By Topic

High-Assurance Systems Engineering (HASE), 2010 IEEE 12th International Symposium on

Date 3-4 Nov. 2010

Filter Results

Displaying Results 1 - 25 of 35
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1041 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (260 KB)
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Plenary Panel

    Publication Year: 2010, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Low-Cost Secret-Sharing in Sensor Networks

    Publication Year: 2010, Page(s):1 - 9
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EBAWA: Efficient Byzantine Agreement for Wide-Area Networks

    Publication Year: 2010, Page(s):10 - 19
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (678 KB) | HTML iconHTML

    The popularity of wide-area computer services has generated a compelling need for efficient algorithms that provide high reliability. Byzantine fault-tolerant (BFT) algorithms can be used with this purpose because they allow replicated systems to continue to provide a correct service even when some of their replicas fail arbitrarily, either accidentally or due to malicious faults. Current BFT algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Fualt Detection for FPGAs

    Publication Year: 2010, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    Field Programmable Gate Arrays (FPGA) offer many advantages to the designers of systems including high predictability in terms of resource usage and the ability to process certain (parallel) functions and data streams efficiently and quickly. To date an impediment against the use of FPGA in safety critical domains is a lack of appropriate fault tolerance techniques. This has resulted in them being... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Faults in High Assurance Software

    Publication Year: 2010, Page(s):26 - 34
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Reducing the number of latent software defects is a development goal that is particularly applicable to high assurance software systems. For such systems, the software measurement and defect data is highly skewed toward the not-fault-prone program modules, i.e., the number of fault-prone modules is relatively very small. The skewed data problem, also known as class imbalance, poses a unique challe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A UML-Based Domain Specific Modeling Language for the Availability Management Framework

    Publication Year: 2010, Page(s):35 - 44
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    The Service Availability Forum (SA Forum) is a consortium of several telecommunications and computing companies that defines standard solutions for high availability platforms. One of the most important SA Forum services is the Availability Management Framework (AMF) which is responsible for managing the availability of an application running under its control. To achieve this, AMF requires a comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic Representation Techniques in Dynamic Reliability Evaluation

    Publication Year: 2010, Page(s):45 - 53
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    The increasing demand of quality presses towards more specific requirements, tighter constraints, and higher standards. It is thus necessary to provide new paradigms, techniques, and tools to adequately model and evaluate complex systems. This paper mainly focuses on reliability aspects, also taking into account dynamic-dependent interactions among components. Starting from the conservation of rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Stateful Approach to Testing Monitors in Multithreaded Programs

    Publication Year: 2010, Page(s):54 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    A monitor is a commonly used synchronization construct in multithreaded programs. Ensuring the correctness of each monitor in a multithreaded program is a critical step towards ensuring the correctness of the entire program. A monitor's correctness can be checked by executing two or more test threads that call the monitor's methods. Reach ability testing can be used to automatically exercise every... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dataflow Testing Approach for Aspect-Oriented Programs

    Publication Year: 2010, Page(s):64 - 73
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Dataflow testing of programs ensures the execution of data dependencies between locations in the code (1) where variables are assigned values, and (2) where these definitions are used. Such data dependencies are called Def-Use Associations (DUAs). In an aspect-oriented (AO) program, aspects and classes interact in several ways, such as (1) through parameters passed from advised methods in a class ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paths to Property Violation: A Structural Approach for Analyzing Counter-Examples

    Publication Year: 2010, Page(s):74 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1261 KB) | HTML iconHTML

    At Airbus, flight control software is developed using SCADE formal models, from which 90% of the code can be generated. Having a formal design leaves open the possibility of introducing model checking techniques. But, from our analysis of cases extracted from real software, a key issue concerns the exploitation of counterexamples showing property violation. Understanding the causes of the violatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Petri Nets with General One-Shot Transitions for Dependability Evaluation of Fluid Critical Infrastructures

    Publication Year: 2010, Page(s):84 - 93
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    A hybrid Petri net formalism that is specifically tailored towards so-called fluid critical infrastructures is introduced, allowing for timed, generally distributed and fluid transitions. Such models are analyzed with Parametric Reachability Analysis, by separating the deterministic and the stochastic evolution of the system. Several performance metrics, such as the distribution of fluid over time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking

    Publication Year: 2010, Page(s):94 - 103
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    We use the probabilistic model checker PRISM to formally model and analyze the highly publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an internet-wide, hierarchical naming system used to translate domain names such as google.com into physical IP addresses such as 208.77.188.166. The Kaminsky DNS attack is a recently discovered vulnerability in DNS that allows an intrude... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with Model-Based User-Centered Risk Assessment for Service Robots

    Publication Year: 2010, Page(s):104 - 113
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1437 KB) | HTML iconHTML

    Safety is now a major concern in many computer based systems and more particularly for autonomous systems such as service robots in physical contact with humans. The traditional approach to analyze the safety of such systems is to use risk assessment methods based on models of system structure, or system behavior. Unfortunately, such models are hard to produce for autonomous systems. We propose an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proved Metamodels as Backbone for Software Adaptation

    Publication Year: 2010, Page(s):114 - 121
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    In this paper we demonstrate the error-prone status of the UML 2.3 metamodel relating to state machines. We consequently provide a corrected version based on formal proofs written and processed with the help of the Coq system prover. The purpose of the proposed research is to support dynamical adaptation by means of models at runtime. Software components are internally endowed with complex state m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering Abstract Components for Model-Based Development and Verification of Embedded Software

    Publication Year: 2010, Page(s):122 - 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (510 KB) | HTML iconHTML

    Model-driven development (MDD) and verification approaches are highly desirable in the development of (safety-critical) embedded systems, since they help to identify functional or non-functional issues from the early development stage when verification complexity is relatively lower than that of the implemented systems. Nevertheless, MDD approaches have not been widely adopted in practice mainly d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.