scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Proceedings ArticleDOI
23 Oct 2004
TL;DR: This paper presents a mechanism to enforce a class of framework rules that place restrictions on the properties of data structures in framework applications by the use of a generic "bad store template" which can be customized for different rule instances.
Abstract: Frameworks are widely used to facilitate software reuse and accelerate development time. However, there are currently no systematic mechanisms to enforce the explicit and implicit rules of these frameworks. This paper focuses on a class of framework rules that place restrictions on the properties of data structures in framework applications. We present a mechanism to enforce these rules by the use of a generic "bad store template" which can be customized for different rule instances. We demonstrate the use of this template to validate specific bad store rules within J2EE framework applications. Violations of these rules cause subtle defects which manifest themselves at runtime as data loss, data corruption, or race conditions. Our algorithm to detect "bad stores" is implemented in the Smart Analysis-Based Error Reduction (SABER) validation tool, where we pay special attention to facilitating problem understanding and remediation, by providing detailed problem explanations. We present experimental results on four commercially deployed e-commerce applications that show over 200 "bad stores".

10 citations

Proceedings ArticleDOI
01 Nov 2012
TL;DR: A novel witness-based cyber-physical protocol whereby physical coherence is leveraged to probe and identify phasor measurement unit data corruption and estimate the true information values for attack mitigation is developed.
Abstract: We consider a cyber-physical perspective to the problem of identifying and mitigating information corruption in smart grid systems. We study the problem of transient stability with distributed control using real-time data from geographically distributed phasor measurement units via a flocking-based modeling paradigm. We demonstrate how cyber corruption can be identified through the effective use of telltale physical couplings within the power system.We develop a novel witness-based cyber-physical protocol whereby physical coherence is leveraged to probe and identify phasor measurement unit data corruption and estimate the true information values for attack mitigation.

10 citations

Patent
01 May 2013
TL;DR: In this paper, a hot-swap data storage device is released to be manually physically removed from the operable position within the chassis bay of the computer system in response to determining that the data storage devices are not active.
Abstract: A method and computer program product secure a hot-swap data storage device against being manually physically removed from an operable position within a chassis bay of a computer system. The hot-swap data storage device is released to be manually physically removed from the operable position within the chassis bay of the computer system in response to determining that the data storage device is not active. The hot-swap data storage device may, for example, be secured and released using an electronically-actuated lock.

10 citations

Proceedings ArticleDOI
27 Jun 2020
TL;DR: In this article, the authors present a general-purpose algorithm called ddmax that addresses these problems automatically, which maximizes the subset of the input that can still be processed by the program, thus recovering and repairing as much data as possible.
Abstract: When a program fails to process an input, it need not be the program code that is at fault. It can also be that the input data is faulty, for instance as result of data corruption. To get the data processed, one then has to debug the input data---that is, (1) identify which parts of the input data prevent processing, and (2) recover as much of the (valuable) input data as possible. In this paper, we present a general-purpose algorithm called ddmax that addresses these problems automatically. Through experiments, ddmax maximizes the subset of the input that can still be processed by the program, thus recovering and repairing as much data as possible; the difference between the original failing input and the "maximized" passing input includes all input fragments that could not be processed. To the best of our knowledge, ddmax is the first approach that fixes faults in the input data without requiring program analysis. In our evaluation, ddmax repaired about 69% of input files and recovered about 78% of data within one minute per input.

9 citations

Patent
Ning Wu1, Xin Guo1, Ramkarthik Ganesan1, Pranav Kalavade1, Robert E. Frickey1 
01 Oct 2016
TL;DR: In this article, a memory controller can be configured to detect corrupted data in a selected data region in the first non-volatile memory, which can be associated with an increased risk of data corruption after data is written from the second NVM to the first NVM.
Abstract: Technology for an apparatus is described. The apparatus can include a first non-volatile memory, a second non-volatile memory to have a write access time faster than the first non-volatile memory, and a memory controller. The memory controller can be configured to detect corrupted data in a selected data region in the first non-volatile memory. The selected data region can be associated with an increased risk of data corruption after data is written from the second non-volatile memory to the first non-volatile memory. Uncorrupted data in the second non-volatile memory that corresponds to the corrupted data in the first non-volatile memory can be identified. Data recovery in the first non-volatile memory can be performed by replacing the corrupted data in the first non-volatile memory with uncorrupted data from the second non-volatile memory.

9 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727