{"title":"Analyzing the Shared Information in Social Networks","authors":"Bogdan Aman, Gabriel Ciobanu","doi":"10.1109/EDCC.2018.00042","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00042","url":null,"abstract":"We use a concise stochastic calculus to describe the interactions among the participants in web-based social networks. The stochastic nature of these interactions is given by the fact that the duration of the interaction can be represented by a stochastic rate of an exponential distribution. To ensure a more secure sharing of information in the systems described by our stochastic calculus, we use a probabilistic model checker to verify various (quantitative) properties of their dynamics.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giulio Masetti, S. Chiaradonna, F. Giandomenico, B. Feddersen, W. Sanders
{"title":"An Efficient Strategy for Model Composition in the Möbius Modeling Environment","authors":"Giulio Masetti, S. Chiaradonna, F. Giandomenico, B. Feddersen, W. Sanders","doi":"10.1109/EDCC.2018.00029","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00029","url":null,"abstract":"Möbius is well known as a modeling and evaluation environment for performance and dependability indicators. One of Möbius' key features is the modular and compositional approach to model definition and analysis. In particular, the modeler can define submodels using several formalisms and compose them to form the overall model of the system under analysis. The current algorithm for model composition in Möbius revealed performance issues when large systems are considered (such as in the modeling of realistic segments of energy or transportation infrastructures), due to the chosen data flow scheme. In this paper, a new algorithm for the same composition mechanism is proposed to improve efficiency. A case study is also developed to demonstrate the performance enhancements.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from SERENE 2018 Workshop Program Chairs","authors":"","doi":"10.1109/edcc.2018.00011","DOIUrl":"https://doi.org/10.1109/edcc.2018.00011","url":null,"abstract":"","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Areej Algaith, P. Nunes, J. Fonseca, Ilir Gashi, M. Vieira
{"title":"Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools","authors":"Areej Algaith, P. Nunes, J. Fonseca, Ilir Gashi, M. Vieira","doi":"10.1109/EDCC.2018.00020","DOIUrl":"https://doi.org/10.1109/EDCC.2018.00020","url":null,"abstract":"The use of Static Analysis Tools (SATs) is mandatory when developing secure software and searching for vulnerabilities in legacy software. However, the performance of the various SATs concerning the detection of vulnerabilities and false alarm rate is usually unknown and depends on many factors. The simultaneous use of several tools should increase the detection capabilities, but also the number of false alarms. In this paper, we study the problem of combining several SATs to best meet the developer needs. We present results of analyzing the performance of diverse static analysis tools, based on a previously published dataset that resulted from the use of five diverse SATs to find two types of vulnerabilities, namely SQL Injections (SQLi) and Cross-Site Scripting (XSS), in 132 plugins of the WordPress Content Management System (CMS). We present the results based on well-established measures for binary classifiers, namely sensitivity and specificity for all possible diverse combinations that can be constructed using these 5 SAT tools. We then provide empirically supported guidance on which combinations of SAT tools provide the most benefits for detecting vulnerabilities with low false positive rates.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"29 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}