{"title":"Simulation-Based Testing to Improve Safety of Autonomous Robots","authors":"L. Sartori","doi":"10.1109/ISSREW.2019.00053","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00053","url":null,"abstract":"Autonomous systems are becoming increasingly popular among industries as well as end-users, and are deployed in numerous tasks. To improve their reliability and to avoid critical failures that impact safety, their testing aims at ensuring that their behavior and decisions are acceptable even in scenarios that have not been foreseen by the developers. As testing of these systems is usually done through field testing, which is costly and is limited in the reproducible scenarios, system-level pre-validation can be done in virtual worlds through simulation, to discover faults and fix them before deploying the system in the real world. However, there is no current standard procedure to conduct simulation-based testing and to ensure satisfying coverage of the most critical scenarios for the system under test (SUT). The aim of this experimental work is to improve and automate the steps of the simulation-based testing related to the generation and selection of test inputs, the exploitation of the results, and the incorporation of dynamic agents in the tests.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131168631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling DO-178C Assurance Needs: A Design Assurance Level-Sensitive DSL","authors":"N. Metayer, A. Paz, Ghizlane El-Boussaidi","doi":"10.1109/ISSREW.2019.00094","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00094","url":null,"abstract":"Avionics systems are relying more on software to control their behaviour. However, engineering such software is a complex task. Even more so due to their safety-critical nature. Aviation authorities require suppliers to provide appropriate safety assurance through the certification of compliance with DO-178C to a determined software design assurance level. Such a concern is leading the avionics software industry to consider and incorporate effective engineering methods that can support them in their certification endeavours. This paper presents a domain specific modelling language (DSML) providing a documentation infrastructure that enforces certification information mandated by DO-178C and its supplements according with the software's design assurance level. Focus is given to the conceptual model of DO-178C and its supplements, which lies behind the proposed DSML to support the features it delivers. The DSML was built and implemented as a UML profile. Three different use cases for the DSML are illustrated in an avionics case study.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the RSDA 2019 Workshop Chairs","authors":"","doi":"10.1109/issrew.2019.00019","DOIUrl":"https://doi.org/10.1109/issrew.2019.00019","url":null,"abstract":"RSDA represents a forum to stimulate scientific research and discuss analysis techniques, procedures and tools that are adopted to manage, analyze or evaluate reliability and security data sets. RSDA concentrates ideas and contributions from academic and industrial organizations addressing reliability and security of computer systems through data analysis. RSDA gathers high-quality papers on data-driven methodologies, measurements from production systems, and analysis of large datasets. The expected output of the workshop is establishing the agenda of future research activities in the field of reliability and security data analysis, with the ambition of creating concrete synergies among researchers.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123743239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rejuvenation and the Age of Information","authors":"D. Menasché, Kishor S. Trivedi, E. Altman","doi":"10.1109/ISSREW.2019.00076","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00076","url":null,"abstract":"Two decades after the seminal paper on software aging and rejuvenation appeared in 1995, a new concept and metric referred to as the age of information (AoI) has been gaining attention from practitioners and the research community. In this vision paper, our aim is to show the similarities and differences between software aging and information aging. In particular, modeling frameworks that have been applied to software aging, such as the semi Markov approach can be immediately applied in the realm of age of information. Conversely, we indicate that questions pertaining to sampling costs associated with the age of information can be useful to assess the optimal rejuvenation trigger interval for software systems.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124753359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chaotic Compilation: A (Statistical) Cloak for a Secret Computer","authors":"Peter T. Breuer, Jonathan P. Bowen","doi":"10.1109/ISSREW.2019.00106","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00106","url":null,"abstract":"This paper extends a companion paper on compilation for target platforms with hidden deterministic hardware aliasing to generate aliasing as well as compensate for it, in so-called 'chaotic' compilation. That may be applied in encrypted computing to statistically hide any information inadvertently introduced by a human programmer. A prototype compiler implementing the technology currently covers all of ANSI C except longjmp/setjmp, and this paper sketches a proof that it protects against polynomial complexity attacks on runtime data.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126223887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Diop, J. D. Ndibwile, Doudou Fall, S. Kashihara, Y. Kadobayashi
{"title":"To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications","authors":"S. Diop, J. D. Ndibwile, Doudou Fall, S. Kashihara, Y. Kadobayashi","doi":"10.1109/ISSREW.2019.00085","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00085","url":null,"abstract":"The rise of large-scale vulnerability scanners, which make the detection of vulnerabilities easy, has recently raised the attention to the security community. This leads to multiple research on the effectiveness of large-scale vulnerability notifications as a countermeasure and several studies have examined the different factors that could impact the effectiveness and how they could incite people to apply vulnerability fixing steps. And we contend that using a legal constraint could improve the vulnerability fixing rate. In this paper, we survey the Cybersecurity and Cybercrime Legislations of 156 countries looking for Articles that consider the liability of vulnerable resource owners. We discovered that only two countries required companies, regardless of the industry, to implement cybersecurity measures and conduct vulnerability assessments. This study aims to define a more effective large-scale vulnerability notifications system using Cybersecurity and Cybercrime Laws.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ceccato, Luca Gazzola, Fitsum Meshesha Kifetew, L. Mariani, Matteo Orrù, P. Tonella
{"title":"Toward In-Vivo Testing of Mobile Applications","authors":"M. Ceccato, Luca Gazzola, Fitsum Meshesha Kifetew, L. Mariani, Matteo Orrù, P. Tonella","doi":"10.1109/ISSREW.2019.00063","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00063","url":null,"abstract":"Mobile apps can be executed with an extremely large set of partially unpredictable configurations. Indeed, they can be executed on an unbounded combination of devices, operating systems, settings, and user preferences since apps may also interact with other apps or devices that were not even available when they were released. This results in a virtually infinite set of configurations that might be responsible for unexpected behaviors which can be validated in-house only to a negligible extent. To address this challenge, this paper discusses the application of in-vivo testing to mobile apps. The main idea is to run test cases in the field, where we exploit the intrinsic heterogeneity and variety of the end-user environment to dramatically increase the range of validated configurations. Actually, the many devices available in-the-field generate a naturally distributed and highly scalable environment that can be exploited to timely validate many configurations as soon as they are observed.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128532381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Autili, Francesco Gallo, P. Inverardi, Claudio Pompilio, Massimo Tivoli
{"title":"Introducing Trust in Service-Oriented Distributed Systems through Blockchain","authors":"M. Autili, Francesco Gallo, P. Inverardi, Claudio Pompilio, Massimo Tivoli","doi":"10.1109/ISSREW.2019.00065","DOIUrl":"https://doi.org/10.1109/ISSREW.2019.00065","url":null,"abstract":"Business process management is concerned with the design execution, improvement, and monitoring of business processes. Systems that support the enactment and execution of processes have extensively been used by companies to streamline and automate intra-organizational processes. However, today's business enterprises must deal with global competition, heterogeneity, and rapidly develop new services and products. To address these requirements, the services reuse-based approach allowed enterprises to reconsider and optimize the way they do business, and change their information systems and applications to support collaborative business processes. Service choreographies support the reuse-based service-oriented philosophy in that they represent a powerful and flexible approach to realize systems by (possibly) reusing services and composing them in a fully distributed way. Nevertheless, for inter-organizational processes, challenges of collaborative design and lack of mutual trust have hampered a broader uptake. In this paper, we show an early stage approach to address the problem of trust in services choreography by using Blockchain technologies, in order to support the decentralized and peer-to-peer collaboration in a trustworthy manner, even in a network without any mutual trust between nodes.","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126344344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the WoSoCer 2019 Workshop Chairs","authors":"","doi":"10.1109/issrew.2019.00022","DOIUrl":"https://doi.org/10.1109/issrew.2019.00022","url":null,"abstract":"","PeriodicalId":166239,"journal":{"name":"2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}