[图书][B] Performance, reliability, and availability evaluation of computational systems, volume I: performance and background
PRM Maciel - 2023 - taylorfrancis.com
This textbook intends to be a comprehensive and substantially self-contained two-volume
book covering performance, reliability, and availability evaluation subjects. The volumes …
book covering performance, reliability, and availability evaluation subjects. The volumes …
Fault injection analytics: A novel approach to discover failure modes in cloud-computing systems
Cloud computing systems fail in complex and unexpected ways due to unexpected
combinations of events and interactions between hardware and software components. Fault …
combinations of events and interactions between hardware and software components. Fault …
Enhancing the analysis of software failures in cloud computing systems with deep learning
Identifying the failure modes of cloud computing systems is a difficult and time-consuming
task, due to the growing complexity of such systems, and the large volume and noisiness of …
task, due to the growing complexity of such systems, and the large volume and noisiness of …
[PDF][PDF] Adversarial Reachability for Program-level Security Analysis.
Many program analysis tools and techniques have been developed to assess program
vulnerability. Yet, they are based on the standard concept of reachability and represent an …
vulnerability. Yet, they are based on the standard concept of reachability and represent an …
Thorfi: a novel approach for network fault injection as a service
In this work, we present a novel fault injection solution (ThorFI) for virtual networks in cloud
computing infrastructures. ThorFI is designed to provide non-intrusive fault injection …
computing infrastructures. ThorFI is designed to provide non-intrusive fault injection …
[HTML][HTML] Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform
Cloud computing systems fail in complex and unforeseen ways due to unexpected
combinations of events and interactions among hardware and software components. These …
combinations of events and interactions among hardware and software components. These …
[HTML][HTML] Tailored mutation-based software fault injection tool (IM-FIT)
U Yayan, C Baglum - SoftwareX, 2023 - Elsevier
Abstract The “Tailored Mutation-based Software Fault Injection Tool (IM-FIT)” is a versatile
tool developed for evaluating the robustness of safety-critical system software, specifically …
tool developed for evaluating the robustness of safety-critical system software, specifically …
Maximizing error injection realism for chaos engineering with system calls
In this article, we present a novel fault injection framework for system call invocation errors,
called Phoebe. Phoebe is unique as follows; First, Phoebe enables developers to have full …
called Phoebe. Phoebe is unique as follows; First, Phoebe enables developers to have full …
Mitigating virtualization failures through migration to a co-located hypervisor
Many organizations are moving their systems to the cloud, where providers consolidate
multiple clients using virtualization, which creates challenges to business-critical …
multiple clients using virtualization, which creates challenges to business-critical …
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities
G Lacombe, D Feliot, E Boespflug, ML Potet - Journal of Cryptographic …, 2024 - Springer
Certification through auditing allows to ensure that critical embedded systems are secure.
This entails reviewing their critical components and checking for dangerous execution paths …
This entails reviewing their critical components and checking for dangerous execution paths …