13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)最新文献

筛选
英文 中文
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise 一个有效的客户端到客户端密码认证密钥交换弹性服务器妥协
Hongfeng Zhu, Tianhua Liu, Jie Liu, G. Chang
{"title":"An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise","authors":"Hongfeng Zhu, Tianhua Liu, Jie Liu, G. Chang","doi":"10.1109/PRDC.2007.32","DOIUrl":"https://doi.org/10.1109/PRDC.2007.32","url":null,"abstract":"With rapid changes in the modern communication environment such as ad hoc networks and ubiquitous computing, it is necessary to construct a secure end-to-end channel between clients. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. This paper presents a new password authentication and key-exchange protocol suitable for client-to-client without a server public key in different realms to agree on a common session key using different passwords over an untrusted network. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126787806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting Defective Software Components from Code Complexity Measures 从代码复杂度度量预测有缺陷的软件组件
Hongyu Zhang, Xiuzhen Zhang, Ming Gu
{"title":"Predicting Defective Software Components from Code Complexity Measures","authors":"Hongyu Zhang, Xiuzhen Zhang, Ming Gu","doi":"10.1109/PRDC.2007.28","DOIUrl":"https://doi.org/10.1109/PRDC.2007.28","url":null,"abstract":"The ability to predict defective modules can help us allocate limited quality assurance resources effectively and efficiently. In this paper, we propose a complexity- based method for predicting defect-prone components. Our method takes three code-level complexity measures as input, namely Lines of Code, McCabe's Cyclomatic Complexity and Halstead's Volume, and classifies components as either defective or non-defective. We perform an extensive study of twelve classification models using the public NASA datasets. Cross-validation results show that our method can achieve good prediction accuracy. This study confirms that static code complexity measures can be useful indicators of component quality.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks 无线传感器网络中传输范围可调的容错拓扑控制
Chiu-Wen Chen, K. Ssu, H. C. Jiau
{"title":"Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks","authors":"Chiu-Wen Chen, K. Ssu, H. C. Jiau","doi":"10.1109/PRDC.2007.47","DOIUrl":"https://doi.org/10.1109/PRDC.2007.47","url":null,"abstract":"A topology control algorithm can be applied to wireless sensor networks to construct a virtual backbone for maintaining network connectivity. For handling node failure, previous algorithms typically prefer to have redundant nodes so the power efficiency was compromised. This paper describes a Power-CDS (P-CDS) mechanism that schedules active and backup sensor nodes in the backbone for tolerating failures. When node failure is detected, both active and backup nodes will adjust their transmission ranges to maintain connectivity. Simulation results show that P-CDS forms a smaller connected dominating set than the other fault- tolerant topology control algorithm. P-CDS also provides efficient broadcast with relatively low energy consumption.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Path Diversity Metric for End-to-End Network 端到端网络的路径分集度量
Song Huang, Yong Xu, Ling Zhang
{"title":"A Path Diversity Metric for End-to-End Network","authors":"Song Huang, Yong Xu, Ling Zhang","doi":"10.1109/PRDC.2007.15","DOIUrl":"https://doi.org/10.1109/PRDC.2007.15","url":null,"abstract":"Path diversity is an important index of the dependability and fault tolerance capability of networks. Most path diversity metrics are designed under an implicit hypothesis that all candidate paths for a divergence node are always equally chosen. This may not be true due to the effect of routing policy with consideration of cost or other factors. A new simple metric is proposed in this paper for path diversity measurement of end-to-end networks. An end-to-end network is firstly transformed into a sequence of cascading segments. With the assumption that only one of all available branches is chosen each time, a probability based metric is calculated for each segment, and the joint entropy is calculated as path diversity measurement for the overall end-to-end network. The metric is fitful for both single-hop and multi-hop topologies. A comparison between the new metric and other ones is given at the end.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fault Tolerance for Super-Peers of P2P Systems P2P系统的超级对等体容错
Jenn-Wei Lin, M. Yang, Jichiang Tsai
{"title":"Fault Tolerance for Super-Peers of P2P Systems","authors":"Jenn-Wei Lin, M. Yang, Jichiang Tsai","doi":"10.1109/PRDC.2007.5","DOIUrl":"https://doi.org/10.1109/PRDC.2007.5","url":null,"abstract":"This paper presents an efficient fault-tolerant approach for the super-peers of peer-to-peer (P2P) file sharing systems. In the super-peer based P2P file sharing system, peers are organized into multiple groups. In each group, it has a special peer called super peer to serve the regular peers within the group. In this hierarchical architecture, if the super peer departs (fails), any file queries to its serving regular peers cannot be delivered. In the proposed approach, we propose a multiple publication technique to make each regular peer logically connect with two or more super peers in other groups. If a regular peer finds that its serving super peer cannot work, one of its other connected super peers will be selected as its new serving super peer to continuously process the file queries. To examine the effectiveness of the proposed approach, comprehensive simulations are performed to quantify the performance and overhead of the proposed approach.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126417584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation 无线环境中的入侵容忍:一种实验评估
Henrique Moniz, N. Neves, M. Correia, A. Casimiro, P. Veríssimo
{"title":"Intrusion Tolerance in Wireless Environments: An Experimental Evaluation","authors":"Henrique Moniz, N. Neves, M. Correia, A. Casimiro, P. Veríssimo","doi":"10.1109/PRDC.2007.33","DOIUrl":"https://doi.org/10.1109/PRDC.2007.33","url":null,"abstract":"This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also within the context of a car platooning application for distributed cruise control. The experimental evaluation reveals how performance is affected by the various environmental parameters such as the wireless standard, group size, and network topology. The distributed cruise control application demonstrates the practicability of such protocols, even when subjected to malicious faults.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133262721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Model Based Development of Safety-Critical Systems Using Template Based Code Generation 基于模板代码生成的安全关键系统模型开发
M. Regensburger, C. Buckl, A. Knoll, G. Schrott
{"title":"Model Based Development of Safety-Critical Systems Using Template Based Code Generation","authors":"M. Regensburger, C. Buckl, A. Knoll, G. Schrott","doi":"10.1109/PRDC.2007.25","DOIUrl":"https://doi.org/10.1109/PRDC.2007.25","url":null,"abstract":"Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists a huge heterogeneity of used platforms, it is obvious that it is impossible to design a code generator that supports a priori all required platforms. Instead a code generator architecture is needed that is suited for an easy extensibility of the code generation ability. One possible solution is the use of template-based approaches. In this paper, we describe an approach1 to develop safety-critical realtime systems by using open architecture ware, a modular MDA/MDD generator framework. We will present the tool-chain and discuss two lab applications.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MAPMon: A Host-Based Malware Detection Tool MAPMon:一个基于主机的恶意软件检测工具
Shih-Yao Dai, S. Kuo
{"title":"MAPMon: A Host-Based Malware Detection Tool","authors":"Shih-Yao Dai, S. Kuo","doi":"10.1109/PRDC.2007.23","DOIUrl":"https://doi.org/10.1109/PRDC.2007.23","url":null,"abstract":"In order for financial-motivated malware programs such as spyware, virus and worm to survive after system rebooted, they have to modify entries in auto start extensibility points (ASEPs), system calls or system files on a comprised system. We call these system resources which a malware program could attack once it intrudes a host as malware attacking points (MAPs). Based on this observation, we design and implement MAPMon, a monitoring mechanism to detect any suspicious change of malware attacking points. This paper describes the design and implementation tradeoff of the MAPMon tool. The effectiveness of the MAPMon tool for malware detection is evaluated by using real-world malware programs including those that do not have signatures.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"29 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Improving Email Reliability by Sender Retransmission 通过发件人重传提高电子邮件的可靠性
T. Moors, P. Chu
{"title":"Improving Email Reliability by Sender Retransmission","authors":"T. Moors, P. Chu","doi":"10.1109/PRDC.2007.38","DOIUrl":"https://doi.org/10.1109/PRDC.2007.38","url":null,"abstract":"While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of e-mail, which passes responsibility for delivering email from one mail server to another, but in doing so exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to email unreliability than others, and seek tools with which they can detect and recover from email failures. This paper describes tools that allow email sending software to automatically respond to reports of undeliverability by persisting with retransmission or retransmitting to alternate recipients.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Fail-Silent Reconfigurable Superscalar Processor 无故障可重构超标量处理器
T. Kottke, A. Steininger
{"title":"A Fail-Silent Reconfigurable Superscalar Processor","authors":"T. Kottke, A. Steininger","doi":"10.1109/PRDC.2007.16","DOIUrl":"https://doi.org/10.1109/PRDC.2007.16","url":null,"abstract":"We propose a reconfigurable superscalar processor with two modes of operation: In safety mode the two pipelines run in lock step, executing the same instruction sequence, thus allowing to detect hardware failures. In performance mode different instruction streams are executed in parallel, just like in a standard superscalar processor. Considering that many embedded applications comprise a mixture of safety-critical and non safety-critical functions, the ability to dynamically switch between the two modes allows an efficient utilization of the duplicated pipeline. To complement the error detection enabled by the duplicated pipeline, non-duplicated components such as the register file are secured by parity. A systematic failure analysis shows that the proposed implementation can indeed detect all single faults in safety mode and that the ability to switch modes does not compromise the fail safe property. These encouraging results are finally confirmed by extensive fault injection experiments.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131305468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信