scholarly journals Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems

2012 ◽  
Author(s):  
Joseph. R. Ruthruff ◽  
Robert C. Armstrong ◽  
Benjamin Garry Davis ◽  
Jackson R. Mayo ◽  
Ratish J. Punnoose
2016 ◽  
Vol 12 (1) ◽  
pp. 49-68 ◽  
Author(s):  
Christian Esposito ◽  
Massimo Ficco

The demand to access to a large volume of data, distributed across hundreds or thousands of machines, has opened new opportunities in commerce, science, and computing applications. MapReduce is a paradigm that offers a programming model and an associated implementation for processing massive datasets in a parallel fashion, by using non-dedicated distributed computing hardware. It has been successfully adopted in several academic and industrial projects for Big Data Analytics. However, since such analytics is increasingly demanded within the context of mission-critical applications, security and reliability in MapReduce frameworks are strongly required in order to manage sensible information, and to obtain the right answer at the right time. In this paper, the authors present the main implementation of the MapReduce programming paradigm, provided by Apache with the name of Hadoop. They illustrate the security and reliability concerns in the context of a large-scale data processing infrastructure. They review the available solutions, and their limitations to support security and reliability within the context MapReduce frameworks. The authors conclude by describing the undergoing evolution of such solutions, and the possible issues for improvements, which could be challenging research opportunities for academic researchers.


2020 ◽  
Vol 120 (7) ◽  
pp. 1383-1400
Author(s):  
Domenico Raucci ◽  
Antonella Santone ◽  
Francesco Mercaldo ◽  
Tomasz Dyczkowski

PurposeThis paper investigates the criteria for a selective integration, in the multidisciplinary business process management (BPM) areas, between information technologies tools and the company's internal control systems (ICSs) aimed at directing organizational behaviours. Adopting a process-based perspective, the authors propose a formal methodology to increase ICSs aims, related to the segregation of duties (SoDs) models, efficiently and effectively.Design/methodology/approachThe authors examine the applicability of formal verifications to validate a banking process of providing investment services, which is mapped through the workflow management system. To mitigate the state explosion problem of formal methods, the authors propose an efficient methodology that has been proved on the SoDs models in the bank ICSs, as a case study.FindingsThe authors’ investigations suggest that in the BPM domain, the banking ICSs aims can benefit from the aforesaid methodologies, originating from the formal methods area, to increase the reliability and correctness in the design, modelling and implementation of the SoDs models.Originality/valueThe proposed methodology is quite general and can be efficiently applied to large-scale systems in different business contexts or areas of the BPM. Its application to the bank's SoD prevents or detects significant weaknesses, operational risks, excessive risk appetite and other undesirable behaviours in the investment services provision processes. This guarantees that the investment ordered/offered is “suitable and appropriate” with the client's risk profile, especially non-professional, required by the MiFID II Directive.


2011 ◽  
Vol 90-93 ◽  
pp. 3005-3009
Author(s):  
Jian Jun Hu ◽  
Chun Hua Sun ◽  
Cheng Ying Qi ◽  
Hua Yang ◽  
Zhi Ming Zhao

In heat source ability sufficient situation, some phenomenon occurred in some central heat supply system, such as uneven heating, serious disorders, the far-end heating reliability was insufficient. To improve the heating security and reliability, this article carries on an investigation test, problem analysis, Clears the crux of the problem, Proposes the corresponding transformation plan, and carries on the effective analysis of the actual heating effect after transformation. The results show that after transformation, the actual heating network runs well, increases the heating area, improves the heating security and reliability, provide the reference for other large-scale pipe network energy conservation transformation.


2021 ◽  
Vol 3 (2) ◽  
pp. 107-117
Author(s):  
Joy Iong Zong Chen

The green communication and large-scale connection issues will be faced by the wireless communication networks with futuristic sixth generation (6G) technology. The radio-frequency (RF) and spectrum sources may be shared simultaneously to achieve optimal communication in these networks by means of backscatter devices (BD) that may function in constrained spectrums as well as the stringent energy scenarios of green Internet-of-things (IoT) by means of the proposed novel modified backscatter communication model (BCM). Unlicensed eavesdroppers may interfere with the BD due to its vulnerability caused by the wireless communication channels and their broadcasting nature. The intrusion of an unlicensed eavesdropper is detected in an efficient manner by means of the proposed BCM. The analytical derivations of intercept probability (IP) and outage probability (OP) are invoked to analyze the security and reliability of the proposed architecture. Under high main-to-eavesdropper ratio (MER) regime, the IP and under high signal-to-noise ratio (SNR) regime, the OP asymptotic behaviors are estimated additionally. Based on the results of performance evaluation, it is evident that there is a decrease in the security of BD with the increase in MER while there is a simultaneous increase in the legitimate user security. Various system parameters may be adjusted for optimizing the security and reliability performance trade-off. For diverse orders, the existence of error floors are indicated by the non-zero fixed constant of BD and the legitimate user’s OP when high SNR value is observed at the system.


Author(s):  
Aristides Dasso ◽  
Ana Funes

Questions such as what are formal methods, how are formal methods implemented, how are they used in software engineering, and when should they be used, among other related questions are the main objective of this chapter. Some definitions are given to answer some of these questions; the chapter also states the aims of FM as well as giving their main characteristics. An example that shows how formal methods can be used for specifying not only software requirements but also the rest of the stages in a software development process is given. A discussion about when they should be used, explaining the reasons why they should be applied when security and reliability are important requirements of the software under development, is presented. Finally, some arguments about how they can also be used as a complement to traditional development methods are provided.


ITNOW ◽  
2013 ◽  
Vol 55 (2) ◽  
pp. 52-53 ◽  
Author(s):  
S. U. R. Malik ◽  
S. U. Khan

Author(s):  
Aristides Dasso ◽  
Ana Funes

Questions such as what are Formal Methods, how are Formal Methods implemented, how are they used in Software Engineering and when should they be used, among other related questions, are the main objective of this article. Some definitions are given to answer some of these questions; the article also states the aims of FM as well as it gives their main characteristics. An example that shows how Formal Methods can be used for specifying not only software requirements but also the rest of the stages in a software development process is given. A discussion about when they should be used, explaining the reasons why they should be applied when security and reliability are important requirements of the software under development, is presented. Finally, some arguments about how they can also be used as a complement to traditional development methods are provided.


1999 ◽  
Vol 173 ◽  
pp. 243-248
Author(s):  
D. Kubáček ◽  
A. Galád ◽  
A. Pravda

AbstractUnusual short-period comet 29P/Schwassmann-Wachmann 1 inspired many observers to explain its unpredictable outbursts. In this paper large scale structures and features from the inner part of the coma in time periods around outbursts are studied. CCD images were taken at Whipple Observatory, Mt. Hopkins, in 1989 and at Astronomical Observatory, Modra, from 1995 to 1998. Photographic plates of the comet were taken at Harvard College Observatory, Oak Ridge, from 1974 to 1982. The latter were digitized at first to apply the same techniques of image processing for optimizing the visibility of features in the coma during outbursts. Outbursts and coma structures show various shapes.


Sign in / Sign up

Export Citation Format

Share Document