6,117 Hits in 8.5 sec

ORCHESTRA: a probing and fault injection environment for testing protocol implementations

S. Dawson, F. Jahanian, T. Mitton
Proceedings of IEEE International Computer Performance and Dependability Symposium  
Script-driven probing and fault injection views a distributed protocol as an abstraction through which a collection of participants communicate by exchanging a set of messages.  ...  ORCHESTRA is based on a simple yet powerful framework, called scri#driven probing and fault injection.  ...  These tools have been used to conduct extensive experiments on several implementations of commercial and prototype systems in order to demonstrate the utility of script-driven probing and fault injection  ... 
doi:10.1109/ipds.1996.540200 fatcat:nmpih7wsjnes5m6mx6ore6qavu

Probing and Fault Injection of Dependable Distributed Protocols

S. Dawson, F. Jahanian
1995 Computer journal  
This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols.  ...  The proposed technique, called script-driven probing and fault injection, can be used for studying the behavior of distributed systems and for detecting design and implementation errors of faulttolerant  ...  This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols.  ... 
doi:10.1093/comjnl/38.4.286 fatcat:2kfybii5nfhsfhnduczdd2efc4

Experiments on six commercial TCP implementations using a software fault injection tool

Scott Dawson, Farnam Jahanian, Todd Mitton
1997 Software, Practice & Experience  
This paper describes a set of experiments performed on six different vendor TCP implementations using ORCHESTRA, a tool for testing and fault injection of communication protocols.  ...  These experiments uncovered violations of the TCP protocol specification, and illustrated differences in the philosophies of various vendors in their implementations of TCP.  ...  Finally, we thank Jerry Chu, Steve Parker, and the other engineers at Sun for their discussion of the Solaris TCP implementation.  ... 
doi:10.1002/(sici)1097-024x(199712)27:12<1385::aid-spe133>;2-7 fatcat:upo7ctywsjaglo6ygmv43tx7xu

A Tool for Fault Injection and Conformance Testing of Distributed Systems [chapter]

Eliane Martins, Maria de Fátima Mattiello-Francisco
2003 Lecture Notes in Computer Science  
This paper presents an approach for conformance testing and fault injection of distributed systems supported by a tool named FSoFIST (Ferry-clip with Software Fault Injection Support Tool).  ...  For example, a protocol implementation is tested via an underlying communication service, or it is embedded in other protocol layers.  ...  Loki [4] , as ORCHESTRA, is another tool that uses probes monitoring as well as fault injection purposes. Probes are inserted in each node to monitor state changes and to inject faults as required.  ... 
doi:10.1007/978-3-540-45214-0_21 fatcat:43pwcv6xrjhynhdhlwmasndtqa

Software implemented fault injection for safety-critical distributed systems by means of mobile agents

T.M. Galla, K.A. Hummel, R. Pallierer
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
We introduce a lightweight agent implementation language to model the fault injection and the concerned system resources, agent migration and logging of the fault injection experiments.  ...  To assure the correct operation of the fault tolerance mechanisms, software implemented fault injection provides low cost and easy to control techniques to test the system under faulty conditions.  ...  The fault injection development and evaluation unit is used for the development of the fault injection agents, for the trig- In the current implementation Ethernet with TCP/IP as communication protocol  ... 
doi:10.1109/hicss.2004.1265708 dblp:conf/hicss/GallaHP04 fatcat:eie36mso3reo3ojl6mccv54cy4

Experiences with a CANoe-based fault injection framework for AUTOSAR

Patrick E. Lanigan, Priya Narasimhan, Thomas E. Fuhrman
2010 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)  
We describe a proof-of-concept fault-injection framework with example fault-injection scenarios, as well as implementation issues faced and addressed, lessons learned, and the suitability of using CANoe  ...  as a fault-injection environment.  ...  Acknowledgements The authors wish to acknowledge Sandeep Menon and Larry Peruski at General Motors R&D. Sandeep is the original developer of the by-wire demo that we adapted for this study.  ... 
doi:10.1109/dsn.2010.5544419 dblp:conf/dsn/LaniganNF10 fatcat:jamxs2nkwvc6tky7j3dpzuhqky

A Kernel-Based Communication Fault Injector for Dependability Testing of Distributed Systems [chapter]

Roberto Jung Drebes, Gabriela Jacques-Silva, Joana Matos Fonseca da Trindade, Taisy Silva Weber
2006 Lecture Notes in Computer Science  
Software-implemented fault injection is a powerful strategy to test fault-tolerant protocols in distributed environments.  ...  In this paper, we present ComFIRM, a communication fault injection tool we developed which minimizes the probe effect on the tested protocols.  ...  This allows it to minimize the probe effect in the kernel itself. The tool aims to inject communication faults to validate fault tolerance aspects of network protocols and distributed systems.  ... 
doi:10.1007/11678779_13 fatcat:d3atssi3rzdl5mz6jcok3z4wsi

Fault Injection Framework for Time Triggered Ethernet

Onwuchekwa Daniel, Foo Jia-Jiann, Obermaisser Roman
2018 Zenodo  
Consequently a challenge for this kind of system is the realistic and effective validation that can evaluate multiple implementations from different vendors including the protocol itself using Fault Injection  ...  This paper presents an FI framework for TTEthernet using an FPGA which is connected to the network under test and injects faults according to a cut-through paradigm.  ...  TTTech Vienna played a major role in the provision of hardware and technical support for the work done in this project. References  ... 
doi:10.5281/zenodo.1485391 fatcat:t5jrj57e55ahte6lf34yhe6wyi

Validation-based development of dependable systems

J. Arlat, J. Boue, Y. Crouzet
1999 IEEE Micro  
It relies on the insertion of software probes into the program implementing the target fault tolerance protocol (after each conditional branching) to provide execution traces for each experiment.  ...  It relies on the determination of a formal model (a state table) of the fault tolerance protocol from which, irrespective of the program implementing the protocol, a set of assertions characterizing the  ...  It relies on the insertion of software probes into the program implementing the target fault tolerance protocol (after each conditional branching) to provide execution traces for each experiment.  ... 
doi:10.1109/40.782569 fatcat:wvly2wjecvfonelnzuryofdr4a

Integrated Sensor: A Backdoor for Hardware Trojan Insertions?

Xuan Thuy Ng, Zakaria Naj, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley
2015 2015 Euromicro Conference on Digital System Design  
We demonstrate that sensors, which are deployed to prevent faults, can be exploited to insert effective and almost zero-overhead hardware Trojans.  ...  The first case study exploits the in-build temperature sensor of Virtex-5 system monitors while the other exploits a user deployed sensor.  ...  We have developed a stealthy HT circuitry on an AES implementation using LUT6 2, CFGLUT5 and system monitor. The goal of the designed Trojan is to inject faults on the underlying AES circuitry.  ... 
doi:10.1109/dsd.2015.119 dblp:conf/dsd/NgoNBRDG15 fatcat:lhpmah6cmne4hmuzimkvfbrolq

On the inadequacy of link connectivity monitoring

Mohit Saxena, Ramana Rao Kompella
2008 IEEE INFOCOM 2008 - IEEE Conference on Computer Communications Workshops  
Using Rocketfuel topologies, we quantify the resulting overhead of injecting these 2-hop probes for routers in real ISPs.  ...  Internet backbone networks are constantly evolving along several dimensions such as technology, protocols, and features.  ...  a wide variety of complex faults and impairments.  ... 
doi:10.1109/infocom.2008.4544628 fatcat:3h5elw6cg5c4xbvvmzgzyocela

Dynamic node management and measure estimation in a state-driven fault injector

2000 Conference Proceedings 2000 International Conference on Mathematical Methods in Electromagnetic Theory (Cat. No.00EX413)  
Validation of distributed systems using fault injection is difficult because of their inherent complexity, lack of a global clock, and lack of an easily accessible notion of a global state.  ...  To address these challenges, the Loki fault injector injects faults based on a partial view of the global state of a distributed system, and performs a post-runtime analysis using an off-line clock synchronization  ...  The in-jectFault() method of the probe implements the faults to be injected in the application.  ... 
doi:10.1109/mmet.2000.6241463 fatcat:zogoffwmqfenbcscxyfwrtvj6m

A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices [chapter]

Timo Kasper, David Oswald, Christof Paar
2010 Lecture Notes in Computer Science  
We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including  ...  We give details of customized modules for the communication with many types of embedded devices and other modules that allow to inject various types of faults.  ...  Implications Depending on the cryptographic primitive and its actual implementation (and on the adversary's knowledge about the implementation), the injection of power faults as practically demonstrated  ... 
doi:10.1007/978-3-642-17499-5_5 fatcat:yd7vx5jw5vh2boctlr2z2hjxcm

CAPA: The Spirit of Beaver Against Physical Attacks [chapter]

Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
2018 Lecture Notes in Computer Science  
The tile-probe-and-fault model leads one to naturally look (by analogy) at actively secure multi-party computation protocols. Indeed, CAPA draws much inspiration from the MPC protocol SPDZ.  ...  Namely, a hardware implementation of the KATAN and AES block ciphers, as well as a software bitsliced AES S-box implementation.  ...  This fault is injected before the MAC tag calculation, so that τ c and τ f are valid tags for the faulted values c and f respectively.  ... 
doi:10.1007/978-3-319-96884-1_5 fatcat:ejpxxpzfrncgfbnnb4aqjc6q3u

Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries [article]

Siemen Dhooghe, Svetla Nikova
2020 IACR Cryptology ePrint Archive  
The wire probe-and-fault models are currently the most used models to provide arguments for side-channel and fault security. However, several practical attacks are not yet covered by these models.  ...  In other words, tiled (tessellated ) designs offer security guarantees even against advanced probe and fault adversaries.  ...  Acknowledgements We thank François-Xavier Standaert and Gaëtan Cassiers for the interesting discussions. Siemen Dhooghe is supported by a PhD Fellowship from the Research Foundation -Flanders (FWO).  ... 
dblp:journals/iacr/DhoogheN20 fatcat:b56ppbxdfza6pcm7r5zrowe2pq
« Previous Showing results 1 — 15 out of 6,117 results