NUREG/CR-7151 Vol 1 "Development of a Fault Injection
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Openfog Reference Architecture for Fog Computing
OpenFog Reference Architecture for Fog Computing Produced by the OpenFog Consortium Architecture Working Group www.OpenFogConsortium.org February 2017 1 OPFRA001.020817 © OpenFog Consortium. All rights reserved. Use of this Document Copyright © 2017 OpenFog Consortium. All rights reserved. Published in the USA. Published February 2017. This is an OpenFog Consortium document and is to be used in accordance with the terms and conditions set forth below. The information contained in this document is subject to change without notice. The information in this publication was developed under the OpenFog Consortium Intellectual Property Rights policy and is provided as is. OpenFog Consortium makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of fitness for a particular purpose. This document contains content that is protected by copyright. Copying or distributing the content from this document without permission is prohibited. OpenFog Consortium and the OpenFog Consortium logo are registered trademarks of OpenFog Consortium in the United States and other countries. All other trademarks used herein are the property of their respective owners. Acknowledgements The OpenFog Reference Architecture is the product of the OpenFog Architecture Workgroup, co-chaired by Charles Byers (Cisco) and Robert Swanson (Intel). It represents the collaborative work of the global membership of the OpenFog Consortium. We wish to thank these organizations for contributing -
Core System Architecture Viewpoints
Core System System Architecture Document (SAD) www.its.dot.gov/index.htm Draft — September 6, 2011 Produced by Lockheed Martin ITS Joint Program Office Research and Innovative Technology Administration U.S. Department of Transportation Notice This document is disseminated under the sponsorship of the Department of Transportation in the interest of information exchange. The United States Govern- ment assumes no liability for its contents or use thereof. Report Documentation Page Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Informa- tion Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD MM YYYY) 2. REPORT TYPE 3. DATES COVERED 06 09 2011 (Draft Specification) Month YYYY – Month YYYY 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Core System: System Architecture Document (SAD) Draft GS-23F-0150S 5b. GRANT NUMBER Xxxx 6. AUTHOR(S) 5c. PROGRAM ELEMENT NUMBER Core System Engineering Team Xxxx 5d. -
Using Fault Injection to Increase Software Test Coverage
Using Fault Injection to Increase Software Test Coverage James M. Bieman Daniel Dreilinger Lijun Lin Computer Science Department Colorado State University Fort Collins, Colorado 80523 [email protected] To appear in Proc. International Symposium on Software Reliability (ISSRE'96) Abstract must be recompiled and then tested. This process can be too labor and time intensive for practical use in the general test- During testing, it is nearly impossible to run all statments ing of commercial software. or branches of a program. It is especially dif®cult to test Our hypothesis is that fault injection can be effective the code used to respond to exceptional conditions. This when it is directed towards solving speci®c testing prob- untested code, often the error recovery code, will tend to be lems. In particular, we use fault injection to force the exe- an error prone part of a system. We show that test cover- cution of dif®cult to reach program paths. To avoid the need age can be increased through an ªassertion violationº tech- for recompilation, we mutate program state rather than pro- nique for injecting software faults during execution. Using gram text. our prototype tool, Visual C-Patrol (VCP), we were able to To be practical, any fault injection mechanism must be substantially increase test branch coverage in four software inexpensive and be able to model a wide variety of fault systems studied. types. Much of the fault injection should be automated. Al- though a practical approach requires a limited fault model, Keywords: software testing, software test coverage, fault we want to simulate as many faults as possible. -
Improving Software Fault Injection
Improving Software Fault Injection Ph.D. Thesis Erik van der Kouwe Vrije Universiteit Amsterdam, 2016 This work was funded in part by European Research Council under ERC Advanced Grant 227874. Copyright © 2016 by Erik van der Kouwe. ISBN XXX-XX-XXXX-XXX-X Printed by XXX. VRIJE UNIVERSITEIT IMPROVING SOFTWARE FAULT INJECTION ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof. dr. Vinod Subramaniam, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Exacte Wetenschappen op X XXX 2016 om X.XX uur in de aula van de universiteit, De Boelelaan 1105 door ERIK VAN DER KOUWE geboren te Leidschendam, Nederland promotor: prof.dr. A.S. Tanenbaum “TODO add quote.” TODO add quote source. Contents Contents vii List of Figures xi List of Tables xiii Publications xv 1 Introduction 1 2 Finding fault with fault injection An Empirical Exploration of Distortion in Fault Injection Experiments 7 2.1 Introduction . 7 2.2 Related work . 12 2.3 Fidelity . 14 2.4 Approach . 16 2.5 Programs and workloads . 17 2.6 Results . 19 2.6.1 Coverage . 19 2.6.2 Execution count . 26 2.6.3 Relationship between execution count and coverage . 30 2.6.4 Relationship between faults and execution . 31 2.7 Threats to validity . 33 2.8 Recommendations . 35 2.9 Conclusion . 36 vii viii 3 On the Soundness of Silence Investigating Silent Failures Using Fault Injection Experiments 39 3.1 Introduction . 39 3.2 Approach . 41 3.2.1 Fault injection . -
Evaluating Software Systems Via Runtime Fault-Injection and Reliability, Availability and Serviceability (RAS) Metrics and Models
The 7U Evaluation Method: Evaluating Software Systems via Runtime Fault-Injection and Reliability, Availability and Serviceability (RAS) Metrics and Models Rean Griffith Submitted in partial fulfillment of the Requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2008 c 2008 Rean Griffith All Rights Reserved Abstract The 7U Evaluation Method: Evaluating Software Systems via Runtime Fault-Injection and Reliability, Availability and Serviceability (RAS) Metrics and Models Rean Griffith Renewed interest in developing computing systems that meet additional non-functional requirements such as reliability, high availability and ease-of-management/self-management (serviceability) has fueled research into developing systems that exhibit enhanced reliability, availability and serviceability (RAS) capabilities. This research focus on enhancing the RAS capabilities of computing systems impacts not only the legacy/existing systems we have today, but also has implications for the design and development of next generation (self- managing/self-*) systems, which are expected to meet these non-functional requirements with minimal human intervention. To reason about the RAS capabilities of the systems of today or the self-* systems of tomorrow, there are three evaluation-related challenges to address. First, developing (or identifying) practical fault-injection tools that can be used to study the failure behavior of computing systems and exercise any (remediation) mechanisms the system has available for mitigating or resolving problems. Second, identifying techniques that can be used to quantify RAS deficiencies in computing systems and reason about the efficacy of individual or combined RAS-enhancing mechanisms (at design-time or after system deployment). Third, developing an evaluation methodology that can be used to objectively compare systems based on the (expected or actual) benefits of RAS-enhancing mechanisms. -
ANSI/IEEE 1471 and Systems Engineering•
ANSI/IEEE 1471 and Systems Engineering• Mark W. Maier David Emery The Aerospace Corporation The MITRE Corporation 15049 Conference Center Dr 7515 Colshire Drive, MS N110 Chantilly, VA 20151 McLean, VA 22102-3481 [email protected] [email protected] Rich Hilliard P.O. Box 396 Littleton, MA 01460 [email protected] Abstract: ANSI/IEEE Standard 1471-2000 is the Recommended Practice for Architectural Description of Software- Intensive Systems, developed by the IEEE’s Architecture Working Group (AWG) under the sponsorship of the Software Engineering Standards Committee of IEEE. ANSI/IEEE 1471 is the first formal standard1 to address the content and organization of architectural descriptions. The standard defines the structure and content of an architectural description (AD) and incorporates a broad consensus on best practices for such descriptions. Although ANSI/IEEE 1471 was conceived as a software-focused standard, this paper argues that it is equally applicable to any system; hence appropriate for use as a part of systems engineering to describe system architectures. This article reviews the concepts of ANSI/IEEE 1471, the rationale for their selection, and demonstrates its application in systems engineering. ARCHITECTURE FRAMEWORKS The notion of architecture has entered into both the domains of software and systems engineering in recent decades. There are several threads to this entry. Many invoke a direct analogy with the notion in civil engineering, while others are built on particular practices largely drawn from the information technology industry. Some background on what problems are being addressed by what goes by the term “architecture” is helpful in understand the motivation for the ANSI/IEEE 1471 work and related frameworks. -
Formal Fault Injection Vulnerability Detection in Binaries: a Software
Formal fault injection vulnerability detection in binaries : a software process and hardware validation Nisrine Jafri To cite this version: Nisrine Jafri. Formal fault injection vulnerability detection in binaries : a software process and hard- ware validation. Cryptography and Security [cs.CR]. Université Rennes 1, 2019. English. NNT : 2019REN1S014. tel-02385208 HAL Id: tel-02385208 https://tel.archives-ouvertes.fr/tel-02385208 Submitted on 28 Nov 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. T HÈSE DE DOCTORAT DE L’UNIVERSITE DE RENNES 1 COMUE UNIVERSITE BRETAGNE LOIRE Ecole Doctorale N°601 Mathèmatique et Sciences et Technologies de l’Information et de la Communication Spécialité : Informatique Par « Nisrine JAFRI » « Formal Fault Injection Vulnerability Detection in Binaries » «A Software Process and Hardware Validation» Thèse présentée et soutenue à RENNES , le 25 mars 2019 Unité de recherche : Inria, TAMIS team Thèse N°: Rapporteurs avant soutenance : Marie-Laure POTET, Professeur des Universités, ENSIMAG Jean-Yves MARION, Professeur des Universités, Université de Lorraine Composition du jury : Président : Pierre-Alain FOUQUE, Professeur des Universités, Université Rennes 1 Examinateurs : Leijla BATINA, Professeur des Université s, Université Radboud de Nimegue Shivam BHASIN, Chercheur, Université technologique de Singapour Sylvain GUILLEY, Professeur des Universités, Télécom ParisTech Annelie HEUSER, Chercheur, CNRS Dir. -
An Overview of IEEE Software Engineering Standards and Knowledge Products
An Overview of IEEE Software Engineering Standards and Paul R. Croll Knowledge Products Chair, IEEE SESC Computer Sciences Corporation [email protected] Objectives l Provide an introduction to The IEEE Software Engineering Standards Committee (SESC) l Provide an overview of the current state and future direction of IEEE Software Engineering Standards and knowledge products u IEEE Software Engineering Standards Collection u Software Engineering Competency Recognition Program u Standards-Based Training l Discuss how you can participate in software engineering standardization efforts ASQ Section 509 SSIG Meeting, 8 November 2000 Paul R. Croll - 2 The IEEE Software Engineering Standards Committee (SESC) http://computer.org/standard/sesc/ ASQ Section 509 SSIG Meeting, 8 November 2000 Paul R. Croll - 3 The SESC Vision l The leading supplier and promoter of a family of software engineering standards and related products and services. ASQ Section 509 SSIG Meeting, 8 November 2000 Paul R. Croll - 4 Software Engineering: An Object View Source: [SESC95] ASQ Section 509 SSIG Meeting, 8 November 2000 Paul R. Croll - 5 SESC in the IEEE Structure IEEE IEEE IEEE Computer Society Standards Board Software Engineering Standards Committee Executive Committee & Management Board Working Group Study Group Planning Group Conferences ASQ Section 509 SSIG Meeting, 8 November 2000 Paul R. Croll - 6 SESC Strategic Program Model ISO and IEC IEEE SESC Standards Standards Program Terminology Terminology Overall Guide Quality Customer Resource Process Product Management Principles or Policies Element Standards Software Engineering Application Guides System “Toolbox” of Disciplines Technique Standards Source: [SESC95] ASQ Section 509 SSIG Meeting, 8 November 2000 Paul R. Croll - 7 The IEEE Software Engineering Standards Collection http://standards.ieee.org/catalog/softwareset.html ASQ Section 509 SSIG Meeting, 8 November 2000 Paul R. -
Architectural Description
Reference number of working document: ISO/IEC JTC 1/SC 7 N 000 Date: 2007-07-04 Reference number of document: ISO/IEC WD1 42010 IEEE P42010/D1 Committee identification: ISO/IEC JTC 1/SC 7/WG 42 Secretariat: Sweden Systems and Software Engineering — Architectural Description Élément introductif — Élément principal — Partie n: Titre de la partie Warning This document is not an ISO International Standard. It is distributed for review and comment. It is subject to change without notice and may not be referred to as an International Standard. Recipients of this draft are invited to submit, with their comments, notification of any relevant patent rights of which they are aware and to provide supporting documentation. Document type: International standard Document subtype: if applicable Document stage: (20) Preparation Document language: E ISO/IEC WD1 42010 IEEE P42010/D1 Copyright notice This ISO/IEC and IEEE document is a Draft International Standard and is copyright-protected by ISO/IEC and IEEE. Except as permitted under the applicable laws of the user's country, neither this draft document nor any extract from it may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, photocopying, recording or otherwise, without prior written permission being secured. Requests for permission to reproduce should be addressed to either ISO or IEEE at the address below or ISO's member body in the country of the requester. ISO copyright office Case postale 55 CH-1211 Geneva 20 Tel. +41 22 749 01 11 Fax. +41 22 749 09 47 E-mail: [email protected] Web: www.iso.org IEEE Standards Association Manager, Standards Intellectual Property 445 Hoes Lane Piscataway, NJ 08854 E-mail: [email protected] Web: standards.ieee.org Reproduction may be subject to royalty payments or a licensing agreement. -
Towards Harmonizing Multiple Architecture Description Languages for Real-Time Embedded Systems
Towards Harmonizing Multiple Architecture Description Languages for Real-Time Embedded Systems Tahir Naseer Qureshi, Martin Törngren, Magnus Persson, De-Jiu Chen, Carl-Johan Sjöstedt Division of Mechatronics, Department of Machine Design KTH-The Royal Institute of Technology Stockholm, Sweden {tnqu, martin, magnper, chen, carlj}@md.kth.se Abstract— The increasing complexity of real-time embedded solutions in model-based development. It exists in different systems requires appropriate methods and techniques to support forms depending on the applied industrial or application the development including the specification and analysis of domain. According to IEEE 1471 standard [3], an architecture different architectural aspects. A large number of architectural is defined as: description languages (ADL) have been proposed with varying focus and application domains. There is a need for “The fundamental organization of a system embodied in its harmonization of these ADLs. This can be from develoloping and components, their relationships to each other, and to the understanding of how they differ or could be synergistically environment and the principles guiding its design and combined for increasing the overall development efficiency and evolution” fulfilling the ever increasing functional and non-functional requirements on a system. This paper addresses this issue and While an architectural description is the specification of an focuses on four different ADLs: EAST-ADL, AUTOSAR, AADL architecture, an ADL provides the syntax, either textual or and Rubus. In this work we compare these ADLs, identify graphical, for an architecture description. The need for possible usage scenarios involving more than one ADL and expressing and describing architectures of real-time embedded discuss some of the underlying challenges. -
Experimental Assessment of Cloud Software Dependability Using Fault Injection
Experimental Assessment of Cloud Software Dependability Using Fault Injection Lena Herscheid(), Daniel Richter, and Andreas Polze Hasso Plattner Institute, Potsdom, Germany {lena.herscheid,daniel.richter,andreas.polze}@hpi.de Abstract. In modern cloud software systems, the complexity arising from fea- ture interaction, geographical distribution, security and configurability require- ments increases the likelihood of faults. Additional influencing factors are the impact of different execution environments as well as human operation or con- figuration errors. Assuming that any non-trivial cloud software system contains faults, robustness testing is needed to ensure that such faults are discovered as early as possible, and that the overall service is resilient and fault tolerant. To this end, fault injection is a means for disrupting the software in ways that un- cover bugs and test the fault tolerance mechanisms. In this paper, we discuss how to experimentally assess software dependability in two steps. First, a model of the software is constructed from different runtime observations and configu- ration information. Second, this model is used to orchestrate fault injection ex- periments with the running software system in order to quantify dependability attributes such as service availability. We propose the architecture of a fault in- jection service within the OpenStack project. Keywords: Fault injection · Dependability · Distributed systems · Cloud sys- tems · Availability 1 Introduction Fault tolerance is an essential dependability requirement especially in distributed and cloud software systems, where components can fail in arbitrary ways, but a high availability or reliability of the service is nevertheless required. To evaluate the dependability of complex software systems, a sufficiently realistic dependability model of the system needs to be built. -
Competency Models
SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS Architectural and Engineering Managers ACCCP Engineering and Technology Alabama Competency Model Architectural and Engineering Managers Code 1 Tier 1: Personal Effectiveness Competencies 1.1 Interpersonal Skills: Displaying the skills to work effectively with others from diverse backgrounds. 1.1.1 Demonstrating sensitivity/empathy 1.1.1.1 Show sincere interest in others and their concerns. 1.1.1.2 Demonstrate sensitivity to the needs and feelings of others. 1.1.1.3 Look for ways to help people and deliver assistance. 1.1.2 Demonstrating insight into behavior Recognize and accurately interpret the communications of others as expressed through various 1.1.2.1 formats (e.g., writing, speech, American Sign Language, computers, etc.). 1.1.2.2 Recognize when relationships with others are strained. 1.1.2.3 Show understanding of others’ behaviors and motives by demonstrating appropriate responses. 1.1.2.4 Demonstrate flexibility for change based on the ideas and actions of others. 1.1.3 Maintaining open relationships 1.1.3.1 Maintain open lines of communication with others. 1.1.3.2 Encourage others to share problems and successes. 1.1.3.3 Establish a high degree of trust and credibility with others. 1.1.4 Respecting diversity 1.1.4.1 Demonstrate respect for coworkers, colleagues, and customers. Interact respectfully and cooperatively with others who are of a different race, culture, or age, or 1.1.4.2 have different abilities, gender, or sexual orientation. Demonstrate sensitivity, flexibility, and open-mindedness when dealing with different values, 1.1.4.3 beliefs, perspectives, customs, or opinions.