Proceedings of the 7th Asia-Pacific Symposium on Internetware最新文献

筛选
英文 中文
Invariant Synthesis for Programs Manipulating Arrays with Unbounded Data 用无界数据操作数组的程序的不变性综合
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875942
Bin Li, Zhenhao Tang, Jianhua Zhao
{"title":"Invariant Synthesis for Programs Manipulating Arrays with Unbounded Data","authors":"Bin Li, Zhenhao Tang, Jianhua Zhao","doi":"10.1145/2875913.2875942","DOIUrl":"https://doi.org/10.1145/2875913.2875942","url":null,"abstract":"This paper proposes a way of using abstract interpretation for discovering properties about array contents in some restricted cases: one-dimensional arrays, traversed by simple loops. The method summarizes an array property as an interval property. According to different statements, an interval property may be generated, updated or killed. The method is able to discover the properties of non-trivial examples.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114120134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Context-Aware User Requirements from Crowd Contributed Mobile Data 从人群贡献的移动数据中挖掘上下文感知的用户需求
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875933
Wenjie Liang, Wenyi Qian, Yijian Wu, Xin Peng, Wenyun Zhao
{"title":"Mining Context-Aware User Requirements from Crowd Contributed Mobile Data","authors":"Wenjie Liang, Wenyi Qian, Yijian Wu, Xin Peng, Wenyun Zhao","doi":"10.1145/2875913.2875933","DOIUrl":"https://doi.org/10.1145/2875913.2875933","url":null,"abstract":"Internetware is required to respond quickly to emergent user requirements or requirements changes by providing application upgrade or making context-aware recommendations. As user requirements in Internet computing environment are often changing fast and new requirements emerge more and more in a creative way, traditional requirements engineering approaches based on requirements elicitation and analysis cannot ensure the quick response of Internetware. In this paper, we propose an approach for mining context-aware user requirements from crowd contributed mobile data. The approach captures behavior records contributed by a crowd of mobile users and automatically mines context-aware user behavior patterns (i.e., when, where and under what conditions users require a specific service) from them using Apriori-M algorithm. Based on the mined user behaviors, emergent requirements or requirements changes can be inferred from the mined user behavior patterns and solutions that satisfy the requirements can be recommended to users. To evaluate the proposed approach, we conduct an experimental study and show the effectiveness of the requirements mining approach.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114952120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Study on Power Side Channels on Mobile Devices 移动设备电源侧信道的研究
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875934
Lin Yan, Yao Guo, Xiangqun Chen, Hong Mei
{"title":"A Study on Power Side Channels on Mobile Devices","authors":"Lin Yan, Yao Guo, Xiangqun Chen, Hong Mei","doi":"10.1145/2875913.2875934","DOIUrl":"https://doi.org/10.1145/2875913.2875934","url":null,"abstract":"Power side channel is a very important category of side channels, which can be exploited to steal confidential information from a computing system by analyzing its power consumption. In this paper, we demonstrate the existence of various power side channels on popular mobile devices such as smartphones. Based on unprivileged power consumption traces, we present a list of real-world attacks that can be initiated to identify running apps, infer sensitive UIs, guess password lengths, and estimate geo-locations. These attack examples demonstrate that power consumption traces can be used as a practical side channel to gain various confidential information of mobile apps running on smartphones. Based on these power side channels, we discuss possible exploitations and present a general approach to exploit a power side channel on an Android smartphone, which demonstrates that power side channels pose imminent threats to the security and privacy of mobile users. We also discuss possible countermeasures to mitigate the threats of power side channels.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123292811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Facilitating Reusable and Scalable Automated Testing and Analysis for Android Apps 促进Android应用程序的可重用和可扩展的自动化测试和分析
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875937
Zhanshuai Meng, Yanyan Jiang, Chang Xu
{"title":"Facilitating Reusable and Scalable Automated Testing and Analysis for Android Apps","authors":"Zhanshuai Meng, Yanyan Jiang, Chang Xu","doi":"10.1145/2875913.2875937","DOIUrl":"https://doi.org/10.1145/2875913.2875937","url":null,"abstract":"Mobile apps are prevalent in everyone's daily life. However, apps are oftentimes defective, undermining their convenience, and therefore automated testing and analysis of apps are developed to enhance apps' quality. As these advanced technologies become increasingly effective and complicated, prototyping such a tool also becomes a challenge. To facilitate easy development of high-quality testing and analysis tools that work with real-world apps, we in this paper present the design and implementation of ATT (Android Testing Toolkit), for crafting reusable and scalable testing and analysis on Android apps. ATT consists of integrated tools and APIs for event generation, profiling and program instrumentation, and can be distributed over cloud platforms for scalable testing and analysis. We qualitatively evaluated the applicability of ATT by demonstrating implementation of a series of existing and enhanced work (RERAN, Monkey+ and UGA) upon ATT, and quantitatively studied the scalability of parallelized UGA on a cloud platform with five real-world apps. We believe that our ATT tool would facilitate development of more advanced testing and analysis approaches for Android apps.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129197155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analyzing Inductively Defined Properties for Recursive Data Structures 递归数据结构的归纳定义属性分析
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875930
Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li
{"title":"Analyzing Inductively Defined Properties for Recursive Data Structures","authors":"Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li","doi":"10.1145/2875913.2875930","DOIUrl":"https://doi.org/10.1145/2875913.2875930","url":null,"abstract":"This paper proposes a framework facilitating the analysis on inductively defined properties for recursive data structures. Our work has three main parts. First, it helps simplify the analysis of heap-manipulating programs by classifying inductive properties of recursive data structures into two classifications and each of them is handled with observed patterns. Second, we propose a technique called slicing and splicing to track and specify how data structures are manipulated by programs, in which data structures are first sliced into several parts and these parts are further spliced into new data structures. Third, this work presents a property-directed interprocedural analysis, together with an algorithm to check the boundaries of modified procedure-local heaps regarding the recursive data structures pointed to by the parameters passed to the procedures.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123047818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Buggy Files based on Bug Reports: A Random Walk Based Approach 基于Bug报告检测Bug文件:一种基于随机游走的方法
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875939
Yaojing Wang, Feng Xu, Yuan Yao, Yong Wu
{"title":"Detecting Buggy Files based on Bug Reports: A Random Walk Based Approach","authors":"Yaojing Wang, Feng Xu, Yuan Yao, Yong Wu","doi":"10.1145/2875913.2875939","DOIUrl":"https://doi.org/10.1145/2875913.2875939","url":null,"abstract":"During an Open Source Software (OSS) maintenance, bug localization is a laborsome and time-consuming work for geographically-separated developers. It is desirable to automatically identify related buggy files once a bug report is submitted. Existing work has proposed information retrieval techniques for this problem. However, these proposals tend to neglect the inherent structure in bug localization and they are largely dependent on the comments (annotations) in source files which may be unavailable. In this paper, we propose a random walk based approach to detecting buggy source files based on bug reports. In particular, we separately process source files and bug reports to make it less sensitive to comments, and then apply random walk to capture the inherent structure in bug localization. Experimental evaluations on three real-world open-source projects demonstrate that the proposed approach can outperform several existing methods and that it is less dependent on the comments in source files.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining Crowd Contributions with Machine Learning to Detect Malicious Mobile Apps 结合群体贡献和机器学习检测恶意移动应用程序
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875941
Dahai Yao, Hailong Sun, Xudong Liu
{"title":"Combining Crowd Contributions with Machine Learning to Detect Malicious Mobile Apps","authors":"Dahai Yao, Hailong Sun, Xudong Liu","doi":"10.1145/2875913.2875941","DOIUrl":"https://doi.org/10.1145/2875913.2875941","url":null,"abstract":"Android is undoubtedly becoming the most popular smartphone platform. The popularity of Android, unfortunately, has also made the devices become the target of malware. Most of existing malicious mobile apps feature stealthy operations such as collecting user privacy, sending premium SMS messages and making unauthorized http connections with no legal notice to the affected user. However, transmission of sensitive data cannot indicate malicious behavior because some benign applications also need sensitive data to improve the user experience. Existing malware detection approaches focus on static or dynamic analysis without crowd user contributions. In this paper, we propose a novel technique which combining crowd contributions with machine learning to detect malicious mobile apps. We model privacy transmission as user-determined and undetermined with the help of real user decisions based on crowdsourcing. We apply static analysis to extract application basic information such as permissions and suspicious API calls. Then we use dynamic instrumentation technique to trace real API calls at runtime and collect the crowd user decisions to the prompted sensitive data transmission. Finally, we employ several different learning-based algorithms, such as SVM, Bayesian Network, Decision Tree and KNN to detect malicious apps. Experiments with 100 real application samples show that our system was capable of detecting malicious mobile apps: our system can detect 85% to 97% of the malware with low false positive rate.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127816719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A hybrid static analysis refinement approach within internetware environment 互联网环境下的混合静态分析细化方法
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875928
Dalin Zhang, Gang Yin, Dahai Jin, Yunzhan Gong, Tianshuang Wu, Hailong Zhang
{"title":"A hybrid static analysis refinement approach within internetware environment","authors":"Dalin Zhang, Gang Yin, Dahai Jin, Yunzhan Gong, Tianshuang Wu, Hailong Zhang","doi":"10.1145/2875913.2875928","DOIUrl":"https://doi.org/10.1145/2875913.2875928","url":null,"abstract":"In this paper, we propose a hybrid refinement approach to improve the accuracy of static analysis. It keeps condition constraints information during forward dataflow analysis and gets the satisfiability of a warning by a constraint solver taking as input such information and path conditions; data regression analysis can remedy the capability of handling loops and library calls of abstract interpretation technique. It has been implemented in our static analysis tool, Defect Testing System (DTS) and deployed on a internetware environment TRUSTIE. Experiment on a large number of C open source projects shows the great improvement this strategy makes.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125661404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Crowdsourcing framework for Detecting Cross-Browser Issues in Web Application 一个检测Web应用跨浏览器问题的众包框架
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 2015-11-06 DOI: 10.1145/2875913.2875945
Mei He, Hongyin Tang, Guoquan Wu, Jun Wei, Hua Zhong
{"title":"A Crowdsourcing framework for Detecting Cross-Browser Issues in Web Application","authors":"Mei He, Hongyin Tang, Guoquan Wu, Jun Wei, Hua Zhong","doi":"10.1145/2875913.2875945","DOIUrl":"https://doi.org/10.1145/2875913.2875945","url":null,"abstract":"With the advent of Web 2.0 application, and the increasing number of browsers and platforms on which the applications can be executed, cross-browser incompatibilities (XBIs) are becoming a serious problem for organizations to develop web-based software with good user experience. Although some techniques and tools have been proposed to identify XBIs, some XBIs are still missed as only partial state space is explored (by the crawler) in the testing environment. To address this limitation, based on record/replay technique, this paper proposed a crowdsourcing framework to detect cross-browser issues for Web application deployed in the field. Our empirical evaluation shows that the proposed technique is effective and efficient, improves on the state of the art.","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proceedings of the 7th Asia-Pacific Symposium on Internetware 第七届亚太互联网研讨会论文集
Proceedings of the 7th Asia-Pacific Symposium on Internetware Pub Date : 1900-01-01 DOI: 10.1145/2875913
{"title":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","authors":"","doi":"10.1145/2875913","DOIUrl":"https://doi.org/10.1145/2875913","url":null,"abstract":"","PeriodicalId":361135,"journal":{"name":"Proceedings of the 7th Asia-Pacific Symposium on Internetware","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128629243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信