2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

筛选
英文 中文
Aging and Rejuvenation Models of Load Changing Attacks in Micro-Grids 微电网负荷变化攻击的老化与恢复模型
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00039
R. Czekster, Alberto Avritzer, D. Menasché
{"title":"Aging and Rejuvenation Models of Load Changing Attacks in Micro-Grids","authors":"R. Czekster, Alberto Avritzer, D. Menasché","doi":"10.1109/ISSREW53611.2021.00039","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00039","url":null,"abstract":"Recent cyber-attacks in critical infrastructures have highlighted the importance of investigating how to improve Smart-Grids (SG) resiliency. In the future, it is envisioned that grid connected micro-grids would have the ability of operating in 'islanded mode’ in the event of a grid-level failure. In this work, we propose a method for unfolding aging and rejuvenation models into their sequential counterparts to enable the computation of transient state probabilities in the proposed models. We have applied our methodology to one specific security attack scenario and four large campus micro-grids case studies. We have shown how to convert the software aging and rejuvenation, with cycles, to its unfolded counterpart. We then used the unfolded counterpart to support the survivability computation. We were able to analytically evaluate the transient failure probability and the associated Instantaneous Expected Energy Not Supplied metric, for each of the four case studies, from one specific attack. We envision several practical applications of the proposed methodology. First, because the micro-grid model is solved analytically, the approach can be used to support micro-grid engineering optimizations accounting for security intrusions. Second, micro-grid engineers could use the approach to detect security attacks by monitoring for unexpected deviations of the Energy Not Supplied metric.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114387803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Targeted Code Inspection based on Human Errors 基于人为错误的目标代码检查
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00076
Fuqun Huang, H. Madeira
{"title":"Targeted Code Inspection based on Human Errors","authors":"Fuqun Huang, H. Madeira","doi":"10.1109/ISSREW53611.2021.00076","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00076","url":null,"abstract":"As a direct cause of software defects, human error is the key to understanding and identifying defects. We propose a new code inspection method: targeted code inspection based on human error mechanisms of software engineers. Based on the common erroneous mechanisms of human cognition, the method targets error-prone codes with high efficiency and minimum effort. The proposed method is supported by preliminary evidence in a pilot study.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114622988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How Far Have We Come in Fault Tolerance for Distributed Graph Processing: A Quantitative Assessment of Fault Tolerance Effectiveness 我们在分布式图处理的容错方面已经走了多远:容错有效性的定量评估
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00114
Chengbo Zhang, Ying Li, Yong Yang, Tong Jia, Zhirong Hou
{"title":"How Far Have We Come in Fault Tolerance for Distributed Graph Processing: A Quantitative Assessment of Fault Tolerance Effectiveness","authors":"Chengbo Zhang, Ying Li, Yong Yang, Tong Jia, Zhirong Hou","doi":"10.1109/ISSREW53611.2021.00114","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00114","url":null,"abstract":"With the increase in graph dataset size and algorithm complexity, distributed graph processing runs with severe reliability problems caused by high uncertainty. A range of fault tolerance specific to distributed graph processing has been proposed. Unfortunately, current work does not consider the complexity of actual failure but only verifies the effectiveness of fault tolerance by simply killing processes or crashing compute nodes. We investigate the impact of failures on the effectiveness of three widely-used fault-tolerance mechanisms in distributed graph processing, such as checkpoint-based fault tolerance, logging-based fault tolerance, and replication-based fault tolerance, by performing fault injection based on extensive research about actual faults. Based on the above analysis, we find that failure offsets cause fault tolerance's average recovery coverage factor to drop by 0.37% to 26.77 %, and small checkpoint intervals and the confined recovery bring weak robustness of failure recovery.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ReSwitcher: Automatically Refactoring Java Programs for Switch Expression ReSwitcher:自动重构Java程序的开关表达式
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00108
Yang Zhang, Chaoshuai Li, Shuai Shao
{"title":"ReSwitcher: Automatically Refactoring Java Programs for Switch Expression","authors":"Yang Zhang, Chaoshuai Li, Shuai Shao","doi":"10.1109/ISSREW53611.2021.00108","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00108","url":null,"abstract":"A switch statement is frequently used with the advantage of handling multi-way branches and with the disadvantage of fall-through semantics that makes programs error-prone. Since JDK 12, the switch expression has been proposed as an alternative to make the code cleaner and safer. However, none of existing works focuses on fall-through semantics and refactoring for switch expressions in Java programs. To this end, this paper presents a refactoring tool ReSwitcher that can automatically (i) remove the fall-through semantics from a switch statement; and (ii) convert a switch statement into a switch expression. ReSwitcher is evaluated on 5 real-world applications. The results show it can refactor 2,984 switch statements in an average of 2.71 seconds, which improves robustness for these projects.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information Hiding using Bucket Steganography 使用桶隐写的信息隐藏
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00085
Katarzyna Koptyra, M. Ogiela
{"title":"Information Hiding using Bucket Steganography","authors":"Katarzyna Koptyra, M. Ogiela","doi":"10.1109/ISSREW53611.2021.00085","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00085","url":null,"abstract":"This paper describes bucket steganography-a data hiding technique in which secret message may be extracted from the carrier with standard software preinstalled in operating system, and with inconspicuous graphical applications, like GIMP, Paint or Photoshop. First, the carrier file should be presented in chosen base, for example hexadecimal, octal, etc. Then the user takes the screenshot of the listing and fill its background with bucket tool. In this way the secret message appears and may be read from unfilled regions of different color.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122320439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rustpi: A Rust-powered Reliable Micro-kernel Operating System 一个由rust驱动的可靠微内核操作系统
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00075
Yuanzhi Liang, Lei Wang, Siran Li, Bo Jiang
{"title":"Rustpi: A Rust-powered Reliable Micro-kernel Operating System","authors":"Yuanzhi Liang, Lei Wang, Siran Li, Bo Jiang","doi":"10.1109/ISSREW53611.2021.00075","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00075","url":null,"abstract":"Rustpi is a micro-kernel operating system implemented in Rust to explore how modern language features can help to build a reliable operating system. In our system, isolations between micro-kernel servers are achieved by Rust language instead of expensive hardware mechanisms. Moreover, Rust language features such as control-flow integrity and unwinding enable hardware transient fault detection and error recovery without resource leaking. Rustpi creatively integrates these features to enhance its reliability. Moreover, our design is also applicable to other Rust micro-kernel systems or even the Linux kernel.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector 从应用安全验证标准(ASVS)到法规遵从:金融服务行业的案例研究
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00046
V. Tan, C. Cheh, Binbin Chen
{"title":"From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector","authors":"V. Tan, C. Cheh, Binbin Chen","doi":"10.1109/ISSREW53611.2021.00046","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00046","url":null,"abstract":"The OWASP Application Security Verification Standard (ASVS) is a widely used web application development guideline regarding the technical security controls and secure development requirements. While software development teams refer to ASVS to secure their applications and development process, they also need to ensure the compliance of various security related regulations, including sector-specific ones. In this work, we study the synergy of these two activities, i.e., by following ASVS, how does a development team position their developed applications in meeting those regulation requirements. We take the highly regulated financial services sector as a case study. In particular, we look at two recent guidelines published by Monetary Authority of Singapore (MAS) - the Technology Risk Management (TRM) guidelines and Notice 655 Cyber Hygiene. We developed a systematic approach to map ASVS to those two sector-specific regulations. Our results show that by adopting ASVS, a development team can achieve a high degree of regulatory compliance (38.6 % for the MAS TRM guidelines and 47.6% for the MAS Notice 655, respectively). That demonstrates the viability of using international standards (like ASVS) to support compliance with the two sector-specific regulations. In addition, our mapping approach can be useful for organizations to support their compliance efforts.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127965880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信