{"title":"A Comparative Study of Forensic Science and Computer Forensics","authors":"Ryan Q. Hankins, T. Uehara, Jigang Liu","doi":"10.1109/SSIRI.2009.42","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.42","url":null,"abstract":"As the internet has reached every corner of the world as well as every aspect of our life, illegal activities go with it as well. In dealing with this phenomenon, a new professional and academic field, computer forensics, has emerged since the beginning of this century, The growth and advance of the new field has been steady, mainly because it has been following the path of forensic science due to the similarities between the two fields, as well as professionals’ experience and understanding of the field. As forensic science has been challenged and asked to have a major overhaul by a congressionally mandated report recently, where should computer forensics go? Based on a comparative study in various facets of both forensic science and computer forensics, some suggestions and considerations have been drawn in this paper, which imply that computer forensics may need to reposition itself to better promote the field over the long run.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132530554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anchored Text for Software Weaving and Merging","authors":"P. Varma","doi":"10.1109/SSIRI.2009.16","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.16","url":null,"abstract":"Text-based software merge/refactoring systems are predominantly used. Anchored text, a datatype with first-class location anchors and greater commutativity of software merge operations has been proposed recently. In this paper we develop anchored text as a novel weaver for simultaneous, separate concerns. Irregular, crosscutting concerns such as porting issues are applicable simultaneously (multi-dimensional separation of multi-target porting concerns), in order to allow for choice of a desired subset for a given port. Form-checking rules can be specified with individual concerns, to verify their correct weaving. The simultaneous concerns model can be viewed as an offline, concurrent change weaving problem, according to which a direct implementation is provided. A novel wait-free implementation of an online model, wherein concurrent changes arrive in a dynamic sequence but with fixed scheduling tags is provided and a highly-concurrent version of the same described using speculative scheduling. All these implementations use minimal synchronisation primitives only, namely atomic registers.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124324000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Test Quality by a Test Type Analysis Based Method","authors":"Qin Liu, Wenqiang Zheng, JunFei Ma","doi":"10.1109/SSIRI.2009.65","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.65","url":null,"abstract":"This paper describes an easy adapted method of improving test coverage and effectiveness in an on-going industrial project by introducing and applying ’test type’ into test case design and execution. It presents comparison results of the number of system test item, effectiveness of test cases, and defect detection percentage between two increments in a real-world telecom project. It argues the importance of carrying out a test type analysis approach for test design, and proved a better test effectiveness (improved 5%) and DDP(improved 14%) can be performed by implementing the proposed approach. There was only a slightly increase of the budget after adapting the approach.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Six-Sigma Based Performance Verification in Early Development of Automatic Test Equipment","authors":"Madhu Kilari, Qiyu Huang, T. Jin","doi":"10.1109/SSIRI.2009.13","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.13","url":null,"abstract":"This paper proposes a Six-Sigma based performance verification approach to characterizing the channel voltage variation of automatic testing equipment (ATE). The purpose of the performance verification is to determine the level of measurement uncertainty in ATE voltage channels. Six-Sigma tools may not be directly applied to the measurement data when the underlying distribution is highly skewed. A solution is to appropriately transform the original data set into a new domain such that the transformed data can be approximated by the normal distribution. Then the Six-Sigma tools can be adopted to quantify the lower and upper limits of the random voltage signals. The proposed method was successfully applied to characterize the noise window, or the voltage variation limits, on the broadband AC (BBAC) instrument.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126846806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability Computing for Service Composition","authors":"Zuohua Ding, Mingyue Jiang","doi":"10.1109/SSIRI.2009.56","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.56","url":null,"abstract":"Web service composition is a distributed model to construct new web service on top of existing primitive or other composite web services. However, current service technologies, including proposed composition languages, do not address the reliability of web service composition. Thus it is hard to predict the system reliability. In this paper, we propose a method to compute system reliability based on Service Component Architecture(SCA). We first present a formal service component signature model with respect to the specification of the SCA assembly model, and then propose a language-independent dynamic behaviour model for specifying the interface behaviour of the service component by port activities. Then the failure behaviors of ports are defined through the Enhanced Non-Homogeneous Poisson Process(ENHPP). Based on the semantics of ports, several rules have been generated to compute reliabilities of port expressions, thus the overall system reliability can be automatically computed.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CacheBit: A Multisource-Multitarget Cache Instrumentation Tool","authors":"Chao Xu, Jinghui Gu, Ling Lin, Alei Liang, Haibing Guan","doi":"10.1109/SSIRI.2009.72","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.72","url":null,"abstract":"The cache utilization seriously impacts on program performance, whereas the cache behavior is transparent to developers so that they cannot get opportunity to optimize their programs by reducing cache miss rates. This paper introduces a useful instrumentation tool, Cachebit, which is built with Crossbit - a dynamic binary translation (DBT) framework with intermediate instruction layer. Cachebit simulates cache behavior and presents statistics of cache profile at runtime. After running programs on Crossbit with Cachebit available, cache profile information can be reported to help developers rewrite and improve their programs. Moreover, by setting different cache characteristics (including cache size, block size, associative pattern, replacement policy, hierarchy number), Cachebit can simulate a variety of real cache architectures. Comparing with other analogous tools, Cachebit gives a multisource-multitarget testing platform, that is, programs can be tested on isomerous platforms.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Variability Design and Analysis in an Aspect Oriented Software Architecture","authors":"Lirong Dai","doi":"10.1109/SSIRI.2009.47","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.47","url":null,"abstract":"Developing secure systems at software architecture stage presents additional challenges: a system may demand multiple security capabilities and each security capability can be realized by many security solutions. Effective techniques are needed to assist software architects in modeling and evaluating security capabilities. The benefits of such techniques include enabling software architects to create an optimized security architecture design. This paper presents a modeling approach to support security variability design and analysis. In the approach, security capabilities are modeled as aspects and alternative security solutions are reflected. This allows to effectively perform interaction analysis among security solutions, e.g., determining supporting or conflicting solutions etc. A Health Watcher system is used to illustrate the approach, where the system is designed with two security aspects, data origin authentication and non-repudiation. The proposed security variability design approach has been showed to effectively support the interaction analysis between data origin authentication solutions and non-repudiation solutions.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry Applications","authors":"Bao Tang","doi":"10.1109/SSIRI.2009.79","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.79","url":null,"abstract":"","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126402196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Panel Description: Evolving Software Models for Global Organizations","authors":"R. Subramanyan","doi":"10.1109/SSIRI.2009.67","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.67","url":null,"abstract":"Demanding stakeholders, newer markets, continuous pressure to reduce costs and improving the bottom line are driving organizations to transform into nimble global organizations. With an organizational spread over geographies, multicultural teams and unique local environments and challenges, running a software delivery program for these organizations needs strong delivery models with sensitivity to local cultures. Such programs are likely to face challenges such as coordination, communication, synergy among multi-location teams, and configuration management etc. in the absence of a well defined global delivery model.The panel goal is to discuss evolving delivery models catering to the needs of large global organizations, both from a customer and service provider’s point of view","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126026972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Multi-secret Sharing Scheme Using Room Square","authors":"Ming-Jheng Li, Ying-Hsuan Chang, J. Juan","doi":"10.1109/SSIRI.2009.23","DOIUrl":"https://doi.org/10.1109/SSIRI.2009.23","url":null,"abstract":"In 1979, secret sharing scheme was first proposed by Shamir. In a secret sharing scheme, each participant receives a secret share in such a way that only authorized subsets can reconstruct the secret. Compare with Shamir’s scheme, Juan and Huang proposed an efficient secret sharing scheme from room square in 2005. Their scheme gave a practical algorithm to reduce the computation complexity by using room square, and obtained as (n − 1, n)-threshold secret sharing scheme. However, there is not any (t, n)-threshold secret sharing scheme for t ≤ n − 2 with more efficient than Shamir’s scheme has been proposed. For this reason, this paper utilizes the characteristic of cycle to design four (t, n)-threshold secret sharing schemes for t = n − 2. These proposed schemes are not only more efficient than previous related works in the computational complexity, but also with the information rate is approximated optimal value 1. In addition, we combine the proposed scheme and the property of room square to present a new multi-secret sharing scheme in this paper.","PeriodicalId":196276,"journal":{"name":"2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130709376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}