates need to be processed quickly and with low overheads due to the systems' resource-constrained nature. This paper proposes Dynamic Policy-based Access Control (DynPolAC) as a model for protecting information in such systems. We construct a new access control policy language that satisfies the properties of highly dynamic IoT environments. Our access control engine is comprised of a rule parser and a checker to process policies and update them at run-time with minimum service disruption. DynPolAC achieves more than 7x performance improvements when compared to previously proposed methods for authorization on resource-constrained IoT platforms, and achieves more than 3x faster response times overall.
在不久的将来,物联网(IoT)系统将由自主、高度互动和移动的物体组成,这些物体需要频繁握手才能在几秒钟的时间间隔内交换信息。无人机和自动驾驶汽车就是这类系统的例子。在这些场景中,数据完整性、机密性和隐私保护至关重要。此外,由于系统的资源限制性质,更新需要以较低的开销快速处理。本文提出了基于动态策略的访问控制(DynPolAC)模型来保护此类系统中的信息。我们构建了一种新的访问控制策略语言,满足高动态物联网环境的特性。我们的访问控制引擎由规则解析器和检查器组成,用于处理策略并在运行时以最小的服务中断更新策略。与之前提出的在资源受限的物联网平台上进行授权的方法相比,DynPolAC实现了7倍以上的性能提升,总体响应时间提高了3倍以上。
{"title":"DynPolAC: Dynamic Policy-Based Access Control for IoT Systems","authors":"Mehdi Karimibiuki, Ekta Aggarwal, K. Pattabiraman, A. Ivanov","doi":"10.1109/PRDC.2018.00027","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00027","url":null,"abstract":"In the near future, Internet-of-Things (IoT) systems will be comprised of autonomous, highly interactive and moving objects that require frequent handshakes to exchange information in time intervals of seconds. Examples of such systems are drones and self-driving cars. In these scenarios, data integrity, confidentiality, and privacy protection are of critical importance. Further, updates need to be processed quickly and with low overheads due to the systems' resource-constrained nature. This paper proposes Dynamic Policy-based Access Control (DynPolAC) as a model for protecting information in such systems. We construct a new access control policy language that satisfies the properties of highly dynamic IoT environments. Our access control engine is comprised of a rule parser and a checker to process policies and update them at run-time with minimum service disruption. DynPolAC achieves more than 7x performance improvements when compared to previously proposed methods for authorization on resource-constrained IoT platforms, and achieves more than 3x faster response times overall.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software Test-Run Reliability Modeling with Non-homogeneous Binomial Processes 基于非齐次二项过程的软件测试运行可靠性建模
Yunlu Zhao, T. Dohi, H. Okamura
While the number of test runs (test cases) is often used to define the time scale to measure quantitative software reliability, the common calendar-time modeling with non-homogeneous Poisson processes (NHPPs) is approximately applied to describe the time scale and the software fault-count phenomena as well. In this paper we give a conjecture that such an approximate treatment is not theoretically justified, and propose a simple test-run reliability modeling framework based on non-homogeneous binomial processes (NHBPs). We show that the Poisson-binomial distribution plays a central role in the software test-run reliability modeling, and apply it to the software release decision. In numerical experiments with seven software fault count data we compare the NHBP based software reliability models (SRMs) with their corresponding NHPP based SRMs and refer to an applicability of NHBP based software test-run reliability modeling.
虽然测试运行(测试用例)的数量经常被用来定义时间尺度来定量测量软件可靠性,但非齐次泊松过程(NHPPs)的常见日历时间模型也被近似地用于描述时间尺度和软件故障计数现象。本文推测这种近似处理在理论上是不合理的,并提出了一个简单的基于非齐次二项过程(nhbp)的试运行可靠性建模框架。我们证明了泊松二项分布在软件测试运行可靠性建模中起着核心作用,并将其应用于软件发布决策。通过对7个软件故障计数数据的数值实验,比较了基于NHBP的软件可靠性模型与相应的基于NHPP的软件可靠性模型,探讨了基于NHBP的软件试运行可靠性建模的适用性。
{"title":"Software Test-Run Reliability Modeling with Non-homogeneous Binomial Processes","authors":"Yunlu Zhao, T. Dohi, H. Okamura","doi":"10.1109/PRDC.2018.00025","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00025","url":null,"abstract":"While the number of test runs (test cases) is often used to define the time scale to measure quantitative software reliability, the common calendar-time modeling with non-homogeneous Poisson processes (NHPPs) is approximately applied to describe the time scale and the software fault-count phenomena as well. In this paper we give a conjecture that such an approximate treatment is not theoretically justified, and propose a simple test-run reliability modeling framework based on non-homogeneous binomial processes (NHBPs). We show that the Poisson-binomial distribution plays a central role in the software test-run reliability modeling, and apply it to the software release decision. In numerical experiments with seven software fault count data we compare the NHBP based software reliability models (SRMs) with their corresponding NHPP based SRMs and refer to an applicability of NHBP based software test-run reliability modeling.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134176254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Economic Analysis of Blockchain Technology on Digital Platform Market 区块链技术在数字平台市场上的经济分析
Hyojung Lee, Kiwoon Sung, Kyusang Lee, Jaeseok Lee, Seungjai Min
Blockchain technology on the platform business becomes a new paradigm which gets security, irreversibility, and trustfulness closer to both of clients and service providers (SPs) for providing a better quality of service. To provide an economic analysis of such blockchain-based platform business, a game theoretic approach is used to model a competitive market against the incumbent platform operated by a centralizer as a trusted third party. In this market, the platforms behave as a mediator to deliver the services provided by SPs to clients. The crucial factors for the success of blockchain-based platform business are (i) how SPs' participation is reflected on its quality of service (QoS) and (ii) how to incentivize SPs to contribute their resources such as computing/storage infrastructure. In our game formulation, a non-cooperative two-stage dynamic game is used, where the first stage models how to incentivize SPs in a blockchain-based platform and the second stage models the competition between platforms to attract clients. As a result, we provide an equilibrium analysis, which gives a useful insight into how much the service quality of blockchain-based platform affects the competition between platforms and the equilibrium incentive strategy for SPs. Moreover, our numerical analysis shows that the equilibrium incentive increases with proportional to the QoS of a blockchain-based platform whereas the incentive becomes negative if it provides a non-increasing QoS with the number of participated SPs.
区块链技术在平台业务中成为一种新的范例,它使客户和服务提供商(sp)更接近安全性、不可逆性和可信度,从而提供更好的服务质量。为了对这种基于区块链的平台业务进行经济分析,采用博弈论方法对由中心化者作为可信第三方运营的现有平台进行竞争市场建模。在这个市场中,平台充当中介,将服务提供商提供的服务交付给客户。基于区块链的平台业务成功的关键因素是:(i)服务提供商的参与如何反映在其服务质量(QoS)上,以及(ii)如何激励服务提供商贡献其资源,如计算/存储基础设施。在我们的游戏制定中,使用了一个非合作的两阶段动态游戏,其中第一阶段模型如何激励基于区块链的平台中的sp,第二阶段模型平台之间的竞争以吸引客户。因此,我们提供了一个均衡分析,它为基于区块链的平台的服务质量对平台之间的竞争和sp的均衡激励策略的影响程度提供了有用的见解。此外,我们的数值分析表明,均衡激励与基于区块链的平台的QoS成正比增加,而如果它提供的QoS随着参与sp的数量而不增加,则激励变为负值。
{"title":"Economic Analysis of Blockchain Technology on Digital Platform Market","authors":"Hyojung Lee, Kiwoon Sung, Kyusang Lee, Jaeseok Lee, Seungjai Min","doi":"10.1109/PRDC.2018.00020","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00020","url":null,"abstract":"Blockchain technology on the platform business becomes a new paradigm which gets security, irreversibility, and trustfulness closer to both of clients and service providers (SPs) for providing a better quality of service. To provide an economic analysis of such blockchain-based platform business, a game theoretic approach is used to model a competitive market against the incumbent platform operated by a centralizer as a trusted third party. In this market, the platforms behave as a mediator to deliver the services provided by SPs to clients. The crucial factors for the success of blockchain-based platform business are (i) how SPs' participation is reflected on its quality of service (QoS) and (ii) how to incentivize SPs to contribute their resources such as computing/storage infrastructure. In our game formulation, a non-cooperative two-stage dynamic game is used, where the first stage models how to incentivize SPs in a blockchain-based platform and the second stage models the competition between platforms to attract clients. As a result, we provide an equilibrium analysis, which gives a useful insight into how much the service quality of blockchain-based platform affects the competition between platforms and the equilibrium incentive strategy for SPs. Moreover, our numerical analysis shows that the equilibrium incentive increases with proportional to the QoS of a blockchain-based platform whereas the incentive becomes negative if it provides a non-increasing QoS with the number of participated SPs.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132375331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Do Nothing, But Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems Devoid of Online Adaptation 什么都不做,但要小心:对缺乏在线适应的多处理器系统的定时保证容错
G. V. D. Brüggen, Lea Schönberger, Jian-Jia Chen
Many practical real-time systems must be able to sustain several reliability threats induced by their physical environments that cause short-term abnormal system behavior, such as transient faults. To cope with this change of system behavior, online adaptions, which may introduce a high computation overhead, are performed in many cases to ensure the timeliness of the more important tasks while no guarantees are provided for the less important tasks. In this work, we propose a system model which does not require any online adaption, but, according to the concept of dynamic real-time guarantees, provides full timing guarantees as well as limited timing guarantees, depending on the system behavior. For the normal system behavior, timeliness is guaranteed for all tasks; otherwise, timeliness is guaranteed only for the more important tasks while bounded tardiness is ensured for the less important tasks. Aiming to provide such dynamic timing guarantees, we propose a suitable system model and discuss, how this can be established by means of partitioned as well as semi-partitioned strategies. Moreover, we propose an approach for handling abnormal behavior with a longer duration, such as intermittent faults or overheating of processors, by performing task migration in order to compensate the affected system component and to increase the system's reliability. We show by comprehensive experiments that good acceptance ratios can be achieved under partitioned scheduling, which can be further improved under semi-partitioned strategies. In addition, we demonstrate that the proposed migration techniques lead to a reasonable trade-off between the decrease in schedulability and the gain in robustness of the system. The presented approaches can also be applied to mixed-criticality systems with two criticality levels.
许多实际的实时系统必须能够承受由其物理环境引起的几种可靠性威胁,这些威胁会导致系统的短期异常行为,例如瞬态故障。为了应对系统行为的这种变化,在许多情况下执行可能会带来较高计算开销的在线调整,以确保较重要任务的及时性,而不为较不重要的任务提供保证。在这项工作中,我们提出了一个不需要任何在线自适应的系统模型,但根据动态实时保证的概念,根据系统行为提供完全定时保证和有限定时保证。对于正常的系统行为,保证所有任务的及时性;否则,只对较重要的任务保证及时性,而对较不重要的任务保证有界延迟。为了提供这样的动态定时保证,我们提出了一个合适的系统模型,并讨论了如何通过分区和半分区策略来建立这个模型。此外,我们提出了一种处理持续时间较长的异常行为的方法,如间歇故障或处理器过热,通过执行任务迁移来补偿受影响的系统组件并增加系统的可靠性。综合实验表明,在分区调度策略下可获得较好的接收率,在半分区调度策略下可进一步提高接收率。此外,我们还证明了所提出的迁移技术可以在可调度性的降低和系统鲁棒性的提高之间进行合理的权衡。所提出的方法也可以应用于具有两个临界水平的混合临界系统。
{"title":"Do Nothing, But Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems Devoid of Online Adaptation","authors":"G. V. D. Brüggen, Lea Schönberger, Jian-Jia Chen","doi":"10.1109/PRDC.2018.00010","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00010","url":null,"abstract":"Many practical real-time systems must be able to sustain several reliability threats induced by their physical environments that cause short-term abnormal system behavior, such as transient faults. To cope with this change of system behavior, online adaptions, which may introduce a high computation overhead, are performed in many cases to ensure the timeliness of the more important tasks while no guarantees are provided for the less important tasks. In this work, we propose a system model which does not require any online adaption, but, according to the concept of dynamic real-time guarantees, provides full timing guarantees as well as limited timing guarantees, depending on the system behavior. For the normal system behavior, timeliness is guaranteed for all tasks; otherwise, timeliness is guaranteed only for the more important tasks while bounded tardiness is ensured for the less important tasks. Aiming to provide such dynamic timing guarantees, we propose a suitable system model and discuss, how this can be established by means of partitioned as well as semi-partitioned strategies. Moreover, we propose an approach for handling abnormal behavior with a longer duration, such as intermittent faults or overheating of processors, by performing task migration in order to compensate the affected system component and to increase the system's reliability. We show by comprehensive experiments that good acceptance ratios can be achieved under partitioned scheduling, which can be further improved under semi-partitioned strategies. In addition, we demonstrate that the proposed migration techniques lead to a reasonable trade-off between the decrease in schedulability and the gain in robustness of the system. The presented approaches can also be applied to mixed-criticality systems with two criticality levels.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"1996 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Degradable Restructuring of Mesh-Connected Processor Arrays with Spares on Orthogonal Sides 正交边有备件的网格连接处理器阵列的可降解重构
I. Takanami, Masaru Fukushi
We present a restructuring method to apply a degradation approach to mesh-connected processor arrays with spare processing elements on the orthogonal sides of the arrays. An array with faulty processing elements is restructured by shifting healthy processing elements toward faulty processing elements using single track switches. First, an algorithm which satisfies the necessary and sufficient condition (called a restructurable condition) that an array is restructured so that its logical size is kept is briefly explained. Next, a method that if the array does not satisfy the restructurable condition, its rows and/or columns are functionally deleted so that the subarray with the remaining rows and columns satisfies the restructurable condition is presented. Finally, the simulation results are shown.
我们提出了一种重构方法,将退化方法应用于网格连接的处理器阵列,阵列的正交侧具有备用加工单元。通过使用单轨开关将健康处理元素转移到故障处理元素,重构了具有故障处理元素的阵列。首先,简要介绍了一种算法,该算法满足必要和充分条件(称为可重构条件),即重构数组以保持其逻辑大小。接下来,提出了一种方法,即如果数组不满足可重构条件,则功能性地删除其行和/或列,以便具有剩余行和列的子数组满足可重构条件。最后给出了仿真结果。
{"title":"Degradable Restructuring of Mesh-Connected Processor Arrays with Spares on Orthogonal Sides","authors":"I. Takanami, Masaru Fukushi","doi":"10.1109/PRDC.2018.00011","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00011","url":null,"abstract":"We present a restructuring method to apply a degradation approach to mesh-connected processor arrays with spare processing elements on the orthogonal sides of the arrays. An array with faulty processing elements is restructured by shifting healthy processing elements toward faulty processing elements using single track switches. First, an algorithm which satisfies the necessary and sufficient condition (called a restructurable condition) that an array is restructured so that its logical size is kept is briefly explained. Next, a method that if the array does not satisfy the restructurable condition, its rows and/or columns are functionally deleted so that the subarray with the remaining rows and columns satisfies the restructurable condition is presented. Finally, the simulation results are shown.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for Formal Analysis of the Security of a Water Treatment Testbed 水处理试验台安全性的形式化分析方法
Sai Sidharth Patlolla, B. McMillin, Sridhar Adepu, A. Mathur
An increase in the number of attacks on cyberphysical systems (CPS) has raised concerns over the vulnerability of critical infrastructure such as water treatment, oil, gas plants, against cyber attacks. Such systems are controlled by an Industrial Control System (ICS) that includes controllers communicating with each other, and with physical sensors and actuators, using a communications network. This paper focuses on a Multiple Security Domain Nondeducibility (MSDND) model to identify the vulnerable points of attack on the system that hide critical information rather than steal it, such as in the STUXNET virus. It is shown how MSDND analysis, conducted on a realistic multi-stage water treatment testbed, is useful in enhancing the security of a water treatment plant. Based on the MSDND analysis, this work offers a thorough documentation on the vulnerable points of attack, invariants used for removing the vulnerabilities, and suggested design decisions that help in developing invariants to mitigate attacks.
针对网络物理系统(CPS)的攻击数量不断增加,引发了人们对水处理、石油、天然气等关键基础设施在网络攻击面前的脆弱性的担忧。这种系统由工业控制系统(ICS)控制,其中包括使用通信网络相互通信的控制器,以及物理传感器和执行器。本文重点研究了多安全域不可推演(msdn)模型,以识别系统中隐藏关键信息而不是窃取关键信息的易受攻击点,例如STUXNET病毒。在一个实际的多级水处理试验台上进行了msdn分析,显示了msdn分析如何有助于提高水处理厂的安全性。基于msdn分析,这项工作提供了关于易受攻击点的完整文档,用于消除漏洞的不变量,并建议设计决策,帮助开发不变量以减轻攻击。
{"title":"An Approach for Formal Analysis of the Security of a Water Treatment Testbed","authors":"Sai Sidharth Patlolla, B. McMillin, Sridhar Adepu, A. Mathur","doi":"10.1109/PRDC.2018.00022","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00022","url":null,"abstract":"An increase in the number of attacks on cyberphysical systems (CPS) has raised concerns over the vulnerability of critical infrastructure such as water treatment, oil, gas plants, against cyber attacks. Such systems are controlled by an Industrial Control System (ICS) that includes controllers communicating with each other, and with physical sensors and actuators, using a communications network. This paper focuses on a Multiple Security Domain Nondeducibility (MSDND) model to identify the vulnerable points of attack on the system that hide critical information rather than steal it, such as in the STUXNET virus. It is shown how MSDND analysis, conducted on a realistic multi-stage water treatment testbed, is useful in enhancing the security of a water treatment plant. Based on the MSDND analysis, this work offers a thorough documentation on the vulnerable points of attack, invariants used for removing the vulnerabilities, and suggested design decisions that help in developing invariants to mitigate attacks.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130410039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications Networks 尝试将机器学习应用于故障数据库-通信网络的案例研究
Koichi Bando, Kenji Tanaka
Progress in IT has resulted in great improvements in convenience. However, IT can cause failures that have significant negative impacts such as system failures. In order to improve these circumstances, it is important to accumulate and analyze numerous past failure cases. In order to achieve this purpose, the authors have applied machine learning to a previously accumulated failure database. We have constructed a mechanism by which to calculate the degree of similarity between documents by two methods. One method uses the appearance frequency of words, and the second method uses the appearance probability of each topic extracted from the whole document. In the present paper, focusing on communications network failures, we realized a function by which to extract past failure cases similar to inquiry inputs, as new failures. A detailed analysis and comparison of these results extracted by these two methods are presented.
信息技术的进步大大提高了便利性。但是,IT可能导致具有重大负面影响的故障,例如系统故障。为了改善这种情况,积累和分析大量过去的失败案例是很重要的。为了达到这一目的,作者将机器学习应用于先前积累的故障数据库。我们已经构建了一个机制,通过该机制可以通过两种方法计算文档之间的相似度。一种方法使用单词的出现频率,第二种方法使用从整个文档中提取的每个主题的出现概率。在本文中,我们以通信网络故障为重点,实现了一个功能,通过该功能可以提取与查询输入相似的过去故障案例,作为新的故障。对两种方法提取的结果进行了详细的分析和比较。
{"title":"Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications Networks","authors":"Koichi Bando, Kenji Tanaka","doi":"10.1109/PRDC.2018.00040","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00040","url":null,"abstract":"Progress in IT has resulted in great improvements in convenience. However, IT can cause failures that have significant negative impacts such as system failures. In order to improve these circumstances, it is important to accumulate and analyze numerous past failure cases. In order to achieve this purpose, the authors have applied machine learning to a previously accumulated failure database. We have constructed a mechanism by which to calculate the degree of similarity between documents by two methods. One method uses the appearance frequency of words, and the second method uses the appearance probability of each topic extracted from the whole document. In the present paper, focusing on communications network failures, we realized a function by which to extract past failure cases similar to inquiry inputs, as new failures. A detailed analysis and comparison of these results extracted by these two methods are presented.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132466023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1