{"title":"Study on Formal Specification of Automatic Train Protection and Block System for Local Line","authors":"Guo Xie, A. Asano, Sei Takahashi, Hideo Nakamura","doi":"10.1109/SSIRI-C.2011.16","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.16","url":null,"abstract":"This paper presents a formal specification of an Automatic Train Protection and Block (ATPB) model for local line railway system in Japan proposed by the author [12], and validates the model by internal consistency proving and systematic testing. The system consists of two parts, the on-board subsystem and ground subsystem. The former is to detect the basic state of train, such as position, speed and integrity, monitor the speed, communicate with ground equipment and record the relative events. And the latter is responsible for communicating with train, controlling the route and interlocking, and decision-making for train operation adjustment. The main purpose of this project is to improve the efficiency and guarantee that there is no collision, no derailment and no over speeding at the same. The formal language used in this project is VDM++. And the state and specification of operation are all checked and validated using VDMTools. The results confirm the correctness of this system and the model throws new light on practical system design.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handling Periodic Properties: Deductive Verification for Quantified Temporal Logic Specifications","authors":"A. Bolotov","doi":"10.1109/SSIRI-C.2011.41","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.41","url":null,"abstract":"We present a deductive verification technique for the specifications written in terms of quantified propositional linear-time temporal logic (QPTL). The system extends previous natural deduction constructions for the propositional linear-time temporal logic. Our result expands the applicability of the natural deduction based verification in the temporal setting to more sophisticated specifications due to the expressive power of QPTL, which is equivalent to Buchi Automata. In particular, the paper introduces a novel formal framework to verify specifications of a larger set of useful periodic properties that are particularly important to maintain during different cycles of software integration. Moreover, the novel elegant and succinct natural deduction based verification method enables tracing the dependency of the verified properties on the assumptions of the underlying model and brings prospects for automation.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study on Installing a Porting Process for Embedded Operating System in a Small Team","authors":"Don-mooki Cho, Doo-Hwan Bae","doi":"10.1109/SSIRI-C.2011.14","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.14","url":null,"abstract":"Recently as the demand of smart devices increases, the porting of embedded operating systems such as Google Android, Microsoft Windows Mobile, and Embedded Linux, becomes more important. Consequently, the importance of efficient, systematic porting is also raised. Generally, developers initiate embedded operating system porting from getting operating system source codes and materials. After they get source codes, they modify the source codes, and then they test them. To identify porting in detail, we investigated a small porting team which has fifteen members. In this team, each developer has done porting depending on his or her knowledge and experience. Therefore, we tried to find studies for efficient, systematic porting, but we couldn't find sufficient study results. This study aims to analyze porting process in a small organization. Also, we'll suggest productive a porting process and evaluate productivity of the new process through a case study.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131583749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model for Usage-Based Testing of Event-Driven Software","authors":"S. Herbold, J. Grabowski, S. Waack","doi":"10.1109/SSIRI-C.2011.32","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.32","url":null,"abstract":"Event-driven software is very diverse, e.g., in form of Graphical User Interfaces (GUIs), Web applications, or embedded software. Regardless of the application, the challenges for testing event-driven software are similar. Most event-driven systems allow a huge number of possible event sequences, which makes exhaustive testing infeasible. As a possible solution, usage-based testing has been proposed for several types of event-driven software. However, previous work has always focused on one type of event-driven software. In this paper, we propose a usage-based testing model for event-driven software in general. The model is divided into three layers to provide a maximum of platform independence while allowing interoperability with existing platform dependent solutions.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Instrumentation Tool for Program Dynamic Analysis in Java","authors":"Chen Huajie, Zhang Tian, Bu Lei, Li Xuandong","doi":"10.1109/SSIRI-C.2011.20","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.20","url":null,"abstract":"Dynamic analysis has been widely used in program analysis. Instrumentation is a general technology used to trace dynamic behavior of software. This paper presents a java source code instrumentation tool, which supports making instrumentation manually and automatically according to rules based on AST analysis. On one hand, users can instrument source code manually. It supports to manage those instrumentation points. On the other hand, code snippets can be instrumented automatically in compliance with criteria defined by users. This tool defines some inside criteria and makes instrumentation automatically for them. What's more, these inside criteria can be expanded. By instrumentation, a dynamic execution report about the java source code can be obtained.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Machine Learning, a Brief Overview","authors":"Xiaofeng Liao, Liping Ding, Yongji Wang","doi":"10.1109/SSIRI-C.2011.15","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.15","url":null,"abstract":"The purpose of this article is to give a brief overview on the current work towards the emerging research problem of secure machine learning. Machine learning technique has been applied widely in various applications especially in spam detection and network intrusion detection. Most existing learning schemes assume that the environment they settle in is benign. However this is not always true in the real adversarial decision-making situations where the future data sets and the training data set are no longer from the same population, due to the transformations employed by the adversaries. As more and more machine learning systems are put into use, it is imperative to consider the security of the machine learning system. As a emerging problem, it is attracting more and more researchers' attention. In this article, we present a brief overview on secure machine learning and current progress on developing secure machine learning algorithms.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116061127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in Automatic Testing","authors":"Sunghun Kim, Ning Chen","doi":"10.1109/SSIRI-C.2011.43","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.43","url":null,"abstract":"This paper discuss challenges in automatic testing for object-oriented software including lack of objects, limited constraint solving, and difficulties of object mutation.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems","authors":"K. K. Fletcher, Xiaoqing Frank Liu","doi":"10.1109/SSIRI-C.2011.25","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.25","url":null,"abstract":"In recent past, the security of cyber-physical systems (CPSs) has been the subject of major concern. One of the reasons is that, CPSs are often applied to mission-critical processes. Also, the automation CPSs bring in managing physical processes, and the detail of information available to them for carrying out their tasks, make securing them a prime importance. Securing CPSs is a difficult task as systems are interconnected. In order to achieve a continuous secured CPS environment, there is the need for an integrated methodology to analyze, specify and prioritize security requirements and also to develop policies to meet them. First, CPS assets are represented using high-order object models. Second, swim lane diagrams are extended to include malactivities and prevention or mitigation options to decompose use cases. We analyze security threats pertaining to the hardware components, software components and the hardware-software interaction. Security requirements are then specified, and an analytical prioritization approach, based on relative priority analysis is employed to prioritize them. Finally, security policies are then developed to meet the requirements. To demonstrate its effectiveness and evaluate its application, the proposed methodology is applied in a structured approach to a test bed - Ayushman, a Pervasive Health Monitoring System (PHMS).","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128529363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-layered Adaptive Monitoring in Service Robots","authors":"H. Kim, H. Yoon, Y. Cho, S. Park, V. Sugumaran","doi":"10.1109/SSIRI-C.2011.22","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.22","url":null,"abstract":"Service failure in a service robot is an event that occurs when the delivered service deviates from the correct original service specified by the developers. The cause of failures is due to faults in the robot system, which can be detected based on a model. However, the monitoring task that compares the model and system's behavior is overload. In this study, we propose a multi-layered adaptive monitoring method that complements model-based fault detection. When the target component can be monitored according to their priority adaptively, it results in keeping the efficiency of fault detection, while the overload is reduced.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129269505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximate Simulation for Metric Hybrid Input/Output Automata","authors":"Haiyu Pan, Min Zhang, Yixiang Chen","doi":"10.1109/SSIRI-C.2011.19","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.19","url":null,"abstract":"Hybrid input/output automata provide a language for the description and analysis of hybrid systems. In this paper, we develop a notion of approximate simulation relation for metric hybrid input/output automata, which is an extension classic simulation relation in hybrid input/output automata, and investigate some interesting results. In addition, we discuss a particular kind of approximation simulation relation, i.e. approximate refinement. Moreover, we show how to adopt approximate synchronization methods to guarantee substitutive under the condition of approximate simulation.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}