{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T04:51:56Z","timestamp":1745038316522,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030545482"},{"type":"electronic","value":"9783030545499"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-54549-9_28","type":"book-chapter","created":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T19:03:42Z","timestamp":1597863822000},"page":"419-433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On Configuring a Testbed for Dependability Experiments: Guidelines and Fault Injection Case Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4623-764X","authenticated-orcid":false,"given":"Jo\u00e3o R.","family":"Campos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8460-4033","authenticated-orcid":false,"given":"Ernesto","family":"Costa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5103-8541","authenticated-orcid":false,"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,31]]},"reference":[{"key":"28_CR1","unstructured":"Arlat, J., Crouzet, Y., Laprie, J.C.: Fault injection for dependability validation of fault-tolerant computing systems. In: 1989 The Nineteenth International Symposium on Fault-Tolerant Computing, Digest of Papers, pp. 348\u2013355. IEEE (1989)"},{"issue":"2","key":"28_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.4314\/njtd.v13i2.5","volume":"13","author":"J Awotunde","year":"2016","unstructured":"Awotunde, J., Ameen, A., Oladipo, I., Tomori, A., Abdulraheem, M.: Evaluation of four encryption algorithms for viability, reliability and performance estimation. Niger. J. Technol. Dev. 13(2), 74\u201382 (2016)","journal-title":"Niger. J. Technol. Dev."},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Banabic, R., Candea, G.: Fast black-box testing of system recovery code. In: 7th ACM European Conference On Computer Systems, pp. 281\u2013294. ACM (2012)","DOI":"10.1145\/2168836.2168865"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Candido, J., Melo, L., d\u2019Amorim, M.: Test suite parallelization in open-source projects: a study on its usage and impact. In: 32nd IEEE\/ACM International Conference on Automated Software Engineering, pp. 838\u2013848. IEEE Press (2017)","DOI":"10.1109\/ASE.2017.8115695"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Cerveira, F., Barbosa, R., Madeira, H.: Experience report: on the impact of software faults in the privileged virtual machine. In: 28th International Symposium on Software Reliability Engineering (ISSRE), pp. 136\u2013145. IEEE (2017)","DOI":"10.1109\/ISSRE.2017.39"},{"key":"28_CR6","doi-asserted-by":"publisher","unstructured":"Chen, P.: The systematic improvement of fault tolerance in the Rio file cache. Digest of Papers. In: Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352), pp. 76\u201383 (1999). https:\/\/doi.org\/10.1109\/FTCS.1999.781036. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=781036","DOI":"10.1109\/FTCS.1999.781036"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Cotroneo, D., Simone, L.D., Fucci, F., Natella, R.: MoIO : Run-time monitoring for I \/ O protocol violations in storage device drivers. In: 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp. 472\u2013483 (2015)","DOI":"10.1109\/ISSRE.2015.7381840"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Cui, L., Li, B., Li, J., Hardy, J., Liu, L.: Software aging in virtualized environments: detection and prediction. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp. 718\u2013719. IEEE (2012)","DOI":"10.1109\/ICPADS.2012.111"},{"key":"28_CR9","unstructured":"Grimm, R.: Pros and cons of the various memory allocation strategies. https:\/\/www.modernescpp.com\/index.php\/pros-and-cons-of-the-various-memory-management-strategies. Accessed 15 Nov 2019"},{"key":"28_CR10","unstructured":"Hat, R.: Interrupts and irq tuning. https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/6\/html\/performance_tuning_guide\/s-cpu-irq. Accessed 15 Nov 2019"},{"key":"28_CR11","unstructured":"Hat, R.: Offloading RCU callbacks. https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux_for_real_time\/7\/html\/tuning_guide\/offloading_rcu_callbacks. Accessed 15 Nov 2019"},{"issue":"4","key":"28_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/2.585157","volume":"30","author":"MC Hsueh","year":"1997","unstructured":"Hsueh, M.C., Tsai, T.K., Iyer, R.K.: Fault injection techniques and tools. Computer 30(4), 75\u201382 (1997)","journal-title":"Computer"},{"key":"28_CR13","unstructured":"Huang, Y., Kintala, C., Kolettis, N., Fulton, N.D.: Software rejuvenation: Analysis, module and applications. In: Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers, pp. 381\u2013390. IEEE (1995)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Irrera, I., Dur\u00e3es, J., Madeira, H., Vieira, M.: Assessing the impact of virtualization on the generation of failure prediction data. In: Proceedings - 6th Latin-American Symposium on Dependable Computing LADC 2013, pp. 92\u201397 (2013)","DOI":"10.1109\/LADC.2013.24"},{"key":"28_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/9780470370506","volume-title":"Dependability Benchmarking For Computer Systems","author":"K Kanoun","year":"2008","unstructured":"Kanoun, K., Spainhower, L.: Dependability Benchmarking For Computer Systems, vol. 72. Wiley, Hoboken (2008)"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Kropp, N.P., Koopman, P.J., Siewiorek, D.P.: Automated robustness testing of off-the-shelf software components. In: Digest of Papers - 28th Annual International Symposium on Fault-Tolerant Computing FTCS 1998, January 1998, pp. 1\u201310 (1998)","DOI":"10.1109\/FTCS.1998.689474"},{"key":"28_CR17","unstructured":"Lameter, C.: Numa (non-uniform memory access): an overview. https:\/\/queue.acm.org\/detail.cfm?id=2513149. Accessed 15 Nov 2019"},{"issue":"10","key":"28_CR18","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.infsof.2004.11.006","volume":"47","author":"A Lastovetsky","year":"2005","unstructured":"Lastovetsky, A.: Parallel testing of distributed software. Inf. Softw. Technol. 47(10), 657\u2013662 (2005)","journal-title":"Inf. Softw. Technol."},{"key":"28_CR19","volume-title":"Exploring Expect: A Tcl-Based Toolkit for Automating Interactive Programs","author":"D Libes","year":"1995","unstructured":"Libes, D.: Exploring Expect: A Tcl-Based Toolkit for Automating Interactive Programs. O\u2019Reilly Media, Inc., Sebastopol (1995)"},{"key":"28_CR20","unstructured":"LWN.net: (nearly) full tickless operation in 3.10. https:\/\/lwn.net\/Articles\/549580\/. Accessed 15 Nov 2019"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Makai, J., Peters, A.J., Bitzes, G., Sindrilaru, E.A., Simon, M.K., Manzi, A.: Testing of complex, large-scale distributed storage systems: a CERN disk storage case study. In: EPJ Web of Conferences, vol. 214, p. 05008. EDP Sciences (2019)","DOI":"10.1051\/epjconf\/201921405008"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Matias Jr, R., Trivedi, K.S., Maciel, P.R.: Using accelerated life tests to estimate time to software aging failure. In: 2010 IEEE 21st International Symposium on Software Reliability Engineering, pp. 211\u2013219. IEEE (2010)","DOI":"10.1109\/ISSRE.2010.42"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Matthews, J.N., et al.: Quantifying the performance isolation properties of virtualization systems. In: 2007 workshop on Experimental computer science, p. 6. ACM (2007)","DOI":"10.1145\/1281700.1281706"},{"key":"28_CR24","volume-title":"THe Art of Software Testing","author":"GJ Myers","year":"2011","unstructured":"Myers, G.J., Sandler, C., Badgett, T.: THe Art of Software Testing. Wiley, Hoboken (2011)"},{"key":"28_CR25","unstructured":"Nagios: Nagios. https:\/\/www.nagios.com\/. Accessed 15 Nov 2019"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Natella, R., Cotroneo, D., Duraes, J., Madeira, H.: Representativeness analysis of injected software faults in complex software. In: 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN), pp. 437\u2013446. IEEE (2010)","DOI":"10.1109\/DSN.2010.5544282"},{"key":"28_CR27","unstructured":"Netdata: Netdata. https:\/\/www.netdata.cloud\/. Accessed 15 Nov 2019"},{"key":"28_CR28","unstructured":"Novakovi\u0107, D., Vasi\u0107, N., Novakovi\u0107, S., Kosti\u0107, D., Bianchini, R.: Deepdive: transparently identifying and managing performance interference in virtualized environments. In: Presented as part of the 2013 $$\\{$$USENIX$$\\}$$ Annual Technical Conference ($$\\{$$USENIX$$\\}$$$$\\{$$ATC$$\\}$$ 13), pp. 219\u2013230 (2013)"},{"key":"28_CR29","unstructured":"man Pages, L.: chrt - manipulate the real-time attributes of a process. http:\/\/man7.org\/linux\/man-pages\/man1\/chrt.1.html. Accessed 15 Nov 2019"},{"key":"28_CR30","unstructured":"QEMU: Qemu. https:\/\/www.qemu.org\/. Accessed 15 Nov 2019"},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Sangchoolie, B., Pattabiraman, K., Karlsson, J.: One bit is (not) enough: an empirical study of the impact of single and multiple bit-flip errors. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 97\u2013108. IEEE (2017)","DOI":"10.1109\/DSN.2017.30"},{"key":"28_CR32","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jss.2015.02.017","volume":"104","author":"H Santos","year":"2015","unstructured":"Santos, H., Pimentel, J.F., Da Silva, V.T., Murta, L.: Software rejuvenation via a multi-agent approach. J. Syst. Softw. 104, 41\u201359 (2015)","journal-title":"J. Syst. Softw."},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Schwahn, O., Coppik, N., Winter, S., Suri, N.: Assessing the state and improving the art of parallel testing for C. In: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 123\u2013133. ACM (2019)","DOI":"10.1145\/3293882.3330573"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Schwahn, O., Coppik, N., Winter, S., Suri, N.: FastFI: accelerating software fault injections. In: Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing PRDC, December 2018, pp. 193\u2013202 (2019)","DOI":"10.1109\/PRDC.2018.00035"},{"key":"28_CR35","unstructured":"Spurrier, N.: Pexpect. https:\/\/pexpect.readthedocs.io\/en\/stable\/. Accessed 15 Nov 2019"},{"key":"28_CR36","unstructured":"Ubuntu: cset-shield. http:\/\/manpages.ubuntu.com\/manpages\/trusty\/man1\/cset-shield.1.html. Accessed 15 Nov 2019"},{"key":"28_CR37","unstructured":"Ubuntu: Real-time\/low-latency kernel. https:\/\/help.ubuntu.com\/community\/UbuntuStudio\/RealTimeKernel. Accessed 15 Nov 2019"},{"key":"28_CR38","unstructured":"Ubuntu: stress-ng. https:\/\/manpages.ubuntu.com\/manpages\/artful\/man1\/stress-ng.1.html. Accessed 15 Nov 2019"},{"key":"28_CR39","doi-asserted-by":"crossref","unstructured":"Winter, S., Schwahn, O., Natella, R., Suri, N., Cotroneo, D.: No PAIN, no gain? the utility of parallel fault injections. In: Proceedings - International Conference on Software Engineering, vol. 1, pp. 494\u2013505 (2015)","DOI":"10.1109\/ICSE.2015.67"},{"key":"28_CR40","doi-asserted-by":"crossref","unstructured":"Winter, S., Tretter, M., Sattler, B., Suri, N.: simFi: from single to simultaneous software fault injections. In: 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1\u201312. IEEE (2013)","DOI":"10.1109\/DSN.2013.6575310"},{"key":"28_CR41","unstructured":"Fern\u00e1ndez, J.D. (WU), Wouter Dullaert (TF) .: D3.3 - scalability and Robustness testing report V1, June 2018"},{"key":"28_CR42","unstructured":"Yoshimura, T., Yamada, H., Kono, K.: Is linux kernel oops useful or not? HotDep (2012)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-54549-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T22:56:16Z","timestamp":1667948176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-54549-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030545482","9783030545499"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-54549-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/safecomp2020.di.fc.ul.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}