Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1909626guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
HASE '10: Proceedings of the 2010 IEEE 12th International Symposium on High-Assurance Systems Engineering
2010 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
November 3 - 4, 2010
ISBN:
978-0-7695-4292-8
Published:
03 November 2010

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Cover Art
Article
Article
Article
Article
Article
Low-Cost Secret-Sharing in Sensor Networks

Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is ...

Article
EBAWA: Efficient Byzantine Agreement for Wide-Area Networks

The popularity of wide-area computer services has generated a compelling need for efficient algorithms that provide high reliability. Byzantine fault-tolerant (BFT) algorithms can be used with this purpose because they allow replicated systems to ...

Article
Scalable Fualt Detection for FPGAs

Field Programmable Gate Arrays (FPGA) offer many advantages to the designers of systems including high predictability in terms of resource usage and the ability to process certain (parallel) functions and data streams efficiently and quickly. To date an ...

Article
Predicting Faults in High Assurance Software

Reducing the number of latent software defects is a development goal that is particularly applicable to high assurance software systems. For such systems, the software measurement and defect data is highly skewed toward the not-fault-prone program ...

Article
A UML-Based Domain Specific Modeling Language for the Availability Management Framework

The Service Availability Forum (SA Forum) is a consortium of several telecommunications and computing companies that defines standard solutions for high availability platforms. One of the most important SA Forum services is the Availability Management ...

Article
Symbolic Representation Techniques in Dynamic Reliability Evaluation

The increasing demand of quality presses towards more specific requirements, tighter constraints, and higher standards. It is thus necessary to provide new paradigms, techniques, and tools to adequately model and evaluate complex systems. This paper ...

Article
A Stateful Approach to Testing Monitors in Multithreaded Programs

A monitor is a commonly used synchronization construct in multithreaded programs. Ensuring the correctness of each monitor in a multithreaded program is a critical step towards ensuring the correctness of the entire program. A monitor’s correctness can ...

Article
A Dataflow Testing Approach for Aspect-Oriented Programs

Dataflow testing of programs ensures the execution of data dependencies between locations in the code (1) where variables are assigned values, and (2) where these definitions are used. Such data dependencies are called Def-Use Associations (DUAs). In an ...

Article
Paths to Property Violation: A Structural Approach for Analyzing Counter-Examples

At Airbus, flight control software is developed using SCADE formal models, from which 90% of the code can be generated. Having a formal design leaves open the possibility of introducing model checking techniques. But, from our analysis of cases ...

Article
Hybrid Petri Nets with General One-Shot Transitions for Dependability Evaluation of Fluid Critical Infrastructures

A hybrid Petri net formalism that is specifically tailored towards so-called fluid critical infrastructures is introduced, allowing for timed, generally distributed and fluid transitions. Such models are analyzed with Parametric Reachability Analysis, ...

Article
Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking

We use the probabilistic model checker PRISM to formally model and analyze the highly publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an internet-wide, hierarchical naming system used to translate domain names such as ...

Article
Experience with Model-Based User-Centered Risk Assessment for Service Robots

Safety is now a major concern in many computer based systems and more particularly for autonomous systems such as service robots in physical contact with humans. The traditional approach to analyze the safety of such systems is to use risk assessment ...

Article
Proved Metamodels as Backbone for Software Adaptation

In this paper we demonstrate the error-prone status of the UML 2.3 metamodel relating to state machines. We consequently provide a corrected version based on formal proofs written and processed with the help of the Coq system prover. The purpose of the ...

Article
Reverse Engineering Abstract Components for Model-Based Development and Verification of Embedded Software

Model-driven development (MDD) and verification approaches are highly desirable in the development of (safety-critical) embedded systems, since they help to identify functional or non-functional issues from the early development stage when verification ...

Article
A Framework for Qualitative and Quantitative Formal Model-Based Safety Analysis

In model-based safety analysis both qualitative aspects i.e. what must go wrong for a system failure) and quantitative aspects (i.e. how probable is a system failure) are very important. For both aspects methods and tools are available. However, until ...

Article
Domain-Specific Feature Modeling for High Integrity Vehicle Control System Functional Design

Vehicle control system development is a complex process, involving multiple stages and multiple groups in different disciplines. Constructing a high-integrity configuration for a product with a large number of control functions is very challenging in ...

Article
Evaluation and Comparisons of Dependable Distributed Storage Designs for Clouds

Many research and development efforts have been devoted towards the design of dependable storage systems, but the effort in evaluating and comparing different designs for widely distributed environment is limited. In this paper, we develop models to ...

Article
Enhancing Performance of Random Testing through Markov Chain Monte Carlo Methods

The drawback of classical software random testing is low efficiency to find failure-causing inputs, because it requires a large number of test cases compared to a family of partition testing. This paper proposes a software random testing scheme based on ...

Article
Architecture-Based Reliability Modeling of Web Services Using Petri Nets

Reliability of web applications depends on reliability of the application itself as well as the underlying application server, external and internal services. Many research works have been conducted on reliability modeling of service-based software, ...

Article
Automatic Fault Behavior Detection and Modeling by a State-Based Specification Method

Safety assessment methods are typically based on the reliability of the single components making a system. A different notion of safety as an emergent property of the system taken as a whole is however emerging. The current state-based modeling paradigm ...

Article
Automated Testing of LTL Formula Generation by Prospec

The Prospec software tool facilitates the construction of formal specifications in LTL by automating Dwyer’s Specification Pattern System as extended by Mondragon and Salamah. The LTL generation has been verified through the automated creation of a ...

Article
A Dependability Case Editor with Pattern Library

This abstract discusses our current work on the collection of patterns of dependability cases for a software/system lifecycle. We also describe a prototype implementation of a dependability case editor called, which has a pattern selection function.

Article
Author Index

Recommendations