Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems

Y Chen, Y Huai, S Li, C Hong, J Garcia - Proceedings of the ACM on …, 2024 - dl.acm.org
The optimization of a system's configuration options is crucial for determining its
performance and functionality, particularly in the case of autonomous driving software (ADS) …

Runtime verification of crypto apis: an empirical study

A Torres, P Costa, L Amaral, J Pastro… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Misuse of cryptographic (crypto) APIs is a noteworthy cause of security vulnerabilities. For
this reason, static analyzers were recently proposed for detecting crypto API misuses. They …

[PDF][PDF] Forensic analysis of configuration-based attacks

MA Inam, W Ul - Proceedings of the 2022 Network and Distributed …, 2022 - par.nsf.gov
Causality analysis is an effective technique for investigating and detecting cyber attacks.
However, by focusing on auditing at the Operating System level, existing causal analysis …

Test case prioritization using partial attention

Q Zhang, C Fang, W Sun, S Yu, Y Xu, Y Liu - Journal of Systems and …, 2022 - Elsevier
Test case prioritization (TCP) aims to reorder the regression test suite with a goal of
increasing the fault detection rate. Various TCP techniques have been proposed based on …

{ConfD}: Analyzing Configuration Dependencies of File Systems for Fun and Profit

T Mahmud, OR Gatla, D Zhang, C Love… - … USENIX Conference on …, 2023 - usenix.org
File systems play an essential role in modern society for managing precious data. To meet
diverse needs, they often support many configuration parameters. Such flexibility comes at …

Chroma: Learning and Using Network Contexts to Reinforce Performance Improving Configurations

C Ge, Z Ge, X Liu, A Mahimkar, Y Shaqalle… - Proceedings of the 29th …, 2023 - dl.acm.org
Managing network configuration and improving service experience effectively is essential for
cellular service providers (CSPs). This is challenging because of cellular networks' large …

An empirical study on change-induced incidents of online service systems

Y Wu, B Chai, Y Li, B Liu, J Li, Y Yang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Although dedicated efforts have been devoted to ensuring the service quality of online
service systems, these systems are still suffering from incidents due to various causes, which …

Kivi: Verification for Cluster Management

B Liu, G Lim, R Beckett, PB Godfrey - 2024 USENIX Annual Technical …, 2024 - usenix.org
Modern cloud infrastructure is powered by cluster management systems such as Kubernetes
and Docker Swarm. While these systems seek to minimize users' operational burden, the …

How to Manage Change-Induced Incidents? Lessons from the Study of Incident Life Cycle

Y Zhao, L Jiang, Y Tao, S Zhang, C Wu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
In online service systems, software changes cause a majority of incidents (ie, unplanned
interruptions and outages). Managing change-induced incidents efficiently is crucial for …

Understanding Persistent-memory-related Issues in the Linux Kernel

OR Gatla, D Zhang, W Xu, M Zheng - ACM Transactions on Storage, 2023 - dl.acm.org
Persistent memory (PM) technologies have inspired a wide range of PM-based system
optimizations. However, building correct PM-based systems is difficult due to the unique …