Mutiny! How does Kubernetes fail, and what can we do about it?

M Barletta, M Cinque, C Di Martino… - arXiv preprint arXiv …, 2024 - arxiv.org
In this paper, we i) analyze and classify real-world failures of Kubernetes (the most popular
container orchestration system), ii) develop a framework to perform a fault/error injection …

Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times

NF Yıldıran, J Oh, J Lawall, P Gazzillo - Proceedings of the ACM on …, 2024 - dl.acm.org
The Linux kernel is highly-configurable, with a build system that takes a configuration file as
input and automatically tailors the source code accordingly. Configurability, however …

[图书][B] Detecting Access Control Misconfigurations with Change Validation

C Xiang - 2021 - search.proquest.com
Access-control misconfigurations are among the main causes of today's security incidents.
One main reason is that access-control configurations need to be frequently changed by …

What goes wrong in serverless runtimes? A survey of bugs in Knative Serving

T Goodwin, A Quinn, L Kuper - Proceedings of the 1st Workshop on …, 2023 - dl.acm.org
Serverless runtime systems are complex software artifacts and difficult to make reliable. We
present a large-scale empirical study of bugs in serverless runtimes, in the context of the …

Finding heterogeneous-unsafe configuration parameters in cloud systems

S Ma, F Zhou, MD Bond, Y Wang - Proceedings of the Sixteenth …, 2021 - dl.acm.org
With the increasing prevalence of heterogeneous hardware and the increasing need for
online reconfiguration, there is increasing demand for heterogeneous configurations …

Kivi: Verification for Cluster Management

B Liu, G Lim, R Beckett, P Godfrey - arXiv preprint arXiv:2311.02800, 2023 - arxiv.org
Modern cloud infrastructure is powered by cluster management systems such as Kubernetes
and Docker Swarm. While these systems seek to minimize users' operational burden, the …

Software misconfiguration troubleshooting based on state analysis

K Li, Y Xue, Y Shao, B Su, Y Tan… - 2021 IEEE Sixth …, 2021 - ieeexplore.ieee.org
Misconfiguration has become one of the dominant causes of service failure and software
abnormality. It will not only affect the user experience and cause economic losses, but also …

WMWatcher: Preventing Workload-Related Misconfigurations in Production Environment

S Zhou, Z Jiang, S Li, X Liu, Z Jia… - 2023 30th Asia …, 2023 - ieeexplore.ieee.org
Among the misconfigurations with increasing preva-lence and severity in recent years,
workload-related misconfigu-rations, ie misconfigurations under certain workloads with valid …

Configuration Error Localization Based on Delta Debugging

F Luo, M Xue, J Li, K Li, S Li, G Sun… - … and Information Security …, 2023 - ieeexplore.ieee.org
User misconfiguration has become one of the leading causes of complex software failures in
the cloud and data center. Once a vulnerability caused by misconfiguration occurs, effective …

CCE&D: A Configuration Failure Prevention Method for Autonomous Driving Systems

Y Zhang, X Yu, J Liu, L Zhang, Y Li, Y Tan - Australasian Conference on …, 2024 - Springer
The correct setting of software configuration items is essential for improving software stability
and ensuring safe, reliable operation. By contrast, potential configuration errors can have …