2006
DOI: 10.1007/11678779_13
|View full text |Cite
|
Sign up to set email alerts
|

A Kernel-Based Communication Fault Injector for Dependability Testing of Distributed Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
3

Year Published

2008
2008
2013
2013

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 14 publications
(23 citation statements)
references
References 7 publications
0
16
0
3
Order By: Relevance
“…Figure 2 shows the textual representation of the WTLS attack tree according to step 3 of our methodology. For our experiments we used Firmament [2] fault injector, used in previous work [12]. Firmament is capable of performing the following actions: intercept, corrupt, drop, delay, duplicate, store, and set.…”
Section: Attack Modelingmentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 2 shows the textual representation of the WTLS attack tree according to step 3 of our methodology. For our experiments we used Firmament [2] fault injector, used in previous work [12]. Firmament is capable of performing the following actions: intercept, corrupt, drop, delay, duplicate, store, and set.…”
Section: Attack Modelingmentioning
confidence: 99%
“…In our case, a trigger is an external event, such as the reception of a specific messagecorresponds to second attack pattern element. The condition may be established in terms of the message field content, or state variables [2] -it can be assigned to third attack pattern element. Considering the defined attacker capabilities, we can establish the actions that the injector can perform: intercept, corrupt, drop, duplicate, delay, and impersonate -it can be also assigned to third attack pattern element.…”
Section: • Step 5: Refine Attacks Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…FIAT [15] tests the dependability of real-time distributed systems by injecting events into the source code at the compile-time. NIST Net [16], Dummynet [17], and ComFIRM [18] also rely upon packet capture for event-injection but support neither distributed nor time-based injection capabilities. Cesium [19] is a simulation tool that allows events to be injected into the protocol at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…Some work also address communication faults in parallel or distributed systems [3,8,9,14], usually aiming at transmission errors in the transport or lower layers. In this paper, we also consider networked systems, but address the injection of interaction faults -i.e.…”
Section: Introductionmentioning
confidence: 99%