2013

Innovative Technologies for Dependable OTS-Based Critical Systems

Challenges and Achievements of the CRITICAL STEP Project

Editors:

ISBN: 978-88-470-2771-8 (Print) 978-88-470-2772-5 (Online)

Table of contents (15 chapters)

  1. Front Matter

    Pages i-viii

  2. Introduction to Software Fault Injection

    1. Front Matter

      Pages 39-39

    2. No Access

      Book Chapter

      Pages 1-15

      Introduction to Software Fault Injection

    3. No Access

      Book Chapter

      Pages 17-27

      Introduction to Safety Critical Systems

    4. No Access

      Book Chapter

      Pages 29-38

      Introduction to Software Security Concepts

  3. V&V in Safety Critical System

    1. Front Matter

      Pages 39-39

    2. No Access

      Book Chapter

      Pages 41-53

      Safety-Critical Standards for Verification and Validation

    3. No Access

      Book Chapter

      Pages 55-68

      Robustness Testing of Web Services

    4. No Access

      Book Chapter

      Pages 69-81

      JFIT: an Automatic Tool for Assessing Robustness of DDS-Compliant Middleware

  4. Fault Injection

    1. Front Matter

      Pages 83-83

    2. No Access

      Book Chapter

      Pages 85-100

      Tools for Injecting Software Faults at the Binary and Source-Code Level

    3. No Access

      Book Chapter

      Pages 101-114

      Survey on Software Faults Injection in Java Applications

    4. No Access

      Book Chapter

      Pages 115-130

      Evaluating Fault-Tolerance of Publish/Subscribe Services

    5. No Access

      Book Chapter

      Pages 131-141

      Leveraging Fault Injection Techniques in Critical Industrial Applications

  5. Security

    1. Front Matter

      Pages 143-143

    2. No Access

      Book Chapter

      Pages 145-157

      Using Vulnerability Injection to Improve Web Security

    3. No Access

      Book Chapter

      Pages 159-174

      Security Testing in SOAs: Techniques and Tools

    4. No Access

      Book Chapter

      Pages 175-185

      Selected Challenges on Security and Dependability of Embedded Systems

  6. Monitoring and Diagnosing

    1. Front Matter

      Pages 187-187

    2. No Access

      Book Chapter

      Pages 189-202

      Monitoring Infrastructure for Diagnosing Complex Software

    3. No Access

      Book Chapter

      Pages 203-215

      Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications