2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

筛选
英文 中文
A Stochastic Petri net Model of Continuous Integration and Continuous Delivery 持续集成与持续交付的随机Petri网模型
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00050
Sushovan Bhadra
{"title":"A Stochastic Petri net Model of Continuous Integration and Continuous Delivery","authors":"Sushovan Bhadra","doi":"10.1109/ISSREW55968.2022.00050","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00050","url":null,"abstract":"Modern software development organizations rely on continuous integration and continuous delivery (CI/CD), since it allows developers to continuously integrate their code in a single shared repository and automates the delivery process of the product to the user. While modern software practices improve the performance of the software life cycle, they also increase the complexity of this process. Past studies make improvements to the performance of the CI/CD pipeline. However, there are fewer formal models to quantitatively guide process and product quality improvement or characterize how automated and human activities compose and interact asynchronously. Therefore, this paper develops a Petri net model to analyze a CI/CD pipeline to improve process performance in terms of the probability of successfully delivering new or updated functionality by a specified deadline. The utility of the model is demonstrated through a sensitivity analysis to identify stages of the pipeline where improvements would most significantly improve the probability of timely product delivery.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121127355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomic ZTA-based Network Management Engine (AZNME) 基于zta的自主网络管理引擎(AZNME)
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00034
Cihan Tunc, James Durflinger, C. Mahmoudi, Valerio Formicola
{"title":"Autonomic ZTA-based Network Management Engine (AZNME)","authors":"Cihan Tunc, James Durflinger, C. Mahmoudi, Valerio Formicola","doi":"10.1109/ISSREW55968.2022.00034","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00034","url":null,"abstract":"The advancements in computer and networking technologies created closely connected cyberspaces. Nevertheless, this also invalidated many traditional and isolated/local network solutions and introduced higher cybersecurity risk. As a solution, NIST's Zero-Trust Architecture (ZTA) with “never trust, always verify” principle has been widely accepted; yet, its implementation, enforcement, and compliance-check mechanisms are still immature as the solutions are generally applied manually. In this paper, we present an autonomic computing based management engine for networking of a cyberspace, we refer as Autonomic ZTA-based Network Management Engine (AZNME), which monitors an asset's network connections, checks if these connections fulfill ZTA requirements, and evaluates trust continuously, and takes mitigation actions as needed. As a proof of concept, we implemented the AZNME focusing on active connections (e.g., IPs and ports) to enforce policies and create firewall rules based on trust evaluation.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Novel Approaches to Defend Software Supply Chain Attacks 研究防御软件供应链攻击的新方法
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00081
Md Jobair Hossain Faruk, Masrura Tasnim, H. Shahriar, Maria Valero, A. Rahman, Fan Wu
{"title":"Investigating Novel Approaches to Defend Software Supply Chain Attacks","authors":"Md Jobair Hossain Faruk, Masrura Tasnim, H. Shahriar, Maria Valero, A. Rahman, Fan Wu","doi":"10.1109/ISSREW55968.2022.00081","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00081","url":null,"abstract":"Software supply chain attacks occur during the processes of producing software is compromised, resulting in vulnerabilities that target downstream customers. While the number of successful exploits is limited, the impact of these attacks is significant. Despite increased awareness and research into software supply chain attacks, there is limited information available on mitigating or architecting for these risks, and existing information is focused on singular and independent elements of the supply chain. In this paper, we extensively review software supply chain security using software development tools and infrastructure. We investigate the path that attackers find is least resistant followed by adapting and finding the next best way to complete an attack. We also provide a thorough discussion on how common software supply chain attacks can be prevented, preventing malicious hackers from gaining access to an organization's development tools and infrastructure including the development environment. We considered various SSC attacks on stolen code-sign certificates by malicious attackers and prevented unnoticed malware from passing by security scanners. We are aiming to extend our research to contribute to preventing software supply chain attacks by proposing novel techniques and frameworks.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130613532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating Bugs in AI-Infused Systems: Analysis and Proposed Taxonomy
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00094
M. Kassab, J. Defranco, P. Laplante
{"title":"Investigating Bugs in AI-Infused Systems: Analysis and Proposed Taxonomy","authors":"M. Kassab, J. Defranco, P. Laplante","doi":"10.1109/ISSREW55968.2022.00094","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00094","url":null,"abstract":"Testing for critical AI systems is non-trivial as these systems are prone to a new breed of sophisticated software defects. The admissibility of these systems and their fundamental social acceptance is tightly coupled with assuring whether the potential hazards to humans, animals, and property posed by the prospect defects can be minimized and limited to an acceptable level. In this work, we address the problem of assurance for critical AI systems by firstly, analyzing the nature of defects that occur in AI -infused systems in general and how to combat these within a testing strategy. Secondly, developing a focused taxon-omy of prospect defects in critical AI systems. This taxonomy enables the development of the non-critical proxy (i.e., stand-in) equivalent by reproducing defects with similar characteristics.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ISSRE 2022 Fast Abstracts Track Committee: ISSREW 2022 快速摘要跟踪委员会:ISSREW 2022
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00011
{"title":"ISSRE 2022 Fast Abstracts Track Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00011","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00011","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An unsupervised approach to discover filtering rules from diagnostic logs 从诊断日志中发现过滤规则的无监督方法
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00030
M. Cinque, Raffaele Della Corte, Giorgio Farina, Stefano Rosiello
{"title":"An unsupervised approach to discover filtering rules from diagnostic logs","authors":"M. Cinque, Raffaele Della Corte, Giorgio Farina, Stefano Rosiello","doi":"10.1109/ISSREW55968.2022.00030","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00030","url":null,"abstract":"Diagnostic logs represent the main source of in-formation about the system runtime. However, the presence of faults typically leads to multiple errors propagating within system components, which requires analysts to dig into cascading messages for root cause analysis. This is exacerbated in complex systems, such as railway systems, composed by several devices generating high amount of logs. Filtering allows dealing with large data volumes, leading practitioners to focus on interesting events, i.e., events that should be further investigated by analysts. This paper proposes an unsupervised approach to discover filtering rules from diagnostic logs. The approach automatically infers potential events correlations, representing them as fault-trees enriched with scores. Trees define filtering rules highlighting the interesting events, while scores allow prioritizing their anal-ysis. The approach has been applied in a preliminary railway case study, which encompasses more than 710k events generated by on-board train equipment during operation.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"906 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121302897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the IWSF & SHIFT 2022 Chairs: ISSREW 2022 来自IWSF和SHIFT 2022主席的信息:ISSREW 2022
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00021
{"title":"Message from the IWSF & SHIFT 2022 Chairs: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00021","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00021","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121399898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WoSoCer 2022 Workshop Committee: ISSREW 2022 2022年世界足球锦标赛工作坊委员会:ISSREW 2022
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00016
{"title":"WoSoCer 2022 Workshop Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00016","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00016","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAIS 2022 Workshop Committee: ISSREW 2022 RAIS 2022工作坊委员会:ISSREW 2022
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00027
{"title":"RAIS 2022 Workshop Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00027","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00027","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting and Defending CSRF at API-Level 在api级检测和防御CSRF
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00043
Shun Wang, Chao Ni, Jianbo Wang, Changhai Nie
{"title":"Detecting and Defending CSRF at API-Level","authors":"Shun Wang, Chao Ni, Jianbo Wang, Changhai Nie","doi":"10.1109/ISSREW55968.2022.00043","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00043","url":null,"abstract":"Cross-Site Request Forgery (CSRF) vulnerabilities are severe web vulnerabilities since their characteristics of extreme concealment and heavy harmfulness. However, they have received marginal attention from both the academic and the industry and the detection and protection of CSRF vulnerabilities are still performed predominantly manually. This paper proposes CSRFSolver for API-level CSRF detection and protection with two components: CSRF detector and CSRF defender. The former helps to identify and locate CSRF points where they need CSRF protection, and the latter provides CSRF protection by generating and verifying CSRFToken. We evaluate the effectiveness and efficiency of CSRFSolver on Cisco Webex public URL APIs with the state-of-the-art method. The results indicate that CSRFSolver can effectively and efficiently protect the system from CSRF attacks and have no side effects on systems' functionality. Meanwhile, the practical usefulness of CSRFSolver has also been verified through four years of deployment in Cisco Webex.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125659503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信