Protecting Applications Against Heisenbugs
نویسنده
چکیده
Virtually-synchronous replication provides a mechanism that allows developers of missionand safety-critical applications to reduce the impact of elusive and nonreproducible bugs—commonly known as Heisenbugs—in their applications. This approach requires little or no modification to existing application code, and significantly improves the software availability.
منابع مشابه
Towards Production-Run Heisenbugs Reproduction on Commercial Hardware
We present a new technique, H3, for reproducing Heisenbugs in production runs on commercial hardware. H3 integrates the hardware control flow tracing capability provided in recent Intel processors with symbolic constraint analysis. Compared to a state-of-the-art solution, CLAP, this integration allows H3 to reproduce failures with much lower runtime overhead and much more compact trace. Moreove...
متن کاملSuppressing Concurrency Bugs Using Scheduler Shepherding
Race conditions, atomicity violations, and related concurrency bugs are often due to inadequate synchronization that fail to prevent specific (undesirable) thread interleavings. Such errors, often referred to as Heisenbugs, are difficult to detect, prevent, and repair. In this paper, we present a new technique to increase program robustness against Heisenbugs. Our solution leverages correct pro...
متن کاملProtecting Surfaces Using One-Dimensional Nanostructures
Ultraviolet waves, because of their short wavelength, have a high energy and considerable damaging effects on surfaces. Protection against ultraviolet radiations is one of the finishing treatments done on surfaces exposed to sunlight. The importance of this issue in relation to human health, due to complications such as skin burns and cancer, is doubled. Up t...
متن کاملProtecting Applications Against Malice Using AdaptiveMiddleware
A distributed application can be given increased resistance to certain types of malicious behavior, even when the environment in which it is operating contains untrustworthy elements. Recent trends in protecting applications use operating systems as only the first layer of security, anticipating that this layer may be breached. Another layer is added to react to and repair the damage done by in...
متن کاملConstructing Secure Mobile-Agent-Based Consumer Electronic Applications
This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...
متن کامل