Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs

Author(s):  
Guorui Yu ◽  
Shibin Zhao ◽  
Chao Zhang ◽  
Zhiniang Peng ◽  
Yuandong Ni ◽  
...  
Keyword(s):  
2021 ◽  
Vol 51 (2) ◽  
pp. 2-9
Author(s):  
Rachee Singh ◽  
Muqeet Mukhtar ◽  
Ashay Krishna ◽  
Aniruddha Parkhi ◽  
Jitendra Padhye ◽  
...  

Switch failures can hamper access to client services, cause link congestion and blackhole network traffic. In this study, we examine the nature of switch failures in the datacenters of a large commercial cloud provider through the lens of survival theory. We study a cohort of over 180,000 switches with a variety of hardware and software configurations and find that datacenter switches have a 98% likelihood of functioning uninterrupted for over 3 months since deployment in production. However, there is significant heterogeneity in switch survival rates with respect to their hardware and software: the switches of one vendor are twice as likely to fail compared to the others. We attribute the majority of switch failures to hardware impairments and unplanned power losses. We find that the in-house switch operating system, SONiC, boosts the survival likelihood of switches in datacenters by 1% by eliminating switch failures caused by software bugs in vendor switch OSes.


Metascience ◽  
2015 ◽  
Vol 24 (3) ◽  
pp. 437-439
Author(s):  
Peter J. Westwick
Keyword(s):  

Author(s):  
N. K. Nagwani ◽  
S. Verma

Software repositories contain a wealth of information that can be analyzed for knowledge extraction. Software bug repositories are one such repository that stores the information about the defects identified during the development of software. Information available in software bug repositories like number of bugs priority-wise, component-wise, status-wise, developers-wise, module-wise, summary-terms-wise, can be visualized with the help of two- or three-dimensional graphs. These visualizations help in understanding the bug distribution patterns, software matrices related to the software bugs, and developer information in the bug-fixing process. Visualization techniques are exploited with the help of open source technologies in this chapter to visualize the bug distribution information available in the software bug repositories. Two-dimensional and three-dimensional graphs are generated using java-based open source APIs, namely Jzy3d (Java Easy 3d) and JFreeChart. Android software bug repository is selected for the experimental demonstrations of graphs. The textual bug attribute information is also visualized using frequencies of frequent terms present in it.


Author(s):  
Ankur Lohachab

Due to the momentous growth in the field of Internet of Things (IoT), various commercial and government organizations are exploring possibilities of mass issuance of smart cards in different applications. Widespread deployment of smart card-based systems in heterogeneous environment would facilitate card holders to participate in these applications in a personalized manner. Despite the security features, valuable data and access to decisive services make these systems prime target for attackers. These systems can be subjected to a range of security attacks – from hardware exploitation to exploitation of software bugs, from unauthorized data access to social engineering, and so forth. In the future, where many sectors will be trying to adopt the concept of Blockchain, it will create new opportunities for benefiting citizens with enhanced security over their data. In this chapter, the author performs in-depth analysis over the role of Blockchain in securing the smart card ecosystem.


Author(s):  
Christian Wittke ◽  
Kai Lehniger ◽  
Stefan Weidling ◽  
Mario Schoelzel

With the growing number of wireless devices in the internet of things (IoT), maintenance and management of these devices has become a key issue. In particular, the ability to wirelessly update devices is a must in order to fix security issues and software bugs, or to extend firmware functionality. Code update mechanisms in wireless sensor networks (WSNs), a subset of IoT networks, must handle limited resources and strict constraints. Also, over-the-air (OTA) code updates in the context of an IoT ecosystem may open new security vulnerabilities. An IoT security framework should therefore be extended with additional mechanisms to secure the OTA code update functionality. The chapter presents an overview of various OTA code update techniques for WSNs and their security flaws along with some existing attacks and possible countermeasures. It is discussed which attacks can be used more easily with the code update functionality. Countermeasures are compared as to whether they secure the weakened security objectives, giving a guideline to choose the right combination of countermeasures.


Author(s):  
Mrutyunjaya Panda ◽  
Ahmad Taher Azar

Software bugs (or malfunctions) pose a serious threat to software developers with many known and unknown bugs that may be vulnerable to computer systems, demanding new methods, analysis, and techniques for efficient bug detection and repair of new unseen programs at a later stage. This chapter uses evolutionary grey wolf (GW) search optimization as a feature selection technique to improve classifier efficiency. It is also envisaged that software error detection would consider the nature of the error when repairing it for remedial action instead of simply finding it either faulty or non-defective. To address this problem, the authors use bug severity multi-class classification to build an efficient and robust prediction model using multilayer perceptron (MLP), logistic regression (LR), and random forest (RF) for bug severity classification. Both tests are performed on two software error datasets, namely Ant 1.7 and Tomcat.


Sign in / Sign up

Export Citation Format

Share Document