Protecting Applications Against Heisenbugs

نویسنده

  • Chris Hobbs
چکیده

Virtually-synchronous replication provides a mechanism that allows developers of missionand safety-critical applications to reduce the impact of elusive and nonreproducible bugs—commonly known as Heisenbugs—in their applications. This approach requires little or no modification to existing application code, and significantly improves the software availability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Production-Run Heisenbugs Reproduction on Commercial Hardware

We present a new technique, H3, for reproducing Heisenbugs in production runs on commercial hardware. H3 integrates the hardware control flow tracing capability provided in recent Intel processors with symbolic constraint analysis. Compared to a state-of-the-art solution, CLAP, this integration allows H3 to reproduce failures with much lower runtime overhead and much more compact trace. Moreove...

متن کامل

Suppressing Concurrency Bugs Using Scheduler Shepherding

Race conditions, atomicity violations, and related concurrency bugs are often due to inadequate synchronization that fail to prevent specific (undesirable) thread interleavings. Such errors, often referred to as Heisenbugs, are difficult to detect, prevent, and repair. In this paper, we present a new technique to increase program robustness against Heisenbugs. Our solution leverages correct pro...

متن کامل

Protecting Surfaces Using One-Dimensional Nanostructures

Ultraviolet waves, because of their short wavelength, have a high energy and considerable damaging effects on surfaces. Protection against ultraviolet radiations is one of the finishing treatments done on surfaces exposed to sunlight. The importance of this issue in relation to human health, due to complications such as skin burns and cancer, is doubled. Up t...

متن کامل

Protecting Applications Against Malice Using AdaptiveMiddleware

A distributed application can be given increased resistance to certain types of malicious behavior, even when the environment in which it is operating contains untrustworthy elements. Recent trends in protecting applications use operating systems as only the first layer of security, anticipating that this layer may be breached. Another layer is added to react to and repair the damage done by in...

متن کامل

Constructing Secure Mobile-Agent-Based Consumer Electronic Applications

This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010