2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement最新文献

筛选
英文 中文
A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations 基于verilog的仿真中快速灵活的故障注入与评估平台
D. Kammler, J. Guan, G. Ascheid, R. Leupers, H. Meyr
{"title":"A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations","authors":"D. Kammler, J. Guan, G. Ascheid, R. Leupers, H. Meyr","doi":"10.1109/SSIRI.2009.38","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.38","url":null,"abstract":"This paper presents a complete framework for Verilog-based fault injection and evaluation. In contrast to existing approaches, the proposed solution is the first one based on the Verilog programming interface (VPI). Due to standardization of the VPI, the framework is—in contrast to simulator command based techniques—independent from the used simulator. Additionally, it does not require recompilation for different fault injection experiments like techniques modifying the Verilog code for fault injection. The feasibility of the VPI-based approach is shown in a case study.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115080480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Test-Data Generation for Web Services Based on Contract Mutation 基于契约突变的Web服务测试数据生成
Ying Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang
{"title":"Test-Data Generation for Web Services Based on Contract Mutation","authors":"Ying Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang","doi":"10.1109/SSIRI.2009.49","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.49","url":null,"abstract":"Software testing is one of the most important techniques used to assure the quality of Web Services at present. Test-data generation is an important topic in Web Services testing. The quality of test data will influence the efficiency and cost when testing Web Services. Based on the contract-based mutation testing technique, this paper presents a method of automated test-data generation for Web Services. First, according to the description information and contracts in WSDL documents of Web Services, initial test data are generated automatically by the random method. Then the test data are selected using contract mutation testing. This method can generate a test suite meeting a certain contract mutation score, which indicates the quality and efficiency of testing. Finally, we have developed a prototype on the Microsoft .NET platform, and carried out some experiments. The results have shown that the proposed method is effective in automated test-data generation for Web Services.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Analysis for Understanding Software Security Requirement Methodologies 理解软件安全需求方法的分析
Jing Du, Ye Yang, Qing Wang
{"title":"An Analysis for Understanding Software Security Requirement Methodologies","authors":"Jing Du, Ye Yang, Qing Wang","doi":"10.1109/SSIRI.2009.14","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.14","url":null,"abstract":"Over the past two decades, large amount of work has been done to improve and assure software quality. However, as software development becomes more complex, distributed, and concurrent, security issues have great influence on software quality. Among those issues, the ones related to development of security requirement are especially critical to the development of software or software-intensive systems. In this paper, we will report our work on reviewing and analyzing different studies on software security requirement development to provide a common understanding for further research and study. Our major analysis findings include: Definition of security requirements in Common Criteria is a widely accepted one among various understandings; Elicitation and analysis are the mainstream activities during security requirement development; and process-oriented and reuse-based methods are gaining their popularities.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114374159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analyzing Relation between Software Architecture Testing Criteria on Test Sequences 基于测试序列的软件架构测试准则关系分析
L. Lun, Xuemei Ding
{"title":"Analyzing Relation between Software Architecture Testing Criteria on Test Sequences","authors":"L. Lun, Xuemei Ding","doi":"10.1109/SSIRI.2009.51","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.51","url":null,"abstract":"Software architecture provides a high-level model of large, complex systems using suitable abstractions of the system components and their interactions. SA dynamic descriptions can be usefully employed in testing and analysis. We describe an approach for SA-based test sequences. This paper discusses formal description of CHAM, and presents rule dependence graph, which shows the rule dependence relations of SA. Then we define two criteria and introduce algorithms to generate test sequences for rule dependence graph. Finally, a CASE tool is built, which uses Collaborative Writing system as an architecture model to illustrate the derivation of rule dependence graph and the generation of test sequences. Demonstration results present the relationship of test sequences on two criteria with the increasing numbers of components.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121636172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Path-Based Approach to Integration Testing 基于路径的集成测试方法
Jue-liang Hu, Zuohua Ding, G. Pu
{"title":"Path-Based Approach to Integration Testing","authors":"Jue-liang Hu, Zuohua Ding, G. Pu","doi":"10.1109/SSIRI.2009.48","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.48","url":null,"abstract":"In this paper, we focus on the matching of parameter type and order for integration testing. From the unit testing, we can obtain two outputs: 1)Interface Net that describes ports to receive parameters and to send parameters; 2)Mapping Table that describes the mappings between parameters coming in and parameters going out. To analyze the Interface Net and mappings precisely, we propose a forward slicing technique with symbolic execution to obtain the dependency relation for inputs and outputs. The Interface Net together with Mapping Table will create a Directed Graph, which can be used to generate integration test cases and to check parameter type. Furthermore, a formula is given to calculate the number of test cases. At the same time, the concept called Complexity Degree, is introduced to describe how hard the test going to be.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal 一个安全的方法来缩小电子邮件样本集,同时保持平衡之间的垃圾邮件和正常
Lili Diao, Hao Wang
{"title":"A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal","authors":"Lili Diao, Hao Wang","doi":"10.1109/SSIRI.2009.66","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.66","url":null,"abstract":"To deal with any possible cases for training antispam machine learning models, it is crucial to design a safe way to shrink the size of training sample set via reducing redundancies with minimal information loss for classification as well as make distribution of samples balanced. Presently, there is no such solution to do so. In this paper, we propose a safe approach to address these problems and improve the quality of training email sample pool (set) for getting high quality machine learning models for better anti-spam engine with non-biased high spam detection rates as well as low false positive rates.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from T4CIA Workshop Co-chairs 来自T4CIA研讨会联合主席的信息
Jun Pang, Bao Tang
{"title":"Message from T4CIA Workshop Co-chairs","authors":"Jun Pang, Bao Tang","doi":"10.1109/SSIRI.2009.5","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.5","url":null,"abstract":"A large number of applications in industrial sectors (e.g. telecom, medical, and energy) have many mission critical issues (e.g. security, reliability). How well these industry applications ensure the critical missions determines their competitive strengths in the market. On one hand, industrial companies have introduced and developed testing technologies and tools in industrial contexts, and applied them in these applications. On the other hand, academic researchers have produced and performed theoretical or experimental research on similar topics. This workshop aims to increase scientific interaction and cooperation between academic researchers and industrial practitioners in the area of critical industry applications. It provides an excellent platform for the exchange of ideas, discussion, cross-fertilization, inspiration, and co-operation. Both researchers and practitioners will present their results and experience to a broader audience.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115783324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Verification of Strong Atomicity in Programs Using STM 用STM验证程序的强原子性
Yong Li, Yu Zhang, Yiyun Chen, Ming Fu
{"title":"On the Verification of Strong Atomicity in Programs Using STM","authors":"Yong Li, Yu Zhang, Yiyun Chen, Ming Fu","doi":"10.1109/SSIRI.2009.8","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.8","url":null,"abstract":"Transactional memory(TM) provides an easy-using and high-performance parallel programming model for multicore systems. It simplifies parallel programming by supporting that transactions appear to execute atomically and in isolation. Despite the large amount of recent works on various TM implementations, very little has been devoted to precisely guarantee that these implementations have implemented the atomicity and isolation properties. In previous work we have proposed a framework on the correctness of STM programs by formally certifying the shared memory invariant at assembly level. Now the framework is extended and we certify the strong atomicity property of programs using STM in this paper. In particular, we formalize the strong atomicity as the shared memory consistence of states in our model and use a notion of \"local guarantee\" to check the shared memory consistence for verification. Our work provides a foundation for certifying realistic transactional programs and makes an important advance toward generating proof-carrying code.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114973109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keynote: Probabilistic Programming With Coordination and Compensation 主题演讲:协调与补偿的概率规划
{"title":"Keynote: Probabilistic Programming With Coordination and Compensation","authors":"","doi":"10.1109/SSIRI.2009.73","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.73","url":null,"abstract":"Failure is the typical phenomena of the execution of long-running transactions. To accommodate the random features of Internet-based computing we extend the Guarded Command Language by addition of probabilistic choice and coordination combinators. This paper deals with rollback and compensation mechanisms of the language by providing a probabilistic model. We also discuss algebraic properties of the new combinators, and show the completeness of the algebraic system by show how to convert programs to normal forms.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Approach to Improving Reliability for Distributed Video-Based Monitoring Systems 提高分布式视频监控系统可靠性的方法
M. Jiang, Yaping Liu, Xinzheng Gu
{"title":"An Approach to Improving Reliability for Distributed Video-Based Monitoring Systems","authors":"M. Jiang, Yaping Liu, Xinzheng Gu","doi":"10.1109/SSIRI.2009.34","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.34","url":null,"abstract":"A large-scale distributed system may experience software or hardware failures that lead to undesirable down-time of the system. While the failure of a hardware node is common for large distributed systems, the reliability of software can also be a significant factor. System reliability can be improved by integrating both hardware and software based reliability techniques. We presented a combined fault-tolerant approach to improve reliability for a large monitoring system through failure detection, isolation, and recovery. The proposed approach was applied to real-time distributed monitoring system and preliminary experiments showed substantial improvement on reliability. Experiments also showed that our approach is scaleable to meet the needs of large-scale monitoring systems.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信