35 results on '"Marcello Cinque"'
Search Results
2. Virtualizing mixed-criticality systems: A survey on industrial trends and issues
- Author
-
Marcello Cinque, Domenico Cotroneo, Luigi De Simone, Stefano Rosiello, Cinque, M., Cotroneo, D., De Simone, L., and Rosiello, S.
- Subjects
FOS: Computer and information sciences ,Mixed-criticality system ,Operating Systems (cs.OS) ,Computer Networks and Communications ,Real-time application ,Dependability ,Software Engineering (cs.SE) ,Safety certification ,Computer Science - Software Engineering ,Computer Science - Operating Systems ,Virtualization ,Hardware and Architecture ,Software ,Resource isolation - Abstract
Virtualization is gaining attraction in the industry as it promises a flexible way to integrate, manage, and re-use heterogeneous software components with mixed-criticality levels, on a shared hardware platform, while obtaining isolation guarantees. This work surveys the state-of-the-practice of real-time virtualization technologies by discussing common issues in the industry. In particular, we analyze how different virtualization approaches and solutions can impact isolation guarantees and testing/certification activities, and how they deal with dependability challenges. The aim is to highlight current industry trends and support industrial practitioners to choose the most suitable solution according to their application domains., Accepted for publication in Elsevier Future Generation Computer Systems
- Published
- 2022
- Full Text
- View/download PDF
3. An empirical analysis of error propagation in critical software systems
- Author
-
Marcello Cinque, Raffaele Della Corte, Antonio Pecchia, Cinque, Marcello, Della Corte, Raffaele, and Pecchia, Antonio
- Subjects
Propagation of uncertainty ,Computer science ,020207 software engineering ,02 engineering and technology ,Tracing ,Domain (software engineering) ,Variety (cybernetics) ,Variable (computer science) ,Computer engineering ,0202 electrical engineering, electronic engineering, information engineering ,Software system ,Error detection and correction ,Visibility ,Software - Abstract
Error propagation analysis is a consolidated practice to gain insights into error modes and effects that pertain to the activation of faults in software systems. A variety of approaches, such as architecture-based, source code instrumentation and variable tracing, have been proposed so far to address software error propagation analysis. Although valuable, existing approaches entail a substantial degree of system internals’ knowledge, visibility and code manipulation that is not well-suited for real-life production environments. This paper proposes an empirical analysis of error propagation. We specifically address the challenges in using fault data and error events in the logs, which are a convenient byproduct of the system’s execution. The approach puts forth the construction of error reporting graphs. We apply the approach to 2,042 failure data points from two real-world critical systems from the Air Traffic Control domain by a top industry provider. The approach contributes to develop a deep understanding on error modes and propagation paths, which can be leveraged by practitioners to make informed decisions on the placement of error detection mechanisms.
- Published
- 2020
- Full Text
- View/download PDF
4. Enabling memory access isolation in real-time cloud systems using Intel’s detection/regulation capabilities
- Author
-
Giorgio Farina, Gautam Gala, Marcello Cinque, and Gerhard Fohler
- Subjects
Hardware and Architecture ,Software - Published
- 2023
- Full Text
- View/download PDF
5. Linux page fault analysis in android systems
- Author
-
Paolo Amato, Graziano Mirichigni, Luca Porzio, Danilo Caraccio, Marcello Cinque, A. Orlando, R. Izzi, Cinque, M., Orlando, A., Amato, P., Caraccio, D., Izzi, R., Mirichigni, G., and Porzio, L.
- Subjects
Page fault ,Computer Networks and Communications ,business.industry ,Computer science ,Linux ,020208 electrical & electronic engineering ,Storage ,02 engineering and technology ,Tracing ,computer.software_genre ,Mobile ,020202 computer hardware & architecture ,User experience design ,Android ,Artificial Intelligence ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,Android (operating system) ,business ,computer ,Software - Abstract
In modern smartphones, system performances are tightly related to a variety of underlying subsystems. In particular, internal storage, along the years, has become crucial because it is extensively used to access content relevant to the system and, finally, to the end user. To understand its role in a commercial Android smartphone and to evaluate its effects on the User experience, within the context of a real usage, we analyzed Linux page fault handling, a critical mechanism that puts pressure on storage devices and may cause system inefficiencies. A kernel tracing technique has been conceived for real-time measurement of Android applications and services on commercial smartphones. The experimental results presented in this work are derived from the use of this kernel tracing on a 64-bit Android smartphone, equipped with a ufs storage subsystem. The main subject of the study is major page fault handling, a kernel mechanism behind many end-user actions recognized at industry level as source of possible performance deterioration in a smartphone. The analysis shows that major page fault handling is dominated by read accesses to ufs (between 30% and 40% of the total time), and that the related storage traffic is significantly affected by the ReadAhead mechanism, which is not always efficient.
- Published
- 2019
- Full Text
- View/download PDF
6. Cloud Reliability: Possible Sources of Security and Legal Issues?
- Author
-
Stefano Russo, Kim-Kwang Raymond Choo, Marcello Cinque, Frederica Free-Nelson, Christian Esposito, Charles A. Kamhoua, Cinque, Marcello, Russo, Stefano, Esposito, Christiancarmine, Raymond Choo, Kim-Kwang, Free-Nelson, Frederica, and Kamhoua, Charles A.
- Subjects
Industry 4.0 ,Computer Networks and Communications ,business.industry ,Computer science ,Software as a service ,media_common.quotation_subject ,020206 networking & telecommunications ,020207 software engineering ,Cloud computing ,Provisioning ,02 engineering and technology ,Service provider ,Computer security ,computer.software_genre ,Computer Science Applications ,Service-level agreement ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Cloud computing, Fault tolerance, Fault tolerant systems, Law, Computational modeling, Resilience ,business ,Resilience (network) ,computer ,Software ,Reputation ,media_common - Abstract
Cloud computing is a key supporting technology driving the fourth industrial revolution, spanning from the Internet of Things (IoT) and Cloud for Telecoms (C4T) to Industry 4.0 to Smart Cities, and so on. This pervasiveness of cloud technology is due to the ability to easily share and obtain resources on a pay-per-use and elastic provisioning model. Several enterprises use the cloud as a cheap solution to the achieve computational and storage capabilities they need without incurring the costs associated with owning and maintaining data centers. This implies that they rely on the correctness of the services provided by the cloud platforms and that any possible outage could result in considerable loss of reputation and money, which could effectively bring actions against the cloud service provider for violations to the agreed upon Service Level Agreement (SLA).
- Published
- 2018
- Full Text
- View/download PDF
7. FUSION—Fog Computing and Blockchain for Trusted Industrial Internet of Things
- Author
-
Carlo Giannelli, Christian Esposito, Marcello Cinque, Andrea Ceccarelli, Paolo Lollini, Luca Foschini, Ceccarelli, Andrea, Cinque, Marcello, Esposito, Christian, Foschini, Luca, Giannelli, Carlo, and Lollini, Paolo
- Subjects
Blockchain ,Computer science ,Strategy and Management ,Internet of Things ,Computer security ,computer.software_genre ,Maintenance engineering ,NO ,0502 economics and business ,Cloud computing ,Orchestration (computing) ,Electrical and Electronic Engineering ,Architecture ,Internet of Things, Cloud computing, Industries, Maintenance engineering, Software, Blockchain, fog/edge computing, Industrial Internet of Things (IIoT) ,Focus (computing) ,05 social sciences ,Industrial Internet of Things (IIoT) ,Container (abstract data type) ,Industrial Internet ,fog/edge computing ,Software architecture ,Software-defined networking ,computer ,Industries ,050203 business & management ,Software - Abstract
The industrial Internet of Things (IIoT) is currently foreseen as a foundation to implement the Industry 4.0 vision. However, device heterogeneity and the need of integration and configuration exposes the industrial infrastructure to potential threats, such as black-hole, man-in-the-middle, and malicious configuration attacks. In this article, we investigate how to manage distributed trust information and to enable trusted configuration actions in the IIoT, by opportunistically intermingling blockchain with the software defined networking and container orchestration technologies. In particular, we focus on how the joint and coordinated adoption of such technologies can make technicians’ interventions on industrial equipment both easier and more trusted. To this purpose, we present the design of a software architecture to simplify the management, configuration, and assessment of IIoT systems, and we discuss our experiences with the application of the proposed architecture in a railways use case.
- Published
- 2020
8. Discovering process models for the analysis of application failures under uncertainty of event logs
- Author
-
Marcello Cinque, Yu Ma, Ingo Weber, Antonio Pecchia, Pecchia, Antonio, Weber, Ingo, Cinque, Marcello, and Ma, Yu
- Subjects
Information Systems and Management ,Process modeling ,Event (computing) ,business.industry ,Computer science ,Knowledge engineering ,Application logs, Process discovery, Conformance checking, Uncertainty, Failure detection ,Process mining ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Conformance checking ,Management Information Systems ,Business process management ,Artificial Intelligence ,020204 information systems ,Middleware ,Server ,Middleware (distributed applications) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,business ,computer ,Software - Abstract
Computer applications, such as servers, databases and middleware, ubiquitously emit execution traces stored in log files. The use of logs for the analysis of application failures is known since the early days of computers. Field data studies have shown that application logs are fraught with uncertainty, i.e., missing or noisy events in the logs. A body of research that has dealt successfully with uncertainty in event logs is process mining from the business process management community, specifically by discovering process models. The literature has shown the value of process mining across several domains, but as yet there is no study that quantifies possible improvements from using process models, and the impact of uncertainty in the context of application failures. This work addresses the use of process mining for detecting failures from application logs. First, process models are discovered from logs; then conformance checking is used to detect deviations from the models. We contribute to knowledge engineering research with a systematic measurement study that quantifies the failure detection capability of conformance checking in spite of missing events, and its accuracy with respect to process models obtained from noisy logs. Analysis is done with a dataset of 55,462 execution traces from three independent real-life applications. We obtain a mixed answer depending on the application under test; our measurements provide insights into the use of process mining for failure analysis.
- Published
- 2020
9. Contextual filtering and prioritization of computer application logs for security situational awareness
- Author
-
Marcello Cinque, Antonio Pecchia, Raffaele Della Corte, Cinque, M., Della Corte, R., and Pecchia, A.
- Subjects
Prioritization ,Situation awareness ,Computer Networks and Communications ,Event (computing) ,Computer science ,Critical computer system ,Conceptual clustering ,020206 networking & telecommunications ,02 engineering and technology ,Air traffic control ,Data science ,Security information and event management ,Situational awareness ,Security Information and Event Management ,Hardware and Architecture ,Threat model ,0202 electrical engineering, electronic engineering, information engineering ,Domain knowledge ,Event log ,020201 artificial intelligence & image processing ,Precision and recall ,Filtering ,Software - Abstract
Critical computer systems strongly rely on event logs to record the occurrence of normative and anomalous events occurring at runtime. In spite of the advances in Security Information and Event Management for handling monitoring data in production, event logs remain quite underutilized with respect to more conventional security data sources. Eliciting actionable knowledge for situational awareness poses many challenges in the case of logs emitted by industrial systems due to the lack of standard practices, formats and threat models. This paper addresses log analysis in a critical industrial system. We conduct our study with a real-life system by a top leading company in the Air Traffic Control domain, which emits massive volumes of unstructured proprietary logs. We propose a filtering method that pinpoints interesting events from logs, i.e., events that should be followed up by analysts. Experiments are done with logs from normative and misuse scenarios; moreover, we compare the outcome of our method with a reference filtering technique based on the conceptual clustering. Results indicate that the proposed method is effective to retain interesting events at remarkable precision and recall and to pinpoint misuse indicators. We overcome several drawbacks of existing filtering techniques, such as the need for labeled logs and domain knowledge, which makes our method easier to use by practitioners.
- Published
- 2020
10. A framework for on-line timing error detection in software systems
- Author
-
Antonio Pecchia, Raffaele Della Corte, Domenico Cotroneo, Marcello Cinque, Cinque, Marcello, Cotroneo, Domenico, Della Corte, Raffaele, and Pecchia, Antonio
- Subjects
Error detection ,Interleaving ,Computer science ,Computer Networks and Communications ,Real-time computing ,Critical information system ,On-line monitoring ,020206 networking & telecommunications ,02 engineering and technology ,System monitoring ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Overhead (computing) ,Timing error ,020201 artificial intelligence & image processing ,Event logging ,Software system ,Software - Abstract
On-line timing error detection entails gathering and analyzing monitoring data to pinpoint deviations from the expected timing behavior of a given software system. Current solutions for system monitoring and runtime analysis present several practical drawbacks that limit their usability in real industrial systems, such as the need of kernel-level probes or the coarse per-node/per-process monitoring granularity. This paper proposes a novel framework for timing error detection that capitalizes on the systematic interleaving of logging instructions across the functional code in order to overcome above limitations. The paper faces the practical challenges related to the specification and implementation of a log weaving technique, detection algorithms, and a data centralization platform to collect and analyze fine-grained execution traces in distributed systems. We experiment the proposed framework in two real-world critical information systems from the Crisis Management and the Air Traffic Control domains. Results show that our framework achieves 95% timing error coverage and allows reconstructing error trends with high statistical confidence at negligible performance overhead.
- Published
- 2019
11. To Cloudify or Not to Cloudify : The Question for a Scientific Data Center
- Author
-
Domenico Cotroneo, Stefano Russo, Flavio Frattini, and Marcello Cinque
- Subjects
020203 distributed computing ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Fault tolerance ,Failure rate ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Computer Science Applications ,Risk analysis (engineering) ,Hardware and Architecture ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,Batch processing ,Dependability ,020201 artificial intelligence & image processing ,Data center ,Duration (project management) ,business ,computer ,Software ,Information Systems - Abstract
The idea of turning data centers executing scientific batch jobs into private clouds is as attractive as troubling. Cloud platforms may help both in limiting power consumption and in implementing fault tolerance strategies. However, there is also the fear that performance may worsen, and that the electricity required for longer job duration and fault tolerance implementation may overcome the saved one. In this paper, we present the consumability analysis for assessing the impact of cloud and fault tolerance tunings on scientific processing systems. The analysis considers performance, consumption, and dependability aspects, jointly. The aim is to pinpoint if, for a given system, there is a setting where consumption and job failure rate decrease, while performance is not affected. Applied to the scientific data center at our University, the analysis allowed us to find the proper selection of virtual machines’ configuration, consolidation strategy, and fault tolerance tuning.
- Published
- 2016
- Full Text
- View/download PDF
12. How to Assess the Dependability of Applications on Top of the Blockchain: Novel Research Challenges
- Author
-
Christian Esposito, Marcello Cinque, Cinque, M., and Esposito, C.
- Subjects
021110 strategic, defence & security studies ,Cryptocurrency ,Blockchain ,Computer science ,business.industry ,0211 other engineering and technologies ,Fault tolerance ,02 engineering and technology ,Dependability ,Domain (software engineering) ,Fault-tolerance ,Software ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Peer to peer computing ,Software engineering ,business - Abstract
It is nowadays extremely popular to devise applications of top of the blockchain technology, due to the flourishing of several open-source platforms and the progressive success of this technology outside its traditional cryptocurrency domain. Testing these applications is particularly challenging and traditionally limited to the performance and functionality verification. How-ever, the progressive adoption of such a technology in critical domains is calling for dependability guarantees. This paper highlights the challenges related to the dependability assessment of these applications, and sketches a possible research direction.
- Published
- 2018
13. Heuristic strategies for assessing wireless sensor network resiliency: an event-based formal approach
- Author
-
Giuseppe De Pietro, Antonio Coronato, Marcello Cinque, Juan Carlos Augusto, Alessandro Testa, Testa, Alessandro, Cinque, Marcello, Coronato, Antonio, De Pietro, Giuseppe, and Augusto, Juan Carlos
- Subjects
Control and Optimization ,Computer Networks and Communications ,Computer science ,Wireless sensor networks, Heuristic, Resiliency, Formal language, Robustness checking ,Distributed computing ,Event based ,Heuristic ,Management Science and Operations Research ,Wireless sensor networks ,Robustness checking ,Artificial Intelligence ,Software deployment ,Robustness (computer science) ,Formal language ,Resiliency ,Data delivery ,Heuristics ,Event calculus ,Wireless sensor network ,Software ,Information Systems - Abstract
Wireless sensor networks (WSNs) are increasingly being adopted in critical applications. In these networks undesired events may undermine the reliability level; thus their effects need to be properly assessed from the early stages of the development process onwards to minimize the chances of unexpected problems during use. In this paper we propose two heuristic strategies: what-if analysis and robustness checking. They allow to drive designers towards optimal WSN deployment solutions, from the point of view of the connection and data delivery resiliency, exploiting a formal approach based on the event calculus formal language. The heuristics are backed up by a support tool aimed to simplify their adoption by system designers. The tool allows to specify the target WSN in a user-friendly way and it is able to elaborate the two heuristic strategies by means of the event calculus specifications automatically generated. The WSN reliability is assessed computing a set of specific metrics. The effectiveness of the strategies is shown in the context of three case studies. © 2014 Springer Science+Business Media New York.
- Published
- 2014
- Full Text
- View/download PDF
14. Event Logs for the Analysis of Software Failures: A Rule-Based Approach
- Author
-
Domenico Cotroneo, Antonio Pecchia, Marcello Cinque, Cinque, Marcello, Cotroneo, Domenico, and Pecchia, Antonio
- Subjects
Source code ,Failure Analysi ,Computer science ,Event (computing) ,business.industry ,media_common.quotation_subject ,Rule-based system ,Reliability ,computer.software_genre ,Reliability engineering ,Software Failures ,Software ,Unified Modeling Language ,Software fault tolerance ,Systems design ,Software system ,Data mining ,business ,computer ,media_common ,computer.programming_language - Abstract
Event logs have been widely used over the last three decades to analyze the failure behavior of a variety of systems. Nevertheless, the implementation of the logging mechanism lacks a systematic approach and collected logs are often inaccurate at reporting software failures: This is a threat to the validity of log-based failure analysis. This paper analyzes the limitations of current logging mechanisms and proposes a rule-based approach to make logs effective to analyze software failures. The approach leverages artifacts produced at system design time and puts forth a set of rules to formalize the placement of the logging instructions within the source code. The validity of the approach, with respect to traditional logging mechanisms, is shown by means of around 12,500 software fault injection experiments into real-world systems.
- Published
- 2013
- Full Text
- View/download PDF
15. GAMESH: A grid architecture for scalable monitoring and enhanced dependable job scheduling
- Author
-
Paolo Bellavista, Luca Foschini, Flavio Frattini, Marcello Cinque, Antonio Corradi, Javier Povedano-Molina, Bellavista, Paolo, Cinque, Marcello, Corradi, Antonio, Foschini, Luca, Frattini, Flavio, Povedano Molina, Javier, and Povedano-Molina, Javier
- Subjects
Job scheduler ,Monitoring ,Computer Networks and Communications ,Computer science ,Distributed computing ,02 engineering and technology ,Troubleshooting ,computer.software_genre ,Dependability ,DDS ,Scheduling (computing) ,0202 electrical engineering, electronic engineering, information engineering ,Grid ,Scheduling ,Scalability ,Fault tolerance ,020206 networking & telecommunications ,Grid computing ,Hardware and Architecture ,020201 artificial intelligence & image processing ,computer ,Software - Abstract
Grid computing is a largely adopted paradigm to federate geographically distributed data centers. Due to their size and complexity, grid systems are often affected by failures that may hinder the correct and timely execution of jobs, thus causing a non-negligible waste of computing resources. Despite the relevance of the problem, state-of-the-art management solutions for grid systems usually neglect the identification and handling of failures at runtime. Among the primary goals to be considered, we claim the need for novel approaches capable to achieve the objectives of scalable integration with efficient monitoring solutions and of fitting large and geographically distributed systems, where dynamic and configurable tradeoffs between overhead and targeted granularity are necessary. This paper proposes GAMESH, a Grid Architecture for scalable Monitoring and Enhanced dependable job ScHeduling. GAMESH is conceived as a completely distributed and highly efficient management infrastructure, concentrating on two crucial aspects for large-scale and multi-domain grid environments: (i) the scalable dissemination of monitoring data and (ii) the troubleshooting of job execution failures. GAMESH has been implemented and tested in a real deployment encompassing geographically distributed data centers across Europe. Experimental results show that GAMESH (i) enables the collection of measurements of both computing resources and conditions of task scheduling at geographically sparse sites, while imposing a limited overhead on the entire infrastructure, and (ii) provides a failure-aware scheduler able to improve the overall system performance, even in the presence of failures, by coordinating local job schedulers at multiple domains.
- Published
- 2017
16. On the injection of hardware faults in virtualized multicore systems
- Author
-
Marcello Cinque, Antonio Pecchia, Cinque, Marcello, and Pecchia, Antonio
- Subjects
Multi-core processor ,Computer Networks and Communications ,business.industry ,Computer science ,Hypervisor ,Context (language use) ,02 engineering and technology ,Fault injection ,computer.software_genre ,Virtualization ,020202 computer hardware & architecture ,Theoretical Computer Science ,Artificial Intelligence ,Hardware and Architecture ,020204 information systems ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Operating system ,Leverage (statistics) ,Dependability ,business ,computer ,Software ,Computer hardware - Abstract
Virtualized multicore systems represent an emerging computing paradigm in the critical systems industry. Virtualization-based solutions leverage the different cores of the processor to run operating systems and applications within separate partitions, to support the development of parallel mixed-criticality systems, and to improve fault-tolerance by protecting and isolating the operating environments. The critical systems industry is subjected to international standards, which recommend fault injection as a mean to contribute with evidence to safety cases. This paper proposes a framework to inject hardware faults in virtualized multicore systems. Our proposal capitalizes on the error reporting architecture of modern processors and allows injecting faults both at hypervisor- and guest-OS-level. We implement the framework in the context of the widely used Intel Core i7 processor and Xen hypervisor. We demonstrate the use of the framework by means of about 60,000 injection experiments in a Linux-based virtualized multicore system installation.
- Published
- 2017
17. AndroDepLog: A Tool to Enable Live Dependability Measurement of Android Devices
- Author
-
Marcello Cinque, Roberto Natella, Cinque, Marcello, and Natella, Roberto
- Subjects
Engineering ,Software ,business.industry ,Vendor ,Embedded system ,Short paper ,Dependability ,Software aging ,Android (operating system) ,business ,Usage data ,Humanoid robot - Abstract
This short paper introduces the design of AndroDepLog, a logging tool for enabling the live collection offailure and usage data. Collected data are useful to assessthe dependability behavior and software aging trends of anAndroid device during its exercise. The paper will discusspreliminary results concerning the application of the tool realAndroid devices, in the framework of a research collaborationbetween Critiware S.r.l. and an Android vendor.
- Published
- 2016
- Full Text
- View/download PDF
18. Scalable monitoring and dependable job scheduling support for multi-domain grid infrastructures
- Author
-
Luca Foschini, Antonio Corradi, Javier Povedano-Molina, Marcello Cinque, Flavio Frattini, Cinque, Marcello, Corradi, Antonio, Foschini, Luca, Frattini, Flavio, Povedano-Molina, Javier, and Povedano Molina, Javier
- Subjects
Job scheduler ,020203 distributed computing ,Monitoring ,Computer science ,Distributed computing ,Fault tolerance ,ScHeduling ,020206 networking & telecommunications ,02 engineering and technology ,Troubleshooting ,Dependability ,computer.software_genre ,Grid ,Fair-share scheduling ,Scheduling (computing) ,Grid computing ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,computer ,Software - Abstract
The management of Grid systems commonly lacks information for identifying the failures that may hinder the timely completion of jobs, and cause the wasting of computing resources. Monitoring can certainly help, but novel approaches need to be conceived for such large and geographically distributed systems. We propose a Grid Architecture for scalable Monitoring and Enhanced dependable job ScHeduling (GAMESH). GAMESH is a completely distributed and highly efficient management infrastructure for the dissemination of monitoring data and troubleshooting of job execution failures in large-scale and multi-domain Grid environments. Challenged in a real deployment and compared to other Grid management systems, GAMESH demonstrates to (i) ensure measurements of both computing resources and conditions of task scheduling at geographically sparse sites, while inducing a low overhead on the entire infrastructure, and (ii) enable failure-aware scheduling and improve overall system performance, even in the presence of failures, by coordinating local job schedulers at multiple domains.
- Published
- 2016
- Full Text
- View/download PDF
19. Automated Generation of Performance and Dependability Models for the Assessment of Wireless Sensor Networks
- Author
-
C. Di Martino, Marcello Cinque, Domenico Cotroneo, Cinque, Marcello, Cotroneo, Domenico, and DI MARTINO, Catello
- Subjects
Critical Infrastructures ,business.industry ,Computer science ,Distributed computing ,Context (language use) ,Theoretical Computer Science ,Dependability assessment ,Computational Theory and Mathematics ,Unified Modeling Language ,Hardware and Architecture ,Embedded system ,Dependability ,Wireless ,Wireless Sensors Network ,Routing (electronic design automation) ,business ,Wireless sensor network ,computer ,Software ,computer.programming_language - Abstract
Wireless Sensor Networks (WSNs) are widely recognized as a promising solution to build next-generation monitoring systems. Their industrial uptake is however still compromised by the low level of trust on their performance and dependability. Whereas analytical models represent a valid mean to assess nonfunctional properties via simulation, their wide use is still limited by the complexity and dynamicity of WSNs, which lead to unaffordable modeling costs. To reduce this gap between research achievements and industrial development, this paper presents a framework for the assessment of WSNs based on the automated generation of analytical models. The framework hides modeling details, and it allows designers to focus on simulation results to drive their design choices. Models are generated starting from a high-level specification of the system and by a preliminary characterization of its fault-free behavior, using behavioral simulators. The benefits of the framework are shown in the context of two case studies, based on the wireless monitoring of civil structures.
- Published
- 2012
- Full Text
- View/download PDF
20. Debugging-workflow-aware software reliability growth analysis
- Author
-
Roberto Pietrantuono, Stefano Russo, Antonio Pecchia, Domenico Cotroneo, Marcello Cinque, Cinque, Marcello, Cotroneo, Domenico, Pecchia, Antonio, Pietrantuono, Roberto, and Russo, Stefano
- Subjects
021103 operations research ,Computer science ,business.industry ,media_common.quotation_subject ,0211 other engineering and technologies ,Software reliability, SRGM, Debugging, Release planning ,020207 software engineering ,02 engineering and technology ,Software metric ,Software quality ,Reliability engineering ,Workflow ,Debugging ,Software construction ,0202 electrical engineering, electronic engineering, information engineering ,Software reliability testing ,Software regression ,Safety, Risk, Reliability and Quality ,Software engineering ,business ,Software ,Reliability (statistics) ,media_common - Abstract
Summary Software reliability growth models support the prediction/assessment of product quality, release time, and testing/debugging cost. Several software reliability growth model extensions take into account the bug correction process. However, their estimates may be significantly inaccurate when debugging fails to fully fit modelling assumptions. This paper proposes debugging-workflow-aware software reliability growth method (DWA-SRGM), a method for reliability growth analysis leveraging the debugging data usually managed by companies in bug tracking systems. On the basis of a characterization of the debugging workflow within the software project under consideration (in terms of bug features and treatment phases), DWA-SRGM pinpoints the factors impacting the estimates and to spot bottlenecks, thus supporting process improvement decisions. Two industrial case studies are presented, a customer relationship management system and an enterprise resource planning system, whose defects span a period of about 17 and 13 months, respectively. DWA-SRGM revealed effective to obtain more realistic estimates and to capitalize on the awareness of critical factors for improving debugging.
- Published
- 2017
- Full Text
- View/download PDF
21. Event Logging in an Industrial Development Process: Practices and Reengineering Challenges
- Author
-
Fabio Baccanico, Agostino Savignano, Marcello Cinque, Gabriella Carrozza, Antonio Pecchia, Domenico Cotroneo, Baccanico Fabio, Carrozza Gabriella, Cinque Marcello, Cotroneo Domenico, Pecchia Antonio, Savignano Agostino, Baccanico, Fabio, Carrozza, Gabriella, Cinque, Marcello, Cotroneo, Domenico, Pecchia, Antonio, and Savignano, Agostino
- Subjects
Engineering ,Process management ,business.industry ,Process (engineering) ,Event (computing) ,Logging ,Information technology ,Business process reengineering ,Air traffic control ,Development proce ,Login ,Logging practice ,Event logging ,Safety, Risk, Reliability and Quality ,business ,Aerospace ,Software engineering ,Software - Abstract
This paper discusses our preliminary analysis of event logging practices adopted in a large-scale industrial development process at Selex ES, a top-leading Finmeccanica company in electronic and information technologies for defense systems, aerospace, and land security. The analysis aims to support log reengineering activities that are currently conducted at SELEX ES. At time being, some of the issues described in the paper have been fixed by system developers. Analysis encompasses total around 50+ millions lines of log produced by an Air Traffic Control (ATC) system. Analysis reveals that event logging is not strictly regulated by company-wide practices, which results into heterogeneous logs across different development teams. We introduce our ongoing effort at developing an automatic support to browse collected logs along with a uniform logging policy supplementing the reengineering process.
- Published
- 2014
- Full Text
- View/download PDF
22. NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks
- Author
-
Marcello Cinque, Stefano Avallone, Raffaele Della Corte, Agostino Savignano, Gabriella Carrozza, Antonio Pecchia, Antonio Marotta, Avallone, Stefano, Carrozza, Gabriella, Cinque, Marcello, Della Corte, Raffaele, Marotta, Antonio, Pecchia, Antonio, and Savignano, Agostino
- Subjects
Security analytics ,Critical infrastructures protection ,Engineering ,business.industry ,Architectural design ,Big data ,Context (language use) ,Computer security ,computer.software_genre ,Cyber security ,Intrusion tolerance ,Security analytic ,business ,Safety, Risk, Reliability and Quality ,computer ,Software ,Live migration - Abstract
This paper presents the main objectives and preliminary results of the NAPOLI FUTURA project, which aims to define novel approaches for protecting critical infrastructures from cyber attacks. The paper focuses on the architectural design of the NAPOLI FUTURA platform. The platform leverages cutting-edge big data analytics solutions to detect security attacks and to support live migration of services in the context of Critical Information Infrastructures (CIIs).
- Published
- 2014
23. Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems
- Author
-
Raffaele Della Corte, Domenico Cotroneo, Marcello Cinque, Antonio Pecchia, Cinque, Marcello, Cotroneo, Domenico, DELLA CORTE, Raffaele, and Pecchia, Antonio
- Subjects
Downtime ,Engineering ,software fault tolerance ,Event (computing) ,business.industry ,IT service continuity ,Workload ,Context (language use) ,Air traffic control ,Reliability engineering ,Software ,Middleware ,Monitoring system ,business - Abstract
The analysis of monitoring data is extremely valuable for critical computer systems. It allows to gain insights into the failure behavior of a given system under real workload conditions, which is crucial to assure service continuity and downtime reduction. This paper proposes an experimental evaluation of different direct monitoring techniques, namely event logs, assertions, and source code instrumentation, that are widely used in the context of critical industrial systems. We inject 12,733 software faults in a real-world air traffic control (ATC) middleware system with the aim of analyzing the ability of mentioned techniques to produce information in case of failures. Experimental results indicate that each technique is able to cover a limited number of failure manifestations. Moreover, we observe that the quality of collected data to support failure diagnosis tasks strongly varies across the techniques considered in this study.
- Published
- 2014
24. On the Impact of Debugging on Software Reliability Growth Analysis: A Case Study
- Author
-
Marcello Cinque, Stefano Russo, Roberto Pietrantuono, Claudio Gaiani, Daniele De Stradis, Antonio Pecchia, B. Murgante, S. Misra, A.M.A.C. Rocha, C. Torre, J.G. Rocha, M.I. Falcão, D. Taniar, B.O. Apduhan, O. Gervasi, Cinque, Marcello, C., Gaiani, D., De Stradi, Pecchia, Antonio, Pietrantuono, Roberto, and Russo, Stefano
- Subjects
business.industry ,Computer science ,Process (engineering) ,media_common.quotation_subject ,Real-time computing ,Software quality ,Customer relationship management ,Reliability engineering ,Software ,Debugging ,Software construction ,Software reliability testing ,business ,Reliability (statistics) ,media_common - Abstract
Reliability is one of the most relevant software quality attributes. The literature offers a variety of mathematical models - namely, software reliability growth models (SRGMs) - to estimate the reliability of a software product at a given time, as well as to predict the reliability that will be achieved as testing activities progress. One of the typical assumptions of SRGMs is the immediate debugging of detected faults. In reality, the impact of the debugging process cannot be neglected at all. This paper reports the results of a real-world case-study in which we analyze the debugging process of a Customer Relationship Management (CRM) system, and study its impact on SRGM-based reliability estimation and prediction.
- Published
- 2014
- Full Text
- View/download PDF
25. Analyzing and modeling the failure behavior of Wireless Sensor Networks software under errors
- Author
-
Marcello Cinque, Alessandro Testa, Catello Di Martino, Cinque, Marcello, Catello Di, Martino, and Alessandro, Testa
- Subjects
fault injection ,business.industry ,Computer science ,Concurrency ,Distributed computing ,modeling ,Fault injection ,Dependability ,Key distribution in wireless sensor networks ,Memory management ,Software ,Software fault tolerance ,Embedded system ,wireless sensor neteork ,business ,Wireless sensor network - Abstract
As Wireless Sensor Networks (WSNs) are starting to be adopted in critical scenarios, it becomes important to study the behavior of WSN software in response to errors induced by hardware faults. To this aim, in this paper we present the results of an extensive fault-injection campaign, conducted on three different WSN operating systems (OSs). Results show that, depending on the concurrency model and on the memory management, the OS reacts to injected faults differently, indicating that fault containment strategies and hang-checking assertions should be implemented to avoid spreading and activations of errors. Analysis also allowed us to define a detailed dependability model of the WSN software, to be used to simulate the expected failure behavior of a given OS when solicited by given low-level hardware faults.
- Published
- 2012
- Full Text
- View/download PDF
26. Dependable Services for Mobile Health Monitoring Systems
- Author
-
Marcello Cinque, Antonio Coronato, Alessandro Testa, Cinque, Marcello, Antonio, Coronato, and Testa, Alessandro
- Subjects
Ambient intelligence ,Ambient Intelligence ,business.industry ,Computer science ,Continuous monitoring ,Vital signs ,Monitoring system ,Computer security ,computer.software_genre ,Dependability ,Risk analysis (engineering) ,Health care ,e-health ,business ,Failure mode and effects analysis ,computer ,Software - Abstract
The design and realization of health monitoring systems has attracted the interest of large communities both from industry and academia. Remote and continuous monitoring of patient’s vital signs is the target of an emerging business market that aims both to improve the quality of life of patients and to reduce costs of national healthcare services. Such applications, however, are particularly critical from the point of view of dependability. This presents the design of a set of services for the assurance of high degrees of dependability to generic mobile health monitoring systems. The design is based on the results of a detailed failure modes and effects analysis (FMEA), conducted to identify the typical dependability threats of health monitoring systems. The FMEA allowed the authors to conceive a set of configurable monitoring services, enriching the system with the ability to detect failures at runtime, and enabling the realization of dependable services for future mobile health monitoring systems.
- Published
- 2012
27. A Preliminary Fault Injection Framework for Evaluating Multicore Systems
- Author
-
Marcello Cinque, Ricardo Luís Barbosa, Antonio Pecchia, Domenico Cotroneo, Nuno Silva, Anna Lanzaro, Frank Ortmeier, Peter Daniel, Lanzaro, Anna, Pecchia, Antonio, Cinque, Marcello, Cotroneo, Domenico, Ricardo, Barbosa, and Nuno, Silva
- Subjects
Multi-core processor ,fault injection ,business.industry ,Computer science ,Concurrency ,Multicore computing ,Context (language use) ,Fault injection ,Software ,Embedded system ,Multicore systems ,Dependability ,Architecture ,business - Abstract
Multicore processors are becoming more and more attractive in embedded and safety-critical domains because they allow increasing the performance by ensuring reduced power consumption. However, moving to multicore systems raises novel dependability challenges: the number of cores, concurrency issues, shared resources and interconnections among cores make it hard to develop and validate software deployed on the top of multicore processors. This paper discusses a preliminary fault injection framework, which aims to investigate dependability properties of multicore-based systems. The proposed framework leverages the error reporting architecture provided by modern processors and has been instantiated in the context of the Intel Core i7 processor. Fault injection campaigns have been conducted under the Linux OS to show the benefits of the framework.
- Published
- 2012
28. Enabling on-line dependability assessment of Android smart phones
- Author
-
Marcello Cinque and Cinque, Marcello
- Subjects
Mobile computing ,Program testing ,Failure Analysi ,business.industry ,Computer science ,Failure data ,Computer security ,computer.software_genre ,System monitoring ,Software ,Embedded system ,Dependability ,Android (operating system) ,business ,computer - Abstract
The increasing complexity of smart phones introduces new dependability threats. Often, novel applications and features are delivered with scarce testing, due to the impressive market pressure. Despite these concerns, there is still little understanding on the dependability behavior of today smart phones. This paper proposes the design of a logging platform for the Android OS. The logging platform enables the collection of failure data, useful to assess the dependability of smart phones at runtime. Preliminary experimental results on real-world Android devices show the feasibility of the approach and encourage further research activities.
- Published
- 2011
- Full Text
- View/download PDF
29. OS-Level Hang Detection in Complex Software Systems
- Author
-
Marcello Cinque, Domenico Cotroneo, Roberto Natella, Antonio Bovenzi, Gabriella Carrozza, Bovenzi, Antonio, Cinque, Marcello, Cotroneo, Domenico, Natella, Roberto, and G., Carrozza
- Subjects
Engineering ,General Computer Science ,critical software system ,fault injection ,failure detection ,computer.software_genre ,air traffic management ,Domain (software engineering) ,Software ,operating system ,False positive paradox ,Instrumentation (computer programming) ,Software system ,software hang ,business.industry ,Air traffic management ,online monitoring ,Fault injection ,complex system ,air traffic control ,Hang ,Embedded system ,Operating system ,hang failure ,business ,computer - Abstract
Many critical services are nowadays provided by large and complex software systems. However, the increasing complexity introduces several sources of non-determinism, which may lead to hang failures: the system appears to be running, but part of its services is perceived as unresponsive. Online monitoring is the only way to detect and to promptly react to such failures. However, when dealing with off-the-shelf-based systems, online detection can be tricky since instrumentation and log data collection may not be feasible in practice. In this paper, a detection framework to cope with software hangs is proposed. The framework enables the non-intrusive monitoring of complex systems, based on multiple sources of data gathered at the operating system (OS) level. Collected data are then combined to reveal hang failures. The framework is evaluated through a fault injection campaign on two complex systems from the air traffic management (ATM) domain. Results show that the combination of several monitors at the OS level is effective to detect hang failures in terms of coverage and false positives and with a negligible impact on performance.
- Published
- 2011
30. Guest Editorial
- Author
-
Uwe Brinkschulte, Marcello Cinque, Tony Givargis, and Stefano Russo
- Subjects
Human-Computer Interaction ,Artificial Intelligence ,Software - Published
- 2009
- Full Text
- View/download PDF
31. Modeling and Analyzing the Dependability of Short Range Wireless Technologies via Field Failure Data Analysis
- Author
-
Gabriella Carrozza and Marcello Cinque
- Subjects
Wireless network ,business.industry ,Computer science ,Field (computer science) ,law.invention ,Variety (cybernetics) ,Human-Computer Interaction ,Bluetooth ,Artificial Intelligence ,law ,Key (cryptography) ,Dependability ,The Internet ,business ,Software ,Computer network - Abstract
Direct analysis of failures from the field of application is an effective practice to understand the actual dependability behavior of an operational system. However, despite its wide use over the last four decades on a large variety of systems, field data analysis has rarely been applied to wireless networks. Users accessing the Internet ubiquitously through these networks are increasing, and they expect the same dependability level they already experience on wired networks. But how can we analyze the dependability level of a wireless network? The article defines a novel combined approach to model and analyze the dependability of short range wireless technologies exploiting field data. Through the experience gained from extensive failure analysis of Bluetooth networks, the paper shows how field failure data can play a key role to fill the gap on understanding the dependability behavior of wireless networks.
- Published
- 2009
- Full Text
- View/download PDF
32. AVR-INJECT: A tool for injecting faults in Wireless Sensor Nodes
- Author
-
Domenico Cotroneo, Alessandro Testa, Stefano Russo, Marcello Cinque, Catello Di Martino, Cinque, Marcello, Cotroneo, Domenico, DI MARTINO, Catello, Testa, Alessandro, and Russo, Stefano
- Subjects
Wi-Fi array ,Computer science ,Wireless network ,business.industry ,Real-time computing ,Hardware_PERFORMANCEANDRELIABILITY ,Fault injection ,Key distribution in wireless sensor networks ,Software ,Embedded system ,Mobile wireless sensor network ,Wireless ,ROuting ,business ,Wireless sensor network ,Wireless Sensor Network - Abstract
As the incidence of faults in real Wireless Sensor Networks (WSNs) increases, fault injection is starting to be adopted to verify and validate their design choices. Following this recent trend, this paper presents a tool, named AVR-INJECT, designed to automate the fault injection, and analysis of results, on WSN nodes. The tool emulates the injection of hardware faults, such as bit flips, acting via software at the assembly level. This allows to attain simplicity, while preserving the low level of abstraction needed to inject such faults. The potential of the tool is shown by using it to perform a large number of fault injection experiments, which allow to study the reaction to faults of real WSN software.
- Published
- 2009
- Full Text
- View/download PDF
33. Operating System Support to Detect Application Hangs
- Author
-
Roberto Natella, Marcello Cinque, Gabriella Carrozza, Domenico Cotroneo, Carrozza, Gabriella, Cinque, Marcello, Cotroneo, Domenico, and Natella, Roberto
- Subjects
Engineering ,Exploit ,business.industry ,media_common.quotation_subject ,Real-time computing ,Context (language use) ,Fault injection ,computer.software_genre ,Software ,Operating system ,Overhead (computing) ,Dependability ,Quality (business) ,Software system ,business ,computer ,media_common - Abstract
On-line failure detection is an essential means to control and assess the dependability of complex and critical software systems. In such context, effective detection strategies are required, in order to minimize the possibility of catastrophic consequences. This objective is however difficult to achieve in complex systems, especially due to the several sources of non-determinism (e.g., multi-threading and distributed interaction) which may lead to software hangs, i.e., the system is active but no longer capable of delivering its services. The paper proposes a detection approach to uncover application hangs. It exploits multiple indirect data gathered at the operating system level to monitor the system and to trigger alarms if the observed behavior deviates from the expected one. By means of fault injection experiments conducted on a research prototype, it is shown how the combination of several operating system monitors actually leads to an high quality of detection, at an acceptable overhead.
- Published
- 2008
34. Modeling and Assessing the Dependability of Wireless Sensor Networks
- Author
-
Stefano Russo, C. Di Martinio, Domenico Cotroneo, Marcello Cinque, Cinque, Marcello, Cotroneo, Domenico, DI MARTINO, Catello, and Russo, Stefano
- Subjects
Tree (data structure) ,Software ,business.industry ,Computer science ,Distributed computing ,Node (networking) ,Dependability ,Routing (electronic design automation) ,business ,Network topology ,Wireless sensor network ,Failure mode and effects analysis ,Computer network - Abstract
This paper proposes a flexible framework for dependability modeling and assessing of Wireless Sensor Networks (WSNs). The framework takes into account network related aspects (topology, routing, network traffic) as well as hardware/software characteristics of nodes (type of sensors, running applications, power consumption). It is composed of two basic elements: i) a parametric Stochastic Activity Networks (SAN) failure model, reproducing WSN failure behavior as inferred from a detailed Failure Mode Effect Analysis (FMEA), and ii) an external library reproducing network behavior on behalf of the SAN model. This library specializes the SAN model by feeding it with quantitative parameters obtained by simulation or by experimental campaigns; it is also in charge of updating the network state in response to failure events during the simulation (e.g., routing tree updated due to node failures). The framework is thus suited to evaluate the dependability of several WSNs, with different topologies, routing algorithms, hardware/software platforms, without requiring any changes to its structure. The use of the external library makes the model simpler, decoupling the network behavior from the failure behavior. Simulation experiments are discussed that provide a quantitative evaluation of WSN dependability for a sample scenario: results show how the proposed framework supports WSN developers to find proper cost-reliability trade-offs for the system being deployed.
- Published
- 2007
35. Supporting Mobile Ubiquitous Applications with Mobility Prediction and Soft Handoff
- Author
-
Marcello Cinque, Stefano Russo, OBERMAISSER R., NAH Y., PUSCHNER P., RAMMIG F.-J., Cinque, Marcello, and Russo, Stefano
- Subjects
Scheme (programming language) ,Mobile computing ,Mobility model ,Ubiquitous computing ,SIMPLE (military communications protocol) ,Computer science ,business.industry ,Soft handover ,law.invention ,Bluetooth ,Software ,Handover ,law ,Embedded system ,business ,computer ,Mobility management ,computer.programming_language - Abstract
The increasing success of mobile-enabled embedded devices is stressing the need for software architectures facing mobility-related issues. This paper proposes a simple yet effective mobility management scheme to ease the development of mobile ubiquitous applications. The scheme seamlessly handles handoff events and provides ubiquitous applications with both location-awareness and mobility prediction support. An implementation prototype has been developed on real-world Bluetooth enabled devices. Experimental results are then obtained from the prototype, showing the effectiveness of the proposed scheme.
- Published
- 2007
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.