Virtualizing mixed-criticality systems: A survey on industrial trends and issues

M Cinque, D Cotroneo, L De Simone… - Future Generation …, 2022 - Elsevier
Virtualization is gaining attraction in the industry as it promises a flexible way to integrate,
manage, and re-use heterogeneous software components with mixed-criticality levels, on a …

[HTML][HTML] Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform

D Cotroneo, L De Simone, P Liguori… - Journal of Systems and …, 2023 - Elsevier
Cloud computing systems fail in complex and unforeseen ways due to unexpected
combinations of events and interactions among hardware and software components. These …

Automated patching for unreproducible builds

Z Ren, S Sun, J Xuan, X Li, Z Zhou… - Proceedings of the 44th …, 2022 - dl.acm.org
Software reproducibility plays an essential role in establishing trust between source code
and the built artifacts, by comparing compilation outputs acquired from independent users …

An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles

S Gupta, C Maple, R Passerone - IEEE Access, 2023 - ieeexplore.ieee.org
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …

Fault injection to generate failure data for failure prediction: A case study

JR Campos, E Costa - 2020 IEEE 31st International …, 2020 - ieeexplore.ieee.org
Due to the complexity of modern software, identifying every fault before deployment is
extremely difficult or even not possible. Such residual faults can ultimately lead to failures …

[PDF][PDF] Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems.

G Xiao, J Liu, Z Zheng, Y Sui - ISSRE, 2021 - guanpingxiao.github.io
• For reproducibility and stability purposes of using DL systems, it is expected that DL
systems can have a deterministic behavior in identical training runs: under a fixed software …

A Survey of Security Mechanisms for Edge Computing based Connected Autonomous Vehicles

S Gupta, C Maple - Authorea Preprints, 2023 - techrxiv.org
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …

Performability assessment of containerized multi-tenant IMS through multidimensional UGF

L De Simone, M Di Mauro, M Longo… - … on Network and …, 2022 - ieeexplore.ieee.org
We advance a performability assessment of a multi-tenant containerized IP Multimedia
Subsystem (cIMS), ie: one and the same infrastructure is shared among different providers …

Certify the uncertified: Towards assessment of virtualization for mixed-criticality in the automotive domain

M Cinque, L De Simone… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
Nowadays, a feature-rich automotive vehicle offers several technologies to assist the driver
during his trip and guarantee an amusing infotainment system to the other passengers, too …

A next-generation platform for Cyber Range-as-a-Service

V Orbinato - 2021 IEEE International Symposium on Software …, 2021 - ieeexplore.ieee.org
In the last years, Cyber Ranges have become a widespread solution to train professionals
for responding to cyber-threats and attacks. Cloud computing plays a key role in this context …