2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion最新文献

筛选
英文 中文
Study on Formal Specification of Automatic Train Protection and Block System for Local Line 局域线路列车自动保护闭塞系统规范的研究
Guo Xie, A. Asano, Sei Takahashi, Hideo Nakamura
{"title":"Study on Formal Specification of Automatic Train Protection and Block System for Local Line","authors":"Guo Xie, A. Asano, Sei Takahashi, Hideo Nakamura","doi":"10.1109/SSIRI-C.2011.16","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.16","url":null,"abstract":"This paper presents a formal specification of an Automatic Train Protection and Block (ATPB) model for local line railway system in Japan proposed by the author [12], and validates the model by internal consistency proving and systematic testing. The system consists of two parts, the on-board subsystem and ground subsystem. The former is to detect the basic state of train, such as position, speed and integrity, monitor the speed, communicate with ground equipment and record the relative events. And the latter is responsible for communicating with train, controlling the route and interlocking, and decision-making for train operation adjustment. The main purpose of this project is to improve the efficiency and guarantee that there is no collision, no derailment and no over speeding at the same. The formal language used in this project is VDM++. And the state and specification of operation are all checked and validated using VDMTools. The results confirm the correctness of this system and the model throws new light on practical system design.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117167206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Handling Periodic Properties: Deductive Verification for Quantified Temporal Logic Specifications 处理周期性质:量化时间逻辑规范的演绎验证
A. Bolotov
{"title":"Handling Periodic Properties: Deductive Verification for Quantified Temporal Logic Specifications","authors":"A. Bolotov","doi":"10.1109/SSIRI-C.2011.41","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.41","url":null,"abstract":"We present a deductive verification technique for the specifications written in terms of quantified propositional linear-time temporal logic (QPTL). The system extends previous natural deduction constructions for the propositional linear-time temporal logic. Our result expands the applicability of the natural deduction based verification in the temporal setting to more sophisticated specifications due to the expressive power of QPTL, which is equivalent to Buchi Automata. In particular, the paper introduces a novel formal framework to verify specifications of a larger set of useful periodic properties that are particularly important to maintain during different cycles of software integration. Moreover, the novel elegant and succinct natural deduction based verification method enables tracing the dependency of the verified properties on the assumptions of the underlying model and brings prospects for automation.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Case Study on Installing a Porting Process for Embedded Operating System in a Small Team 在小型团队中安装嵌入式操作系统移植程序的案例研究
Don-mooki Cho, Doo-Hwan Bae
{"title":"Case Study on Installing a Porting Process for Embedded Operating System in a Small Team","authors":"Don-mooki Cho, Doo-Hwan Bae","doi":"10.1109/SSIRI-C.2011.14","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.14","url":null,"abstract":"Recently as the demand of smart devices increases, the porting of embedded operating systems such as Google Android, Microsoft Windows Mobile, and Embedded Linux, becomes more important. Consequently, the importance of efficient, systematic porting is also raised. Generally, developers initiate embedded operating system porting from getting operating system source codes and materials. After they get source codes, they modify the source codes, and then they test them. To identify porting in detail, we investigated a small porting team which has fifteen members. In this team, each developer has done porting depending on his or her knowledge and experience. Therefore, we tried to find studies for efficient, systematic porting, but we couldn't find sufficient study results. This study aims to analyze porting process in a small organization. Also, we'll suggest productive a porting process and evaluate productivity of the new process through a case study.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131583749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Model for Usage-Based Testing of Event-Driven Software 事件驱动软件基于使用的测试模型
S. Herbold, J. Grabowski, S. Waack
{"title":"A Model for Usage-Based Testing of Event-Driven Software","authors":"S. Herbold, J. Grabowski, S. Waack","doi":"10.1109/SSIRI-C.2011.32","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.32","url":null,"abstract":"Event-driven software is very diverse, e.g., in form of Graphical User Interfaces (GUIs), Web applications, or embedded software. Regardless of the application, the challenges for testing event-driven software are similar. Most event-driven systems allow a huge number of possible event sequences, which makes exhaustive testing infeasible. As a possible solution, usage-based testing has been proposed for several types of event-driven software. However, previous work has always focused on one type of event-driven software. In this paper, we propose a usage-based testing model for event-driven software in general. The model is divided into three layers to provide a maximum of platform independence while allowing interoperability with existing platform dependent solutions.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Instrumentation Tool for Program Dynamic Analysis in Java 一个用于Java程序动态分析的仪表工具
Chen Huajie, Zhang Tian, Bu Lei, Li Xuandong
{"title":"An Instrumentation Tool for Program Dynamic Analysis in Java","authors":"Chen Huajie, Zhang Tian, Bu Lei, Li Xuandong","doi":"10.1109/SSIRI-C.2011.20","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.20","url":null,"abstract":"Dynamic analysis has been widely used in program analysis. Instrumentation is a general technology used to trace dynamic behavior of software. This paper presents a java source code instrumentation tool, which supports making instrumentation manually and automatically according to rules based on AST analysis. On one hand, users can instrument source code manually. It supports to manage those instrumentation points. On the other hand, code snippets can be instrumented automatically in compliance with criteria defined by users. This tool defines some inside criteria and makes instrumentation automatically for them. What's more, these inside criteria can be expanded. By instrumentation, a dynamic execution report about the java source code can be obtained.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Machine Learning, a Brief Overview 安全机器学习概述
Xiaofeng Liao, Liping Ding, Yongji Wang
{"title":"Secure Machine Learning, a Brief Overview","authors":"Xiaofeng Liao, Liping Ding, Yongji Wang","doi":"10.1109/SSIRI-C.2011.15","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.15","url":null,"abstract":"The purpose of this article is to give a brief overview on the current work towards the emerging research problem of secure machine learning. Machine learning technique has been applied widely in various applications especially in spam detection and network intrusion detection. Most existing learning schemes assume that the environment they settle in is benign. However this is not always true in the real adversarial decision-making situations where the future data sets and the training data set are no longer from the same population, due to the transformations employed by the adversaries. As more and more machine learning systems are put into use, it is imperative to consider the security of the machine learning system. As a emerging problem, it is attracting more and more researchers' attention. In this article, we present a brief overview on secure machine learning and current progress on developing secure machine learning algorithms.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116061127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Challenges in Automatic Testing 自动化测试面临的挑战
Sunghun Kim, Ning Chen
{"title":"Challenges in Automatic Testing","authors":"Sunghun Kim, Ning Chen","doi":"10.1109/SSIRI-C.2011.43","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.43","url":null,"abstract":"This paper discuss challenges in automatic testing for object-oriented software including lack of objects, limited constraint solving, and difficulties of object mutation.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems 信息物理系统中的安全需求分析、规范、优先级和策略开发
K. K. Fletcher, Xiaoqing Frank Liu
{"title":"Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems","authors":"K. K. Fletcher, Xiaoqing Frank Liu","doi":"10.1109/SSIRI-C.2011.25","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.25","url":null,"abstract":"In recent past, the security of cyber-physical systems (CPSs) has been the subject of major concern. One of the reasons is that, CPSs are often applied to mission-critical processes. Also, the automation CPSs bring in managing physical processes, and the detail of information available to them for carrying out their tasks, make securing them a prime importance. Securing CPSs is a difficult task as systems are interconnected. In order to achieve a continuous secured CPS environment, there is the need for an integrated methodology to analyze, specify and prioritize security requirements and also to develop policies to meet them. First, CPS assets are represented using high-order object models. Second, swim lane diagrams are extended to include malactivities and prevention or mitigation options to decompose use cases. We analyze security threats pertaining to the hardware components, software components and the hardware-software interaction. Security requirements are then specified, and an analytical prioritization approach, based on relative priority analysis is employed to prioritize them. Finally, security policies are then developed to meet the requirements. To demonstrate its effectiveness and evaluate its application, the proposed methodology is applied in a structured approach to a test bed - Ayushman, a Pervasive Health Monitoring System (PHMS).","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128529363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Multi-layered Adaptive Monitoring in Service Robots 服务机器人的多层自适应监控
H. Kim, H. Yoon, Y. Cho, S. Park, V. Sugumaran
{"title":"Multi-layered Adaptive Monitoring in Service Robots","authors":"H. Kim, H. Yoon, Y. Cho, S. Park, V. Sugumaran","doi":"10.1109/SSIRI-C.2011.22","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.22","url":null,"abstract":"Service failure in a service robot is an event that occurs when the delivered service deviates from the correct original service specified by the developers. The cause of failures is due to faults in the robot system, which can be detected based on a model. However, the monitoring task that compares the model and system's behavior is overload. In this study, we propose a multi-layered adaptive monitoring method that complements model-based fault detection. When the target component can be monitored according to their priority adaptively, it results in keeping the efficiency of fault detection, while the overload is reduced.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129269505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Approximate Simulation for Metric Hybrid Input/Output Automata 度量混合输入/输出自动机的近似仿真
Haiyu Pan, Min Zhang, Yixiang Chen
{"title":"Approximate Simulation for Metric Hybrid Input/Output Automata","authors":"Haiyu Pan, Min Zhang, Yixiang Chen","doi":"10.1109/SSIRI-C.2011.19","DOIUrl":"https://doi.org/10.1109/SSIRI-C.2011.19","url":null,"abstract":"Hybrid input/output automata provide a language for the description and analysis of hybrid systems. In this paper, we develop a notion of approximate simulation relation for metric hybrid input/output automata, which is an extension classic simulation relation in hybrid input/output automata, and investigate some interesting results. In addition, we discuss a particular kind of approximation simulation relation, i.e. approximate refinement. Moreover, we show how to adopt approximate synchronization methods to guarantee substitutive under the condition of approximate simulation.","PeriodicalId":284923,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书