As the scale of high performance computing systems.grows, three main challenges arise: the programmability, reliability, and energy efficiency of those systems. Accomplishing all three without sacrificing performance ...
详细信息
This research focuses on testing enterprise systems. more concretely on how to automatically generate the initial test data to be entered into the relational database to support each test case. Existing approaches can...
详细信息
ISBN:
(纸本)9780769549286;9781467350488
This research focuses on testing enterprise systems. more concretely on how to automatically generate the initial test data to be entered into the relational database to support each test case. Existing approaches cannot generate initial database entries to suit complicated business logic states such as reading the database more than once, searching the database by partial string matching, or setting primary and foreign key constraints on the database scheme. To solve these limitations, we propose a method for initial database generation. This method adopts a design model that can handle the complicated business logic states given above, and from this design model, our method generates appropriate initial database entries;it employs a step-by-step approach using the constraints extracted from the design model. The proposed method enables us to automatically generate initial database entries for a wide range of test cases and thus supports the testing of industrial-level enterprise systems. Using three industrial-level enterprise systems.as case studies, we confirm that our method properly generated initial databases for 72% to 100% of the test cases in which an initial database was needed.
Characterizing latent software faults is crucial to address dependability issues of current three-tier systems. A client should not have a misconception that a transaction succeeded, when in reality, it failed due to ...
详细信息
ISBN:
(纸本)9780769544502
Characterizing latent software faults is crucial to address dependability issues of current three-tier systems. A client should not have a misconception that a transaction succeeded, when in reality, it failed due to a silent error. We present a fault injection-based evaluation to characterize silent and non-silent software failures in a representative three-tier web service, one that mimics a day trading application widely used for benchmarking application servers. For failure characterization, we quantify distribution of silent and non-silent failures, and recommend low cost application-generic and application-specific consistency checks, which improve the reliability of the application. We inject three variants of null-call, where a callee returns null to the caller without executing business logic. Additionally, we inject three types of unchecked exceptions and analyze the reaction of our application. Our results show that 49% of error injections from null-calls result in silent failures, while 34% of unchecked exceptions result in silent failures. Our generic-consistency check can detect silent failures in null-calls with an accuracy as high as 100%. Non-silent failures with unchecked exceptions can be detected with an accuracy of 42% with our application-specific checks.
Implementation-level software model checking explores the state space of a system implementation directly to find potential software defects without requiring any specification or modeling. Despite early successes, th...
详细信息
ISBN:
(纸本)9781450309776
Implementation-level software model checking explores the state space of a system implementation directly to find potential software defects without requiring any specification or modeling. Despite early successes, the effectiveness of this approach remains severely constrained due to poor scalability caused by state-space explosion. DEMETER makes software model checking more practical with the following contributions: (i) proposing dynamic interface reduction, a new state-space reduction technique, (ii) introducing a framework that enables dynamic interface reduction in an existing model checker with a reasonable amount of effort, and (iii) providing the framework with a distributed runtime engine that supports parallel distributed model checking. We have integrated DEMETER into two existing model checkers, MAcEMC and MoDisT, each involving changes of around 1,000 lines of code. Compared to the original MAcEMC and MODIST model checkers, our experiments have shown state-space reduction from a factor of five to up to five orders of magnitude in representative distributed applications such as PAXOS, Berkeley DB, CHORD, and PASTRY. As a result, when applied to a deployed PAXOS implementation, which has been running in production data centers for years to manage tens of thousands of machines, DEMETER manages to explore completely a logically meaningful state space that covers both phases of the PAXOS protocol, offering higher assurance of softwarereliability that was not possible before.
Next generation military and commercial engine control systems.are planned to be distributed engine control (DEC) systems. Many technology improvements will be required to achieve a successful DEC that provides the hi...
详细信息
The proceedings contain 25 papers. The special focus in this conference is on software tool and its development. The topics include: purely functional global variables;compiler support for profiling C++ template metap...
ISBN:
(纸本)9789949231782
The proceedings contain 25 papers. The special focus in this conference is on software tool and its development. The topics include: purely functional global variables;compiler support for profiling C++ template metaprograms;database-driven tool support for DisCo executable specifications;a multi-layer diagrammatic (Meta) modelling environment;the INTEGRA tool integration framework;a model for language-independent mobile agents;layered artificial intelligence framework for autonomous agents;interleaving human and search-based software architecture design;class and object model conformance using OWL2 reasoners;bounded saturation based CTL model checking;automated code synthesis for run-time verification of distributed embedded systems.a declarative approach to solving challenging search problems;personalized side-quest generation for computer role-playing games;adjusting effort estimation using micro-productivity profiles;quantitative system reliability approach for optimizing IT security costs in an AI environment;component reuse in ensemble-based medical image processing applications;extended choice relation framework for workflow testing and towards more reliable C++ template metaprograms.
Due to the continuous shrinking of the transistor sizes which is strongly driven by Moore's law, reliability becomes a dominant design challenge for embedded systems.reliability problems arise from permanent erro...
详细信息
As recognition grows within industry for the advantages that can be gained through the exploitation of large-scale dynamic systems. a need emerges for dependable performance. Future systems.are being developed with a ...
详细信息
As recognition grows within industry for the advantages that can be gained through the exploitation of large-scale dynamic systems. a need emerges for dependable performance. Future systems.are being developed with a requirement to support mission critical and safety critical applications. These levels of criticality require predictable performance and as such have traditionally not been associated with adaptive systems. The software architecture proposed for such systems.takes its properties from the service-oriented computing paradigm and the communication model follows a publish/subscribe approach. While adaptive, such architectures do not, however, typically support real-time levels of performance. There is scope, however, for dependability within such architectures through the use of Quality of Service (QoS) methods. QoS is used in systems.where the distribution of resources cannot be decided at design time. In this paper a QoS based framework is proposed for providing adaptive and dependable behaviour for future large-scale dynamic systems.through the flexible allocation of resources. Simulation results are presented to demonstrate the benefits of the QoS framework and the tradeoffs that occur between negotiation algorithms of varying complexities.
This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our method takes advantage of past experiences...
详细信息
ISBN:
(纸本)9780769542508
This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our method takes advantage of past experiences by storing historical failures in a database and retrieving similar instances in the occurrence of failure. We extract the system `invariants' by modeling consistent dependencies between system attributes during the operation, and construct a network graph based on the learned invariants. When a failure happens, the status of invariants network, i.e., whether each invariant link is broken or not, provides a view of failure characteristics. We use a high dimensional binary vector to store those failure evidences, and develop a novel algorithm to efficiently retrieve failure signatures from the database. Experimental results in a web based system have demonstrated the effectiveness of our method in diagnosing the injected failures.
software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptible to latent vulnerabilities. Source code which...
详细信息
ISBN:
(纸本)9780769542508
software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptible to latent vulnerabilities. Source code which is re-used without being patched for various reasons may result in vulnerable binaries, despite the vulnerabilities being made publicly known. To aggravate matters, crackers have access to information on these vulnerabilities as well. Defenders need to ensure all loopholes are patched, while attackers need just one such loophole. In this work, we define latent vulnerabilities, and study the prevalence of the problem. This provides us the motivation, and an insight into the future work to be done in solving the problem. Our results show that unpatched source files which are more than one year old are commonly used in the latest operating systems. In fact, several of these files are more than ten years old. We explore the premises of using symbols in identifying binaries and conclude that they are insufficient in solving the problem. Additionally, we discuss two possible approaches to solve the problem.
暂无评论