{"title":"Handling Emergency Mode Switch for Component-Based Systems","authors":"Y. Hang, H. Hansson","doi":"10.1109/APSEC.2014.32","DOIUrl":"https://doi.org/10.1109/APSEC.2014.32","url":null,"abstract":"Software reuse is deemed as an effective technique for managing the growing software complexity of large systems. Software complexity can also be reduced by partitioning the system behavior into different modes. Such a multi-mode system is able to dynamically change its behavior by switching between different modes. When a multi-mode system is developed by reusable software components, a crucial issue is how to achieve a seamless composition of multi-mode components and handle mode switch properly. This is the motivation for the Mode Switch Logic (MSL), supporting the development of component-based multi-mode systems by providing mechanisms for mode switch handling. In this paper, MSL is extended and adapted to systems with emergency triggering of mode switches that must be handled with minimal delay. We propose an Immediate Handling with Buffering (IHB) approach to enable the responsive handling of such an emergency event in the presence of other concurrent non-emergency mode switch events. We present a model checking based verification of IHB and illustrate its benefits by an example.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hirohisa Aman, S. Amasaki, Takashi Sasaki, Minoru Kawahara
{"title":"Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines","authors":"Hirohisa Aman, S. Amasaki, Takashi Sasaki, Minoru Kawahara","doi":"10.1109/APSEC.2014.93","DOIUrl":"https://doi.org/10.1109/APSEC.2014.93","url":null,"abstract":"This paper focuses on comments described in Java programs, and conducts an empirical analysis about relationships between comments and fault-proneness in the programs. The types of comments analyzed in this paper are comments described inside a method body (inner comments), and comments followed by a method declaration (documentation comments). Although both of them play important roles in the program comprehension, they seem to be described in different purposes, The inner comments are often added to present tips about code fragments, while the documentation comments usually work as a programmer's manual. In the field of code refactoring, well-written inner comments are said to be related to \"code smell\" since they may cover a lack of readability in a complicated code fragment. This paper analyzes the associations of comments with the code quality from the aspect of fault-proneness, with using four popular open source products. The empirical results show that a method having inner comments tends to be 1.8 - 3.0 times likely to be faulty. The key contribution of this work is to reveal the usefulness of inner comments to point at faulty methods.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SYNCEYE: An Availability Measurement Tool for Embedded Systems","authors":"Junghwan Lee, Kwangyong Lee","doi":"10.1109/APSEC.2014.84","DOIUrl":"https://doi.org/10.1109/APSEC.2014.84","url":null,"abstract":"In case of safety-critical embedded systems, software must have high availability to provide non-stop and reliable service. Therefore, we want to measure the availability of our system. However, using past methods, it takes a long time to measure availability because of irregular occurrence of faults. In this paper, we present SYNCEYE, which is a kind of fast availability measurement tool. To get the availability in a short period, SYNCEYE only measures MTTR (or downtime) using a fault injector. And then, it just calculates the availability with the heuristic MTTF (or uptime) such as 13.89 hours for achieving 99.999% availability goal. It helps us to decide a direction of optimization of the embedded systems.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134643559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Developer Ranking Algorithm for Automatic Bug Triage Using Topic Model and Developer Relations","authors":"Zhang Tao, Geunseok Yang, Byungjeong Lee, E. Lua","doi":"10.1109/APSEC.2014.43","DOIUrl":"https://doi.org/10.1109/APSEC.2014.43","url":null,"abstract":"Recently, bug resolution has become a pivotal issue for software maintenance where recommendations for appropriate fixers are an important task. Some approaches (e.g., Social network and machine learning techniques) exist that can achieve automatic bug triage (i.e., Developer recommendation). This paper proposes a new method to recommend the most suitable fixer for bug resolution. Different from previous approaches, the proposed approaches combine topic model and developer relations (e.g., Bug reporter and assignee) to capture developers' interest and experience on specific bug reports, we can arrange for the most appropriate developer to fix a new bug when it comes in. We evaluate the performance of our method using three large-scale open-source projects, including Eclipse, Mozilla Fire fox, and Net beans. The experimental results reveal that our approach outperforms other recommendation methods for developers.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132195957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nakai, Kiyoshi Honda, H. Washizaki, Y. Fukazawa, Ken Asoh, Kazuyoshi Takahashi, Kentarou Ogawa, M. Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, S. Yamada, Daisuke Miyazaki
{"title":"Initial Industrial Experience of GQM-Based Product-Focused Project Monitoring with Trend Patterns","authors":"H. Nakai, Kiyoshi Honda, H. Washizaki, Y. Fukazawa, Ken Asoh, Kazuyoshi Takahashi, Kentarou Ogawa, M. Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, S. Yamada, Daisuke Miyazaki","doi":"10.1109/APSEC.2014.91","DOIUrl":"https://doi.org/10.1109/APSEC.2014.91","url":null,"abstract":"It is important for project stakeholders to identify the states of projects and quality of products. Although metrics are useful for identifying them, it is difficult for project stake-holders to select appropriate metrics and determine the purpose of measuring metrics. We propose an approach that defines the measured metrics by GQM method to identify tendency in projects and products based on Trend Pattern. Additionally, we implement a tool as a Jenkins Plug in to visualize an evaluation results based on GQM method. We perform an industrial case study, which objects are two software development projects. In our industrial case study, we can identify the problem that product contains. As our future work, we will adopt our approach and GQM Plug in to software development project continuously to assess their effectiveness in the long term.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122426102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Application-Device Matching Method for the Mobile Software Ecosystem","authors":"Heuijin Lee, Sungwon Kang, Myung-Gyun Kim","doi":"10.1109/APSEC.2014.36","DOIUrl":"https://doi.org/10.1109/APSEC.2014.36","url":null,"abstract":"In the mobile software ecosystem, a method that finds out the applications that are compatible with the device of an end user is called application-device matching. In the current mobile software environment, the device fragmentation causes substantial degree of inaccuracy in matching applications with devices as the traditional platform-centric method handles only the features of platform vendors without considering the unique feature set of a certain device, such as device-manufacturer's features, resulting in a low accuracy in matching applications and devices. This paper proposes a new matching method that is device-centric, which achieves high accuracy in application-device matching by grouping features of existing devices and then using it as criteria of application-device matching. To demonstrate the performance of our method, we conduct a case study with 22 devices and 10 applications in the Google Android mobile software ecosystem. The result of case study shows our proposed method shows a higher accuracy.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Flow Based Integration Testing for Embedded System Using Interaction Model","authors":"Hossain Muhammad Iqbal, W. Lee","doi":"10.1109/APSEC.2014.68","DOIUrl":"https://doi.org/10.1109/APSEC.2014.68","url":null,"abstract":"Embedded system covers a large range of highly sensitive area where a slightest error can damage large number of resources even cost human life. So testing embedded system is extremely essential concern in computer science industry. Errors can lies between interacting software and hardware module of embedded system. This interactions can be modeled in terms of data flows between subsystems, i.e. Module, component etc. Tracking data flow across different components is important because applications use this to activate interactions that acquire different values and resources in ways that may ultimately exercise faults. Integration testing is a verification technique of the interfaces among system parts. The integration test of software components is especially concerned with the detection and uncover of interface errors, which are not detectable during unit testing. Existing integration testing approaches typically focused on direct interaction of subsystems which is done by function call but there exists other interactions for indirect dependencies between subsystems, which may occur faults in the system. There are no specific general models for representing all interactions. In this paper we propose an interaction model to cover all possible direct and indirect interaction and provide an integration testing approach using data flow analysis to generate minimal test cases efficiently.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Xi, Chang Xu, Wenhua Yang, Ping Yu, Xiaoxing Ma, Jiang Lu
{"title":"SHAP: Suppressing the Detection of Inconsistency Hazards by Pattern Learning","authors":"Wang Xi, Chang Xu, Wenhua Yang, Ping Yu, Xiaoxing Ma, Jiang Lu","doi":"10.1109/APSEC.2014.64","DOIUrl":"https://doi.org/10.1109/APSEC.2014.64","url":null,"abstract":"Context-aware applications rely on contexts derived from sensory data to adapt their behavior. However, contexts can be inconsistent and cause application anomaly or crash. One popular solution is to detect and resolve context inconsistencies at runtime. However, we observe that many detected inconsistencies do not indicate real context problems. Instead, they are caused by improper inconsistency detection. These inconsistencies are harmless, and their resolution is unnecessary or may even cause new problems. We name them inconsistency hazards. Inconsistency hazards should be suppressed, but their occurrences resemble normal inconsistencies. In this paper, we present a pattern-learning based approach SHAP to suppressing the detection of inconsistency hazards. Our key insight is that the detection of such hazards is subject to certain patterns of context changes. These patterns, although difficult to specify manually, can be learned effectively from historical inconsistency detection data. We evaluated our SHAP experimentally through three context-aware applications. The results reported that SHAP can automatically suppress the detection of over 90% inconsistency hazards, while preserving the detection of over 98% normal inconsistencies, with only negligible overhead.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129782011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boutheina Bannour, J. Escobedo, Christophe Gaston, P. L. Gall, Gabriel Pedroza
{"title":"Security Weaknesses Detection by Symbolic Analysis of Scenarios","authors":"Boutheina Bannour, J. Escobedo, Christophe Gaston, P. L. Gall, Gabriel Pedroza","doi":"10.1109/APSEC.2014.61","DOIUrl":"https://doi.org/10.1109/APSEC.2014.61","url":null,"abstract":"Remotely-communicating software-based systems are tightly present in modern industrial society and securing their complex architecture is recognized as crucial. In particular, the perspectives to reinforce their security by monitoring are promising. However, monitoring schemes still face challenges as the presence of untrusted components seems unavoidable. Specially, since untrusted components may be placed in unsupervised areas, making them ideal targets for attackers. In this work, we propose a framework intended to support designers during systems conception. The approach mainly relies upon Security Watchdogs committed to detect and signal distrustful activity. A model-based framework is introduced to ease attacks descriptions upon scenarios in the form of UML sequence diagrams. The scenarios endowed with predefined attack patterns are analyzed using models transformations and symbolic techniques. By doing so, the effectiveness of watchdogs is confronted against attacks and the results can be used to reinforce the overall security of the system. The applicability of the proposed method is also shown by means of a Smart Grid case study.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Design and Verification of Zone Controller","authors":"Jie Qian, Jing Liu, Xiang Chen, Junfeng Sun","doi":"10.1109/APSEC.2014.62","DOIUrl":"https://doi.org/10.1109/APSEC.2014.62","url":null,"abstract":"iCMTC is an advanced Communication Based Train Control system developed by CASCO Signal Ltd. For China's mass transit transportation. Some subsystems of iCMTC has been applied in Shanghai Metro Line 10. Zone Controller (ZC) is one of the subsystems of iCMTC. Modeling and verifying ZC is challenging due to the complexity of the block system and the behavior itself. We propose a formal approach to gradually specify the block system and lower complexity of the verification of ZC behavior. In recent years, there are many researches on railway systems. However, these studies use simple track networks, which makes them inadequate in industrial practice. To address this problem, we define specific block layouts (i.e., Double slip connection) as relations on sets. We also define mathematical properties of the relations so that the block system can be precisely described. For the purpose of reducing the complexity of verification, we propose an improved refinement mechanism based on the Event-B notation. Based on this refinement mechanism, we develop a Rodin plug-in to help us refine the system. We use this mechanism in modeling the ZC behavior, and achieve good results in automated proof. Several safety properties are considered and verified to ensure the safety and correctness of ZC.","PeriodicalId":380881,"journal":{"name":"2014 21st Asia-Pacific Software Engineering Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}