Highc software9/20/2023 ![]() ![]() Zhendong Su is a Professor in the Department of Computer Science at ETH Zurich. That I believe are critical and offer promising opportunities for The talk highlights several areas and directions Some reflections on how we may advance the science and practice ofĮngineering software. On the other hand, theįundamental processes and toolchains are not significantly differentįrom those in the early days of the field. Languages, compilers, and development tools. ![]() To this end, there haveīeen substantial conceptual, technological, and practical advances forĮngineering high-quality software-we have better processes, Reliable, performant, and usable software. The key mission of computer science is to help people construct Zhendong Su (ETH Zurich) Reimagining the Engineering of Software He was the representative of UNILU-SnT in European Cyber Security Organization, Chair of the IFIP WG 10.4 on Dependable Computing and Fault-Tolerance, vice-Chair of the Steering Committee of DSN, and associate editor of IEEE TC and IEEE TETC. Previously, he was a professor and FNR PEARL Chair at the University of Luxembourg FSTM, and Head of the CritiX Research Lab at SnT center at the same University. Verissimo is a Professor at KAUST University (SA) and Director of its Resilient Computing and Cybersecurity Center (RC3 - ). More exactly, a high-speed permissionless blockchain system secure against attackers with way more than 51% network computing power, and resilient to all attacks known at date of publication (RepuCoin, for those interested to have a sneak-peek). To make matters concrete about the mindset behind resilient computing, the bulk of the talk will discuss the challenges faced when you go about conceiving a distributed fault/intrusion tolerant and resilient system … that ends-up implementing a Blockchain. I will briefly introduce this status quo, motivating the need for cyber resilience further to cyber security. These classic paradigms are largely based on prevention and reaction, assuming static or pre-defined architecture configurations, number of participants, system and threat/fault assumptions, or unconditional trust in stakeholders/third parties. Resilient computing is attracting attention as an emerging paradigm, driven by the shortcomings of cybersecurity techniques in face of the current challenges to IT systems. Verissimo (KAUST) Cyber Resilience explained through a Blockchain example He is a recipient of IEEE Reliability Society’s Lifetime Achievement Award. He is a recipient of IEEE Computer Society Technical Achievement Award for his research on Software Aging and Rejuvenation. His software tools SHARPE (Symbolic Hierarchical Automated Reliability and Performance Evaluator), SPNP (Stochastic Petri Net Package), and SREPT (Software Reliability Estimation and Prediction Tool) have been used in 500+ academic/industrial laboratories. He is the author of the well-known textbook entitled, Probability and Statistics with Reliability, Queuing and Computer Science Applications. He is IEEE Fellow, IEEE Life Fellow, and Golden Core Member of the IEEE Computer Society. Trivedi is the Hudson Chair Professor in the Department of Electrical and Computer Engineering at Duke University. We discuss environmental diversity both from experimental and analytic points of view and cite examples of real systems employing these techniques. For software aging related bugs, it is also possible to utilize a proactive environmental diversity technique known as software rejuvenation. They are examples of techniques that rely on environmental diversity. Retry operation, restart application, failover to an identical replica (hot, warm or cold) and reboot the OS are reactive recovery techniques applied after the occurrence of a failure. ![]() We submit that mitigation methods for Mandelbugs utilize environmental diversity. The key challenge then is to develop mitigation methods for Mandelbugs in general and aging-related bugs in particular. Traditional methods have been designed to deal with Bohrbugs. We classify software faults into Bohrbugs and Mandelbugs, and identify aging-related bugs as a subtype of the latter. We discuss a viewpoint of fault tolerance of software-based systems to ensure high dependability. The key challenge then is how to provide highly dependable software. ![]() Traditional methods of fault avoidance, fault removal based on extensive testing/debugging, and fault tolerance based on design/data diversity are found inadequate to ensure high software dependability. Several studies have established that a large fraction of system outages are due to software faults. Trivedi (Duke University) Rethinking Software Fault ToleranceĬomplex systems in different domains contain significant amount of software. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |