2017
DOI: 10.1145/3152483
|View full text |Cite
|
Sign up to set email alerts
|

Abstracting the geniuses away from failure testing

Abstract: Ordinary users need tools that automate the selection of custom-tailored faults to inject.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Chaos Monkey [45]. Another advantage of using attack graphs is they aid automation, and reduce the need for security experts and chaos engineering experts as noted by Alvaro et.al [46]. We leverage the graph generation feature of Terraform 8 to construct attack graphs ( Figure 6), which are then further processed using GraphViz-Java 9 , a Java implementation of the of GraphViz.…”
Section: ) Attack Graphsmentioning
confidence: 99%
“…Chaos Monkey [45]. Another advantage of using attack graphs is they aid automation, and reduce the need for security experts and chaos engineering experts as noted by Alvaro et.al [46]. We leverage the graph generation feature of Terraform 8 to construct attack graphs ( Figure 6), which are then further processed using GraphViz-Java 9 , a Java implementation of the of GraphViz.…”
Section: ) Attack Graphsmentioning
confidence: 99%
“…Chaos Monkey [43]. Another advantage of using attack graphs is they aid automation, and reduce the need for security experts and chaos engineering experts as noted by Alvaro et.al [44]. We leverage the graph generation feature of Terraform 10 to construct attack graphs ( Figure 6), which are then further processed using GraphViz-Java 11 , a Java implementation of the of GraphViz.…”
Section: Fault Modelsmentioning
confidence: 99%
“…The dup [2,3] syscall duplicates a file descriptor so that the process can use two different file descriptors to access the same open file. SPADE and CamFlow do not record this call directly, but the changes to the process's file descriptor state can affect future file system calls that are monitored.…”
Section: File Systemmentioning
confidence: 99%
“…for reproducibility [28], dependability [3], and regulatory compliance [30], and it is increasingly being used for security, through forensic audit [33] or online dynamic detection of malicious behavior [16,17]. To cater to the requirements of different use-cases, there are many system-level provenance capture systems in the literature, such as PASS [23], Hi-Fi [31], SPADE [12], OPUS [5], LPM [6], Inspector [32], and CamFlow [26] covering a variety of operating systems from Linux and BSD to Android and Windows.…”
mentioning
confidence: 99%