{"title":"Task Resource Planning and Verification Method Based on Intelligent Planning","authors":"Haiqing Wang, Peng Sun","doi":"10.1109/QRS-C.2018.00071","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00071","url":null,"abstract":"In order to meet the demands of rapid resource scheduling and capability recombination in a rapidly changing environment, real-time and dynamic resource planning and flexible scheduling are carried out in a relatively short time within a wide space. The paper proposes a fast generation method of task system resource guarantee plan based on intelligent planning, allocation mechanism and verification method. In this paper, we use an ontology-based semantic representation model and Hierarchical Task Network (HTN) to get the corresponding sequences of the resource type, breaking through the hierarchical task network planning combined with business process driven technology, to implement the task decomposition and resource guarantee scheme generation technique. Then we use Multidimensional Dynamic List Scheduling (MDLS) resource allocation algorithm to complete screening and the operation of the specific distribution of resources. During the resource allocation, we use conflict resolution algorithm to avoid resource conflict, to ensure resource combination optimization.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lessons Learned from Developing Permissioned Blockchains","authors":"W. Tsai, Lian Yu","doi":"10.1109/QRS-C.2018.00014","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00014","url":null,"abstract":"We have been developing permissioned blockchains (BC) since 2015 and encountered numerous issues. Some of these issues are well known, but some are unknown before. This paper summarizes these lessons learned including communication and consensus protocols. Even though communications protocols and consensus protocols have been under development and experimentation for over forty years, we still encountered issues not addressed before. These issues require innovative solutions to ensure that dependable BC will be operating at a high speed.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method of Evolutionary Testing for Path Coverage","authors":"Qingjie Wei, Yijin Li, Yuheng Zhang","doi":"10.1109/QRS-C.2018.00028","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00028","url":null,"abstract":"In order to solve the irrationality of the existing methods, we developed a new method of automatic test data generation for path coverage based on the evolutionary testing. We developed a new method of path coding and built a new objective function for automatic test data generation of multiple-path coverage. According to the experiments, we found that our method can improve the convergence rate, stabilization and the coverage rate of target path effectively, especially when the logic structure of program under test is complicated.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Similarities between Blockchains and Merkle-Damgård Hash Functions","authors":"Kimmo Halunen, V. Vallivaara, A. Karinsalo","doi":"10.1109/QRS-C.2018.00035","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00035","url":null,"abstract":"Blockchain as a new technology has created a great amount of hype and hope for different applications. There is a promise of a better, decentralised trust based on strict guarantees from cryptography. However, there is a great similarity in the structure of blockchains and classical iterated hash functions of the Merkle-Damgård (M-D) type. As the structure of M-D type hash functions has been extensively studied and many different structural weaknesses have been exposed, it is plausible to think that blockchains also share these structural problems. In this paper, we present the most relevant problems of M-D type hash functions and their relation to blockchains. We also examine how these might affect currently established blockchains. Our results can help in avoiding some problems in the design of new blockchain systems and also provide some (theoretical) limits on the trustworthiness of current blockchains.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127980469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction of a Tool-Based Continuous Information Security Management System: An Exploratory Case Study","authors":"M. Brunner, Andrea Mussmann, R. Breu","doi":"10.1109/QRS-C.2018.00088","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00088","url":null,"abstract":"Tighter regulatory demands and higher customer expectations regarding the protection of information force enterprises to systematically ensure confidentiality, integrity and availability of stored information and processing facilities. Information Security Management Systems (ISMSs) are used to address these challenges. Recent studies show that the majority of companies plans to establish at least basic information security management to prepare for future developments. Larger enterprises have already embraced ISMSs, whereas small and medium-sized enterprises (SMEs) are catching up and require support in defining, introducing and operating them. We developed ADAMANT, an SME-friendly tool that supports continuous information security management incorporating stakeholders of different domains. In this paper, we evaluated our approach to introduce an ISMS in SMEs using an introductory information security training. The evaluation shows that our tool improves critical information security management tasks. Furthermore, integrating ADAMANT in customized security trainings allows companies to directly use training results to implement an ISMS.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126910261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence Maximization Algorithms Research Based on Big Graphs","authors":"Guigang Zhang, Chuanchuan You","doi":"10.1109/QRS-C.2018.00096","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00096","url":null,"abstract":"Unlike the traditional methods, such as the Independent Cascade Model and Liner Threshold Model. In this paper, we propose a kind of new Degree-priority heuristic IM algorithm in a big graph. We prove this algorithm. We do some experiments and make some comaparision between the Degree-priority heuristic IM algorithm and traditional IM algorithm.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126254518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded Software Fault Prediction Based on Back Propagation Neural Network","authors":"P. Zong, Yichen Wang, F. Xie","doi":"10.1109/QRS-C.2018.00098","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00098","url":null,"abstract":"Predicting software faults before software testing activities can help rational distribution of time and resources. Software metrics are used for software fault prediction due to their close relationship with software faults. Thanks to the non-linear fitting ability, Neural networks are increasingly used in the prediction model. We first filter metric set of the embedded software by statistical methods to reduce the dimensions of model input. Then we build a back propagation neural network with simple structure but good performance and apply it to two practical embedded software projects. The verification results show that the model has good ability to predict software faults.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121291051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Method of Redundancy System Reliability Analysis Based on AADL Models","authors":"Yin Lu, Yunwei Dong, Xiaomin Wei, Mingrui Xiao","doi":"10.1109/QRS-C.2018.00060","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00060","url":null,"abstract":"A hybrid method of reliability analysis based on AADL models is proposed in this paper, in order to handle the problem of reliability analyzation of multi-modes redundancy system. In our method, target system in different modes is mapped into several temporal subsystems. Then an upper level system is created to hold all these subsystems, and is regarded as the mapping of the original target system. Architecture model and error model are re-constructed for these created systems. After the reconstruction of the system, a GSPN based reliability analysis method is adopted for the reliability analysis of the temporal subsystems, while a FTA based analyzation method is used with the top level system, so that to gain a clear view of the relationships between typical system failure and the states of system in different working modes. The algorithm of static fault tree generation from AADL error model is implemented within EMF, and the generated fault tree is directed into the OpenFTA toolkit for analyzation. The hybrid reliability analysis method is tested with the example illustrated in SAE5506 EMV2.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127754984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security Considerations for Wireless Infusion Pumps","authors":"P. RajendraPrasad, S. Butakov, Fehmi Jaafar","doi":"10.1109/QRS-C.2018.00081","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00081","url":null,"abstract":"Wireless Infusion Pumps are an inevitable part of Hospital Delivery Organizations (HDOs). Nowadays there have been lots of cases of recalls of infusion pumps due to vulnerabilities existing in the devices that make it a safety concern for use on patients before patching the cyber security issues. This research has been conducted with the participation of Public Health Alberta to present an overview of what is the security considerations to design secure software for infusion pumps. In this paper, possible attacks have been specified to create an understanding of the potential dangers that exist for wireless infusion pumps. Moreover, components that should be secured have been identified. This paper proposes controls by incorporating security measures at the design phase of software development of Wireless Infusion Pumps.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Android Malware Behavior","authors":"Fehmi Jaafar, Gagandeep Singh, P. Zavarsky","doi":"10.1109/QRS-C.2018.00091","DOIUrl":"https://doi.org/10.1109/QRS-C.2018.00091","url":null,"abstract":"Android is dominating the smartphone market with more users than any other mobile operating system. But with its growing popularity, interest from attackers has also increased, as the number of malicious applications keeps on rising. To know more about these applications, investigation of their behavior has become very important. In our paper, we present a study that combines static and dynamic analysis of these applications with an aim to analyze their behavior by examining various attributes such as permission, CPU usage, volatile memory, and traffic. The experimental result of the static analysis shows that top permissions are used by malware to access network state, Internet, write external phone state, and read phone state. Our results of runtime experiments show that CPU usage of malicious applications is on average half that of normal applications while in terms of volatile memory usage malicious applications occupied more RAM than legitimate ones. Traffic analysis includes transmission rate between endpoints which is higher in malware compared to normal applications with a higher number of malformed packets. Based on the above-mentioned four attributes, the behavior of malware can be understood and this behavior can assist in differentiating malicious apps from legitimate applications.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128083202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}