首页 > 最新文献

Proceedings. International Conference on Dependable Systems and Networks最新文献

英文 中文
Practical and Efficient in-Enclave Verification of Privacy Compliance. 实用和有效的飞地内隐私合规性验证。
Pub Date : 2021-06-01 Epub Date: 2021-08-06 DOI: 10.1109/dsn48987.2021.00052
Weijie Liu, Wenhao Wang, Hongbo Chen, XiaoFeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang
A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs attestation to prove to a data owner the integrity of the initial state of an enclave, including the program to operate on her data. For this purpose, the data-processing program is supposed to be open to the owner or a trusted third party, so its functionality can be evaluated before trust being established. In the real world, however, increasingly there are application scenarios in which the program itself needs to be protected (e.g., proprietary algorithm). So its compliance with privacy policies as expected by the data owner should be verified without exposing its code.To this end, this paper presents DEFLECTION, a new model for TEE-based delegated and flexible in-enclave code verification. Given that the conventional solutions do not work well under the resource-limited and TCB-frugal TEE, we come up with a new design inspired by Proof-Carrying Code. Our design strategically moves most of the workload to the code generator, which is responsible for producing easy-to-check code, while keeping the consumer simple. Also, the whole consumer can be made public and verified through a conventional attestation. We implemented this model on Intel SGX and demonstrate that it introduces a very small part of TCB. We also thoroughly evaluated its performance on micro-and macro-benchmarks and real-world applications, showing that the design only incurs a small overhead when enforcing several categories of security policies.
可信执行环境(TEE),如Intel Software Guard Extension (SGX)运行认证,向数据所有者证明飞地初始状态的完整性,包括对其数据进行操作的程序。为此,数据处理程序应该对所有者或受信任的第三方开放,因此可以在建立信任之前对其功能进行评估。然而,在现实世界中,越来越多的应用场景需要保护程序本身(例如,专有算法)。因此,应该在不暴露其代码的情况下验证其是否符合数据所有者所期望的隐私策略。为此,本文提出了一种新的基于tee的授权和灵活的包内代码验证模型挠度。考虑到传统的解决方案在资源有限和tcb节约的TEE下不能很好地工作,我们提出了一个受携带证明代码启发的新设计。我们的设计战略性地将大部分工作负载转移到代码生成器,它负责生成易于检查的代码,同时保持消费者的简单性。此外,整个消费者可以被公开,并通过传统的认证进行验证。我们在Intel SGX上实现了这个模型,并证明它只引入了很小一部分TCB。我们还在微观和宏观基准测试以及实际应用程序上对其性能进行了全面评估,结果表明,该设计仅在执行几类安全策略时产生很小的开销。
{"title":"Practical and Efficient in-Enclave Verification of Privacy Compliance.","authors":"Weijie Liu, Wenhao Wang, Hongbo Chen, XiaoFeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang","doi":"10.1109/dsn48987.2021.00052","DOIUrl":"https://doi.org/10.1109/dsn48987.2021.00052","url":null,"abstract":"A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs attestation to prove to a data owner the integrity of the initial state of an enclave, including the program to operate on her data. For this purpose, the data-processing program is supposed to be open to the owner or a trusted third party, so its functionality can be evaluated before trust being established. In the real world, however, increasingly there are application scenarios in which the program itself needs to be protected (e.g., proprietary algorithm). So its compliance with privacy policies as expected by the data owner should be verified without exposing its code.To this end, this paper presents DEFLECTION, a new model for TEE-based delegated and flexible in-enclave code verification. Given that the conventional solutions do not work well under the resource-limited and TCB-frugal TEE, we come up with a new design inspired by Proof-Carrying Code. Our design strategically moves most of the workload to the code generator, which is responsible for producing easy-to-check code, while keeping the consumer simple. Also, the whole consumer can be made public and verified through a conventional attestation. We implemented this model on Intel SGX and demonstrate that it introduces a very small part of TCB. We also thoroughly evaluated its performance on micro-and macro-benchmarks and real-world applications, showing that the design only incurs a small overhead when enforcing several categories of security policies.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"2021 ","pages":"413-425"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9343090/pdf/nihms-1823058.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40687407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluating the security threat of firewall data corruption caused by instruction transient errors 评估指令瞬态错误导致防火墙数据损坏的安全威胁
Pub Date : 2002-12-10 DOI: 10.1109/DSN.2002.1028938
Shuo Chen, Jun Xu, R. Iyer, K. Whisnant
This paper experimentally evaluates and models the error-caused security vulnerabilities and the resulting security violations of two Linux kernel firewalls: IPChains and Netfilter. There are two major aspects to this work: to conduct extensive error injection experiments on the Linux kernel and to quantify the possibility of error-caused security violations using a SAN (Stochastic Activity Network) model. The error injection experiments show that about 2% of errors injected into the firewall code segment cause security vulnerabilities. Two types of error-caused security vulnerabilities are distinguished: temporary, which disappear when the error disappears, and permanent, which persist even after the error is removed, as long as the system is not rebooted. Results from simulating the SAN model indicate that under an error rate of 0.1 error/day during a 1-year period in a networked system protected by 20 firewalls, 2 machines (on the average) will experience security violations. This indicates that error-caused security vulnerabilities can be a non-negligible source of a security threats to a highly secure system.
本文对两种Linux内核防火墙(IPChains和Netfilter)的错误导致的安全漏洞和由此导致的安全违规进行了实验评估和建模。这项工作有两个主要方面:在Linux内核上进行广泛的错误注入实验,并使用SAN(随机活动网络)模型量化错误引起的安全违规的可能性。错误注入实验表明,注入防火墙代码段的错误中约有2%会导致安全漏洞。错误导致的安全漏洞有两种类型:临时漏洞,当错误消失时也会消失;永久性漏洞,即使在错误消除后,只要系统不重新启动,它也会持续存在。模拟SAN模型的结果表明,在由20个防火墙保护的网络系统中,在1年期间错误率为每天0.1个错误的情况下,有2台机器(平均)将遇到安全违规。这表明错误导致的安全漏洞可能是高度安全系统的安全威胁的不可忽视的来源。
{"title":"Evaluating the security threat of firewall data corruption caused by instruction transient errors","authors":"Shuo Chen, Jun Xu, R. Iyer, K. Whisnant","doi":"10.1109/DSN.2002.1028938","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028938","url":null,"abstract":"This paper experimentally evaluates and models the error-caused security vulnerabilities and the resulting security violations of two Linux kernel firewalls: IPChains and Netfilter. There are two major aspects to this work: to conduct extensive error injection experiments on the Linux kernel and to quantify the possibility of error-caused security violations using a SAN (Stochastic Activity Network) model. The error injection experiments show that about 2% of errors injected into the firewall code segment cause security vulnerabilities. Two types of error-caused security vulnerabilities are distinguished: temporary, which disappear when the error disappears, and permanent, which persist even after the error is removed, as long as the system is not rebooted. Results from simulating the SAN model indicate that under an error rate of 0.1 error/day during a 1-year period in a networked system protected by 20 firewalls, 2 machines (on the average) will experience security violations. This indicates that error-caused security vulnerabilities can be a non-negligible source of a security threats to a highly secure system.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"17 1","pages":"495-504"},"PeriodicalIF":0.0,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89196216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Application performance assurance using end-to-end user level monitoring 使用端到端用户级监控来保证应用程序性能
Pub Date : 2002-12-10 DOI: 10.1109/DSN.2002.1029015
S. Dalal, Y. Ho, Ashish Jain, A. McIntosh
A new measure of performance, which uses both application integrity and traditional network response time, is proposed. Modern networked application services rely on a stack of network protocols and a host of other services many of which cross-organizational and corporate boundaries. We point out that traditional software quality assurance techniques don't scale up for post-deployment integrity checks for such applications and services. A new methodology to do non-stop post-production monitoring of networked application services for transactional integrity and time delay measurement is proposed. Specifically we describe the Telcordia/spl trade/ Application Assurance System, which we have created for measuring real-time performance of web-based applications used in commercial settings. The system measures both post-production application integrity and time delay. The measurements are carried out by sending synthetic end-user transactions and analyzing the responses. Statistical models for analyzing the data using single monitoring site as well as multiple monitoring sites are described. Creating synthetic end-user transactions is crucial for our method. The paper presents a method for generation of 'highly efficient' end-user transactions from a graphical model of the functionality of the system. Highly efficient transactions are generated using combinatorial designs. The graphical model is incrementally created using a recorder. We give several empirical examples of efficacy of this system and uses for finding performance problems.
提出了一种同时考虑应用完整性和传统网络响应时间的性能度量方法。现代网络应用程序服务依赖于一堆网络协议和许多其他服务,其中许多服务跨组织和公司边界。我们指出,传统的软件质量保证技术不能扩展到对此类应用程序和服务进行部署后完整性检查。提出了一种基于事务完整性和时延测量的网络应用服务不间断后期监控方法。具体来说,我们描述了Telcordia/spl贸易/应用保证系统,这是我们为测量在商业环境中使用的基于web的应用程序的实时性能而创建的。该系统可以测量后期应用程序的完整性和时间延迟。度量是通过发送合成的终端用户事务和分析响应来执行的。介绍了单监测点和多监测点数据分析的统计模型。创建合成的最终用户事务对我们的方法至关重要。本文提出了一种从系统功能的图形模型生成“高效”终端用户事务的方法。使用组合设计生成高效的事务。图形模型是使用记录器增量创建的。我们给出了该系统有效性的几个实证例子,并将其用于发现性能问题。
{"title":"Application performance assurance using end-to-end user level monitoring","authors":"S. Dalal, Y. Ho, Ashish Jain, A. McIntosh","doi":"10.1109/DSN.2002.1029015","DOIUrl":"https://doi.org/10.1109/DSN.2002.1029015","url":null,"abstract":"A new measure of performance, which uses both application integrity and traditional network response time, is proposed. Modern networked application services rely on a stack of network protocols and a host of other services many of which cross-organizational and corporate boundaries. We point out that traditional software quality assurance techniques don't scale up for post-deployment integrity checks for such applications and services. A new methodology to do non-stop post-production monitoring of networked application services for transactional integrity and time delay measurement is proposed. Specifically we describe the Telcordia/spl trade/ Application Assurance System, which we have created for measuring real-time performance of web-based applications used in commercial settings. The system measures both post-production application integrity and time delay. The measurements are carried out by sending synthetic end-user transactions and analyzing the responses. Statistical models for analyzing the data using single monitoring site as well as multiple monitoring sites are described. Creating synthetic end-user transactions is crucial for our method. The paper presents a method for generation of 'highly efficient' end-user transactions from a graphical model of the functionality of the system. Highly efficient transactions are generated using combinatorial designs. The graphical model is incrementally created using a recorder. We give several empirical examples of efficacy of this system and uses for finding performance problems.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"14 1","pages":"694-703"},"PeriodicalIF":0.0,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91104085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mr. Fusion: a programmable data fusion middleware subsystem with a tunable statistical profiling service Mr. Fusion:一个可编程的数据融合中间件子系统,具有可调的统计分析服务
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028910
Andy A. Franz, Radek Mista, D. Bakken, C. Dyreson, M. Medidi
Voting is the process of combining multiple replies from replicated servers into a single reply. Data fusion is similar to but more general than voting. In data fusion, the input sources are not necessarily replicated servers, hence the inputs exhibit greater variance. Data fusion is a fundamental building block in distributed systems. It occurs in diverse contexts such as consensus, sensor networks, intrusion detection, and hierarchical resource monitoring, among others. This paper describes Mr. Fusion, a framework that provides data fusion in middleware. The heart of Mr. Fusion is a Fusion Core module that provides mechanisms for programming a wide variety of data fusion algorithms. Another part is a Fusion Status Service that monitors low-level outputs from the Fusion Core and alerts subscribers to divergent values or timings. The implementation borrows techniques from data warehousing and data mining.
投票是将来自复制服务器的多个回复合并为单个回复的过程。数据融合与投票类似,但比投票更普遍。在数据融合中,输入源不一定是复制的服务器,因此输入表现出更大的差异。数据融合是分布式系统的基本组成部分。它出现在不同的环境中,如共识、传感器网络、入侵检测和分层资源监控等。本文介绍了Mr. Fusion,一个在中间件中提供数据融合的框架。Mr. Fusion的核心是一个Fusion Core模块,它提供了各种数据融合算法的编程机制。另一部分是融合状态服务,它监视来自融合核心的低级输出,并提醒订阅者不同的值或时间。该实现借鉴了数据仓库和数据挖掘的技术。
{"title":"Mr. Fusion: a programmable data fusion middleware subsystem with a tunable statistical profiling service","authors":"Andy A. Franz, Radek Mista, D. Bakken, C. Dyreson, M. Medidi","doi":"10.1109/DSN.2002.1028910","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028910","url":null,"abstract":"Voting is the process of combining multiple replies from replicated servers into a single reply. Data fusion is similar to but more general than voting. In data fusion, the input sources are not necessarily replicated servers, hence the inputs exhibit greater variance. Data fusion is a fundamental building block in distributed systems. It occurs in diverse contexts such as consensus, sensor networks, intrusion detection, and hierarchical resource monitoring, among others. This paper describes Mr. Fusion, a framework that provides data fusion in middleware. The heart of Mr. Fusion is a Fusion Core module that provides mechanisms for programming a wide variety of data fusion algorithms. Another part is a Fusion Status Service that monitors low-level outputs from the Fusion Core and alerts subscribers to divergent values or timings. The implementation borrows techniques from data warehousing and data mining.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"36 1","pages":"273-278"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75179035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Time-constrained failure diagnosis in distributed embedded systems 分布式嵌入式系统的时间约束故障诊断
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028930
Nagarajan Kandasamy, J. Hayes, B. Murray
Advanced automotive control applications such as steer and brake-by-wire are typically implemented as distributed systems comprising many embedded processors, sensors, and actuators interconnected via a communication bus. They have severe cost constraints but demand a high level of safety and performance. Motivated by the need for timely diagnosis of faulty actuators in such systems, we present a general method to implement failure diagnosis under deadline and resource constraints. Actuators are diagnosed in distributed fashion by processors to provide a global view of their fault status. The diagnostic tests are implemented in software using analytical redundancy and execute concurrently with the control tasks. The proposed method solves the test scheduling problem using a static list-based approach which guarantees actuator diagnosis within designer-specified deadlines while meeting control performance goals. As a secondary objective, it also minimizes the number of required processors. We present simulation results evaluating the effectiveness of the proposed method under various design constraints.
先进的汽车控制应用,如转向和线控制动,通常作为分布式系统实现,包括许多嵌入式处理器、传感器和执行器,通过通信总线相互连接。它们有严重的成本限制,但要求高水平的安全性和性能。针对这类系统中执行机构故障诊断的需要,提出了一种在时间和资源约束下实现故障诊断的通用方法。执行器由处理器以分布式方式进行诊断,以提供其故障状态的全局视图。诊断测试使用分析冗余在软件中实现,并与控制任务并发执行。该方法采用基于静态列表的方法解决了测试调度问题,在满足控制性能目标的同时保证了执行器的诊断在设计人员指定的时间内完成。作为次要目标,它还可以最小化所需处理器的数量。我们给出了仿真结果,评估了在各种设计约束下所提出方法的有效性。
{"title":"Time-constrained failure diagnosis in distributed embedded systems","authors":"Nagarajan Kandasamy, J. Hayes, B. Murray","doi":"10.1109/DSN.2002.1028930","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028930","url":null,"abstract":"Advanced automotive control applications such as steer and brake-by-wire are typically implemented as distributed systems comprising many embedded processors, sensors, and actuators interconnected via a communication bus. They have severe cost constraints but demand a high level of safety and performance. Motivated by the need for timely diagnosis of faulty actuators in such systems, we present a general method to implement failure diagnosis under deadline and resource constraints. Actuators are diagnosed in distributed fashion by processors to provide a global view of their fault status. The diagnostic tests are implemented in software using analytical redundancy and execute concurrently with the control tasks. The proposed method solves the test scheduling problem using a static list-based approach which guarantees actuator diagnosis within designer-specified deadlines while meeting control performance goals. As a secondary objective, it also minimizes the number of required processors. We present simulation results evaluating the effectiveness of the proposed method under various design constraints.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"12 1","pages":"449-458"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74532374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the placement of software mechanisms for detection of data errors 关于数据错误检测软件机制的放置
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028894
M. Hiller, A. Jhumka, N. Suri
An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between two methods for selecting locations for error detection mechanisms, in this case executable assertions (EAs), in black-box, modular software. Our results show that by placing EAs based on error propagation analysis one may reduce the memory and execution time requirements as compared to experience- and heuristic-based placement while maintaining the obtained detection coverage. Further, we show the sensitivity of the EA-provided coverage estimation on the choice of the underlying error model. Subsequently, we extend the analysis framework such that error-model effects are also addressed and introduce measures for classifying signals according to their effect on system output when errors are present. The extended framework facilitates profiling of software systems from varied dependability perspectives and is also less susceptible to the effects of having different error models for estimating detection coverage.
开发可靠软件的一个重要方面是确定在哪里部署有效的错误检测和恢复机制。我们比较了在黑箱模块化软件中为错误检测机制选择位置的两种方法,在本例中为可执行断言(EAs)。我们的结果表明,通过放置基于错误传播分析的ea,与基于经验和启发式的放置相比,可以减少内存和执行时间需求,同时保持获得的检测覆盖率。进一步,我们展示了ea提供的覆盖估计对潜在误差模型选择的敏感性。随后,我们扩展了分析框架,使误差模型效应也得到了解决,并引入了根据存在误差时信号对系统输出的影响对信号进行分类的措施。扩展的框架有助于从不同的可靠性角度对软件系统进行分析,并且也不容易受到用于估计检测覆盖率的不同错误模型的影响。
{"title":"On the placement of software mechanisms for detection of data errors","authors":"M. Hiller, A. Jhumka, N. Suri","doi":"10.1109/DSN.2002.1028894","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028894","url":null,"abstract":"An important aspect in the development of dependable software is to decide where to locate mechanisms for efficient error detection and recovery. We present a comparison between two methods for selecting locations for error detection mechanisms, in this case executable assertions (EAs), in black-box, modular software. Our results show that by placing EAs based on error propagation analysis one may reduce the memory and execution time requirements as compared to experience- and heuristic-based placement while maintaining the obtained detection coverage. Further, we show the sensitivity of the EA-provided coverage estimation on the choice of the underlying error model. Subsequently, we extend the analysis framework such that error-model effects are also addressed and introduce measures for classifying signals according to their effect on system output when errors are present. The extended framework facilitates profiling of software systems from varied dependability perspectives and is also less susceptible to the effects of having different error models for estimating detection coverage.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"33 1","pages":"135-144"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87992324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
A versatile and modular consensus protocol 一个通用和模块化的共识协议
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028921
A. Mostéfaoui, S. Rajsbaum, M. Raynal
Investigates a modular and versatile approach to solve the consensus problem in asynchronous distributed systems in which up to f processes may crash (f
研究了一种模块化和通用的方法来解决异步分布式系统中的共识问题,其中多达f个进程可能崩溃(f
{"title":"A versatile and modular consensus protocol","authors":"A. Mostéfaoui, S. Rajsbaum, M. Raynal","doi":"10.1109/DSN.2002.1028921","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028921","url":null,"abstract":"Investigates a modular and versatile approach to solve the consensus problem in asynchronous distributed systems in which up to f processes may crash (f<n/2), but equipped with appropriate oracles. It presents a generic protocol that proceeds by consecutive asynchronous rounds. Each round follows a \"two-phase\" pattern. The modularity and the versatility of the protocol appear at each phase of a round. The first phase is a selection phase that allows to use any combination merging random oracle, leader oracle and condition. Its aim is to ensure termination by allowing the processes to start the second phase with the same value. The aim of the second phase is to ensure that the agreement property cannot be violated. Its cost depends on the value of f: two communication steps when f<n/2, that reduce to a single communication step when f<n/3. Hence, the behavior of the first phase is mainly ruled by the system additional equipment, while the behavior of the second phase depends on the value of f. It follows that the proposed protocol can be instantiated in different ways according to the oracles the system is equipped with and the actual value of f.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"36 1","pages":"364-373"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83813956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
SMART: stochastic model-checking analyzer for reliability and timing SMART:随机模型检查分析仪的可靠性和定时
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028976
G. Ciardo, R. L. Jones, Robert M. Marmorstein, A. Miner, Radu I. Siminiceanu
SMART is a software package integrating logic and stochastic modeling formalisms into a single environment. Models expressed in different formalisms can be combined in the same study. To study logical behavior, both explicit and symbolic state-space generation techniques, as well as CTL model-checking algorithms, are available. To study stochastic and timing behavior, both explicit and Kronecker-based numerical solution approaches are available. Since SMART is intended as an industry and research tool, it is written in a modular way that allows for easy integration of new formalisms and solution algorithms.
SMART是一个将逻辑和随机建模形式化集成到单个环境中的软件包。用不同形式表达的模型可以在同一研究中进行组合。为了研究逻辑行为,显式和符号状态空间生成技术以及CTL模型检查算法都是可用的。为了研究随机和定时行为,显式和基于kronecker的数值解决方法都是可用的。由于SMART旨在作为工业和研究工具,它是以模块化的方式编写的,可以轻松集成新的形式和解决方案算法。
{"title":"SMART: stochastic model-checking analyzer for reliability and timing","authors":"G. Ciardo, R. L. Jones, Robert M. Marmorstein, A. Miner, Radu I. Siminiceanu","doi":"10.1109/DSN.2002.1028976","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028976","url":null,"abstract":"SMART is a software package integrating logic and stochastic modeling formalisms into a single environment. Models expressed in different formalisms can be combined in the same study. To study logical behavior, both explicit and symbolic state-space generation techniques, as well as CTL model-checking algorithms, are available. To study stochastic and timing behavior, both explicit and Kronecker-based numerical solution approaches are available. Since SMART is intended as an industry and research tool, it is written in a modular way that allows for easy integration of new formalisms and solution algorithms.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"28 1","pages":"545-"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83098459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
An experimental evaluation of the REE SIFT environment for spaceborne applications 星载应用REE SIFT环境的实验评估
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1029004
K. Whisnant, R. Iyer, P. Jones, R. Some, D. Rennels
Presents an experimental evaluation of a software-implemented fault tolerance (SIFT) environment built around a set of self-checking processes called ARMORs running on different machines that provide error detection and recovery services to themselves and to spaceborne scientific applications. The experiments are split into three groups of error injections, with each group successively stressing the SIFT error detection and recovery more than the previous group. The results show that the SIFT environment adds negligible overhead to the application during failure-free runs. Only 11 cases were observed in which either the application failed to start or the SIFT environment failed to recognize that the application had completed. Further investigations showed that assertions within the SIFT processes-coupled with object-based incremental checkpointing-were effective in preventing system failures by protecting dynamic data within the SIFT processes.
提出了一种软件实现容错(SIFT)环境的实验评估,该环境是围绕一组被称为ARMORs的自检过程构建的,这些自检过程运行在不同的机器上,为自己和星载科学应用提供错误检测和恢复服务。实验分为三组错误注入,每一组对SIFT错误检测和恢复的重视程度依次高于前一组。结果表明,在无故障运行期间,SIFT环境给应用程序增加的开销可以忽略不计。仅观察到11个应用程序无法启动或SIFT环境无法识别应用程序已完成的情况。进一步的调查表明,SIFT进程中的断言——加上基于对象的增量检查点——通过保护SIFT进程中的动态数据,可以有效地防止系统故障。
{"title":"An experimental evaluation of the REE SIFT environment for spaceborne applications","authors":"K. Whisnant, R. Iyer, P. Jones, R. Some, D. Rennels","doi":"10.1109/DSN.2002.1029004","DOIUrl":"https://doi.org/10.1109/DSN.2002.1029004","url":null,"abstract":"Presents an experimental evaluation of a software-implemented fault tolerance (SIFT) environment built around a set of self-checking processes called ARMORs running on different machines that provide error detection and recovery services to themselves and to spaceborne scientific applications. The experiments are split into three groups of error injections, with each group successively stressing the SIFT error detection and recovery more than the previous group. The results show that the SIFT environment adds negligible overhead to the application during failure-free runs. Only 11 cases were observed in which either the application failed to start or the SIFT environment failed to recognize that the application had completed. Further investigations showed that assertions within the SIFT processes-coupled with object-based incremental checkpointing-were effective in preventing system failures by protecting dynamic data within the SIFT processes.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"6 1","pages":"585-594"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90076217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Soft error sensitivity characterization for microprocessor dependability enhancement strategy 微处理器可靠性增强策略的软误差灵敏度表征
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028927
Seongwoo Kim, Arun Kumar Somani
This paper presents an empirical investigation on the soft error sensitivity (SES) of microprocessors, using the picoJava-II as an example, through software simulated fault injections in its RTL model. Soft errors are generated under a realistic fault model during program run-time. The SES of a processor logic block is defined as the probability that a soft error in the block causes the processor to behave erroneously or enter into an incorrect architectural state. The SES is measured at the functional block level. We have found that highly error-sensitive blocks are common for various workloads. At the same time soft errors in many other logic blocks rarely affect the computation integrity. Our results show that a reasonable prediction of the SES is possible by deduction from the processor's microarchitecture. We also demonstrate that the sensitivity-based integrity checking strategy can be an efficient way to improve fault coverage per unit redundancy.
本文以picoJava-II微处理器为例,通过软件模拟故障注入的RTL模型,对微处理器的软错误灵敏度(SES)进行了实证研究。软错误是在实际故障模型下,在程序运行过程中产生的。处理器逻辑块的SES定义为块中的软错误导致处理器行为错误或进入不正确的体系结构状态的概率。SES是在功能块级别测量的。我们发现,对于各种工作负载,高度错误敏感的块都很常见。同时,许多其他逻辑块中的软错误很少影响计算的完整性。我们的结果表明,从处理器的微结构中推导出合理的SES是可能的。我们还证明了基于灵敏度的完整性检查策略是提高单位冗余故障覆盖率的有效方法。
{"title":"Soft error sensitivity characterization for microprocessor dependability enhancement strategy","authors":"Seongwoo Kim, Arun Kumar Somani","doi":"10.1109/DSN.2002.1028927","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028927","url":null,"abstract":"This paper presents an empirical investigation on the soft error sensitivity (SES) of microprocessors, using the picoJava-II as an example, through software simulated fault injections in its RTL model. Soft errors are generated under a realistic fault model during program run-time. The SES of a processor logic block is defined as the probability that a soft error in the block causes the processor to behave erroneously or enter into an incorrect architectural state. The SES is measured at the functional block level. We have found that highly error-sensitive blocks are common for various workloads. At the same time soft errors in many other logic blocks rarely affect the computation integrity. Our results show that a reasonable prediction of the SES is possible by deduction from the processor's microarchitecture. We also demonstrate that the sensitivity-based integrity checking strategy can be an efficient way to improve fault coverage per unit redundancy.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"68 1","pages":"416-425"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90372743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 106
期刊
Proceedings. International Conference on Dependable Systems and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1