The Community for Technology Leaders
14th International Conference on Distributed Computing Systems (1994)
Pozman, Poland
June 21, 1994 to June 24, 1994
ISBN: 0-8186-5840-1
pp: 414-421
J.A. Gannon , Dept. of Electr. & Comput. Eng., Iowa Univ., Iowa City, IA, USA
K.J. Williams , Dept. of Electr. & Comput. Eng., Iowa Univ., Iowa City, IA, USA
M.S. Andersland , Dept. of Electr. & Comput. Eng., Iowa Univ., Iowa City, IA, USA
ABSTRACT
Execution monitoring plays a central role in most software development tools for parallel and distributed computer systems. However, such monitoring may induce delays that corrupt event timing. If this corruption can be quantified, it may be possible to determine the intrusion-free behavior. In this paper, we describe an algorithm that, given a safe timed Petri net model of the monitored software, can determine the uncorrupted timestamp values, i.e. those that would have been observed had the delays not been present. Monitoring conditions sufficient to ensure correct operation of the algorithm, and examples illustrating the algorithm's applicability to message-passing systems are also presented. This work is part of a larger effort aimed at identifying cost-effective software alternatives to custom hardware monitoring.<>
INDEX TERMS
message passing, system monitoring, perturbation techniques, delays, Petri nets, software tools
CITATION

J. Gannon, K. Williams, M. Andersland, J. Lummp and T. Gasavant, "Using perturbation tracking to compensate for intrusion in message-passing systems," 14th International Conference on Distributed Computing Systems(ICDCS), Pozman, Poland, 1994, pp. 414-421.
doi:10.1109/ICDCS.1994.302445
98 ms
(Ver 3.3 (11022016))