2020
DOI: 10.1016/j.jss.2019.110455
|View full text |Cite
|
Sign up to set email alerts
|

Detection of intermittent faults in software programs through identification of suspicious shared variable access patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…In order to avoid race conditions, the current toolchest of developers includes a number of instruments, techniques and methods, such as thread-safe libraries, process and thread synchronization methods, library functions that are guaranteed to operate atomically eliminating any TOCTOU-based errors [85] (e.g., the introduction of the faccess function enables the use of the secure fopen/faccess function sequence instead of the TOCTOU-vulnerable access/fopen function sequence). The exploitation of experience gained from operating system and parallel application development, coupled with the use of model-based checking tools such as [93][94][95], which are able to follow all possible application execution paths and more thoroughly cover the possible instruction interleaving sequences, may lead to a reduction of race condition introduction windows.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to avoid race conditions, the current toolchest of developers includes a number of instruments, techniques and methods, such as thread-safe libraries, process and thread synchronization methods, library functions that are guaranteed to operate atomically eliminating any TOCTOU-based errors [85] (e.g., the introduction of the faccess function enables the use of the secure fopen/faccess function sequence instead of the TOCTOU-vulnerable access/fopen function sequence). The exploitation of experience gained from operating system and parallel application development, coupled with the use of model-based checking tools such as [93][94][95], which are able to follow all possible application execution paths and more thoroughly cover the possible instruction interleaving sequences, may lead to a reduction of race condition introduction windows.…”
Section: Discussionmentioning
confidence: 99%
“…We also plan to consider the combined assessment of results concerning communication protocol security through relevant simulation-based tools (e.g., Scyther) on the one hand (e.g., [99][100][101]), and results from the software implementation security assessment on the other hand, towards the computation of a comprehensive risk level of 5G and smart grid systems. Finally, the effectiveness of model-based checking tools such as [93][94][95] in the identification of security-related issues, and the interplay between secure software development practices and the operation of forensics in the domain of 5G and Smart Grid computing [107] will be studied.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation