首页 > 最新文献

CTIT technical reports series最新文献

英文 中文
Fine-grained aspects of automatic refactoring in C2Eiffel C2Eiffel中自动重构的细粒度方面
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-007313685
A. Friedli
The C2Eiffel framework [1] translates C source code to Eiffel source code. It aims to generate code that looks natural to a programmer such that it is readable and maintainable. While this is already the case for most parts of common C programs, there are areas for improvements. External C functions are currently wrapped in the generated Eiffel code since the used libraries are not translated. In this thesis I will replace some standard and often used C functions by the corresponding Eiffel equivalents. In the attempt to replace standard C string functions I will also try to replace the current translation of C strings to integer arrays with native Eiffel strings. I will also remove jump statements like break that are often used in C programs but are not available in Eiffel. This will increase the readability of the code compared to the current implementation that emulates the jump mechanism in Eiffel and produces hard to read code.
C2Eiffel框架[1]将C源代码转换为Eiffel源代码。它的目标是生成对程序员来说看起来很自然的代码,这样它是可读和可维护的。虽然这已经是大多数普通C程序的情况,但仍有需要改进的地方。外部C函数目前被封装在生成的Eiffel代码中,因为使用的库没有被翻译。在本文中,我将用相应的Eiffel等价函数替换一些标准的和经常使用的C函数。在尝试替换标准的C字符串函数时,我也将尝试用原生Eiffel字符串替换当前C字符串到整数数组的转换。我还将删除跳转语句,如break,它们经常在C程序中使用,但在Eiffel中不可用。这将增加代码的可读性,而当前的实现是模仿Eiffel中的跳转机制,产生难以阅读的代码。
{"title":"Fine-grained aspects of automatic refactoring in C2Eiffel","authors":"A. Friedli","doi":"10.3929/ETHZ-A-007313685","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007313685","url":null,"abstract":"The C2Eiffel framework [1] translates C source code to Eiffel source code. It aims to generate code that looks natural to a programmer such that it is readable and maintainable. While this is already the case for most parts of common C programs, there are areas for improvements. External C functions are currently wrapped in the generated Eiffel code since the used libraries are not translated. In this thesis I will replace some standard and often used C functions by the corresponding Eiffel equivalents. In the attempt to replace standard C string functions I will also try to replace the current translation of C strings to integer arrays with native Eiffel strings. I will also remove jump statements like break that are often used in C programs but are not available in Eiffel. This will increase the readability of the code compared to the current implementation that emulates the jump mechanism in Eiffel and produces hard to read code.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87832455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Time Machine for XML XML的时间机器
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-007313560
G. Fourny, D. Florescu, Donald Kossmann, Markos Zaharioudakis
With sinking storage costs, it becomes more and more feasible, and popular, to retain past versions of documents and data. While undoing changes is worthy, this becomes even more valuable if the data is queryable. Nowadays, there are two widespread version control paradigms: document versioning (SVN, git, etc.) and versioned databases. The former handles any kind of document, even binary, but only sees lines of text, so that the query capability is limited. The latter provide ne-grained temporal query capabilities on highly structured data - but storing everything in a relational database is not desirable. The goal of this paper is to provide a unied framework for eciently versioning, querying and updating not only data and documents, but also, inbetween, any kind of semi-structured information, like XML.We start with the XQuery programming language and meticulously extend its data model, its syntax and its processing model to make it seamlessly time-aware. We provide data structures and algorithms for the ecient implementation of such a versioning system. Finally, we show that there is no signicant performance loss for traditional queries when enriching an existing engine with versioning capabilities.
随着存储成本的下降,保留过去版本的文档和数据变得越来越可行和流行。虽然撤销更改是值得的,但如果数据是可查询的,那么撤销更改就更有价值了。现在,有两种广泛的版本控制范例:文档版本控制(SVN、git等)和版本化数据库。前者可以处理任何类型的文档,甚至是二进制文档,但只能看到文本行,因此查询功能受到限制。后者提供了对高度结构化数据的新粒度临时查询功能——但是将所有内容存储在关系数据库中是不可取的。本文的目标是提供一个统一的框架,不仅用于数据和文档,而且用于数据和文档之间的任何类型的半结构化信息(如XML)的高效版本控制、查询和更新。我们从XQuery编程语言开始,细致地扩展它的数据模型、语法和处理模型,使其具有无缝的时间感知。我们为这种版本控制系统的有效实现提供了数据结构和算法。最后,我们展示了在使用版本控制功能丰富现有引擎时,传统查询没有明显的性能损失。
{"title":"A Time Machine for XML","authors":"G. Fourny, D. Florescu, Donald Kossmann, Markos Zaharioudakis","doi":"10.3929/ETHZ-A-007313560","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007313560","url":null,"abstract":"With sinking storage costs, it becomes more and more feasible, and popular, to retain past versions of documents and data. While undoing changes is worthy, this becomes even more valuable if the data is queryable. Nowadays, there are two widespread version control paradigms: document versioning (SVN, git, etc.) and versioned databases. The former handles any kind of document, even binary, but only sees lines of text, so that the query capability is limited. The latter provide ne-grained temporal query capabilities on highly structured data - but storing everything in a relational database is not desirable. The goal of this paper is to provide a unied framework for eciently versioning, querying and updating not only data and documents, but also, inbetween, any kind of semi-structured information, like XML.We start with the XQuery programming language and meticulously extend its data model, its syntax and its processing model to make it seamlessly time-aware. We provide data structures and algorithms for the ecient implementation of such a versioning system. Finally, we show that there is no signicant performance loss for traditional queries when enriching an existing engine with versioning capabilities.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87191815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modular Specification and Verification of Delegation with SMT Solvers SMT求解器委托的模块化规范和验证
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-006903018
Ioannis T. Kassios, Peter Müller
Delegation is a very common programming idiom, whereby a task is carried out by a statically unknown part of the program. Delegation enhances the modularity and the extensibility of a program, and, for that reason, is the main ingredient of many important design patterns. Unfortunately, delegation complicates specification and verification: the programmer must either rely on unsuitably weak specifications imposed by behavioral subtyping, or compromise automation by resorting to higherorder logic. In this paper, we present an expressive specification and verification methodology, in which partial correctness reasoning about delegation can be carried out in first order logic, using automated SMT solvers.
委托是一种非常常见的编程习惯用法,即任务由程序中静态未知的部分执行。委托增强了程序的模块化和可扩展性,因此,它是许多重要设计模式的主要组成部分。不幸的是,委托使规范和验证变得复杂:程序员必须依赖由行为子类型强加的不合适的弱规范,或者通过求助于高阶逻辑来损害自动化。在本文中,我们提出了一种表达性的规范和验证方法,其中关于委托的部分正确性推理可以在一阶逻辑中进行,使用自动SMT求解器。
{"title":"Modular Specification and Verification of Delegation with SMT Solvers","authors":"Ioannis T. Kassios, Peter Müller","doi":"10.3929/ETHZ-A-006903018","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006903018","url":null,"abstract":"Delegation is a very common programming idiom, whereby a task is carried out by a statically unknown part of the program. Delegation enhances the modularity and the extensibility of a program, and, for that reason, is the main ingredient of many important design patterns. Unfortunately, delegation complicates specification and verification: the programmer must either rely on unsuitably weak specifications imposed by behavioral subtyping, or compromise automation by resorting to higherorder logic. In this paper, we present an expressive specification and verification methodology, in which partial correctness reasoning about delegation can be carried out in first order logic, using automated SMT solvers.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80326971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An O(n^4) time algorithm to compute the bisection width of solid grid graphs 一个O(n^4)时间算法计算实体网格图的等分宽度
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-006935587
A. Feldmann, P. Widmayer
The bisection problem asks for a partition of the n vertices of a graph into two sets of size at most dn/2e, so that the number of edges connecting the two sets is minimised. A grid graph is a finite connected subgraph of the infinite two-dimensional grid. It is called solid if it has no holes. Papadimitriou and Sideri [7] gave an O(n) time algorithm to solve the bisection problem on solid grid graphs. We propose a novel approach that exploits structural properties of optimal cuts within a dynamic program. We show that our new technique leads to an O(n)
等分问题要求将一个图的n个顶点划分为两个大小不超过dn/2e的集合,从而使连接这两个集合的边的数量最小化。网格图是无限二维网格的有限连通子图。如果它没有孔,就称为固体。Papadimitriou和Sideri[7]给出了一个O(n)时间的算法来解决实体网格图上的等分问题。我们提出了一种新颖的方法,利用动态规划中最优切割的结构特性。我们证明我们的新技术可以产生O(n)
{"title":"An O(n^4) time algorithm to compute the bisection width of solid grid graphs","authors":"A. Feldmann, P. Widmayer","doi":"10.3929/ETHZ-A-006935587","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006935587","url":null,"abstract":"The bisection problem asks for a partition of the n vertices of a graph into two sets of size at most dn/2e, so that the number of edges connecting the two sets is minimised. A grid graph is a finite connected subgraph of the infinite two-dimensional grid. It is called solid if it has no holes. Papadimitriou and Sideri [7] gave an O(n) time algorithm to solve the bisection problem on solid grid graphs. We propose a novel approach that exploits structural properties of optimal cuts within a dynamic program. We show that our new technique leads to an O(n)","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74473357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Konrad Zuse und die Schweiz 我康拉德·宙斯和瑞士
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-006517565
Herbert E. Bruderer
{"title":"Konrad Zuse und die Schweiz","authors":"Herbert E. Bruderer","doi":"10.3929/ETHZ-A-006517565","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006517565","url":null,"abstract":"","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88833389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the relationships between models in protocol verification (extended version) 论协议验证中模型之间的关系(扩展版)
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-006775802
S. Mödersheim
We formally investigate the relationship between several models that are widely used in protocol verification, namely variants of the inductive model of message traces inspired by Paulson’s approach, and models based on rewriting. More precisely, we prove several overapproximation relationships between models, i.e. that one model allows strictly more traces or reachable states than the other. This is common in verification: often an over-approximation is easier to prove correct than the original model, and proving the over-approximation is safe implies that the original model is safe—provided that the models are indeed in an overapproximation relation. We also show that some over-approximations are not sound with respect to authentication goals. The precise formal account that we give on the relation of the models allows us to correct the situation.
我们正式研究了协议验证中广泛使用的几个模型之间的关系,即受Paulson方法启发的消息跟踪归纳模型的变体,以及基于重写的模型。更准确地说,我们证明了模型之间的几个过度逼近关系,即一个模型比另一个模型允许严格更多的跟踪或可达状态。这在验证中很常见:通常过度近似比原始模型更容易证明是正确的,并且证明过度近似是安全的意味着原始模型是安全的——前提是模型确实处于过度近似关系中。我们还表明,对于身份验证目标来说,有些过度近似是不合理的。我们对模型之间的关系所作的精确的正式说明使我们能够纠正这种情况。
{"title":"On the relationships between models in protocol verification (extended version)","authors":"S. Mödersheim","doi":"10.3929/ETHZ-A-006775802","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006775802","url":null,"abstract":"We formally investigate the relationship between several models that are widely used in protocol verification, namely variants of the inductive model of message traces inspired by Paulson’s approach, and models based on rewriting. More precisely, we prove several overapproximation relationships between models, i.e. that one model allows strictly more traces or reachable states than the other. This is common in verification: often an over-approximation is easier to prove correct than the original model, and proving the over-approximation is safe implies that the original model is safe—provided that the models are indeed in an overapproximation relation. We also show that some over-approximations are not sound with respect to authentication goals. The precise formal account that we give on the relation of the models allows us to correct the situation.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91325597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer-basierte high-stake Leistungskontrolle mit Sioux 以计算机为基础的高风险leistungs控制着苏族
Pub Date : 2010-11-01 DOI: 10.3929/ETHZ-A-006885948
Markus Dahinden, H. Hinterberger
Seit 10 Jahren unterrichtet das Departement Informatik der ETH Zurich rund 600 Studierende der Naturwissenschaften in Informatik computergestutzt. Diese Lehrveranstaltungen werden im Rahmen von Semesterendprufungen oder Sessionsprufungen benotet. Zudem werden formative Lernerfolgskontrollen eingesetzt, um den Lernerfolg zu verfolgen und zu erhohen. Zur Effizienz- und Effektivitatssteigerung fuhren wir seit 2004 diese unbenoteten, formativen Leistungskontrollen am Computer durch. Durch die Entwicklung des neuartigen high-stake Prufungssystems Sioux, welches auf der digitalen Signierung aller Resultate basiert, fuhren wir seit 2009 auch benotete Prufungen am Computer durch. In diesem Bericht beschreiben wir unsere bisher grosste Computer-basierte Leistungskontrolle, welche wir im August 2010 im Rahmen der Basisprufungen der Studiengange Biologie, Pharmazie und Bewegungswissenschaften & Sport mit 269 Studierenden durchgefuhrt haben. Diese wurden in zwei Serien in den offentlichen Computerraumen im Hauptgebaude der ETH Zurich gepruft. Insgesamt standen wahrend der zweimal einstundigen Prufung 18 Personen im Einsatz, welche die rekursfahige Durchfuhrung der Leistungskontrolle garantieren sollten. In diesem Bericht erlautern wir die fur diese Leistungskontrolle notigen Vorabklarungen, die sicherheitsrelevanten Uberlegungen und beschreiben, welche Ablaufstrukturen wir fur diese Leistungskontrolle geschaffen haben. Der Bericht beinhaltet zudem unsere Checklisten und beschreibt das Prufungssystem Sioux sowie die verwendeten Problem-basierten Prufungsfragen.
过去十年里,瑞士联邦理工大学在教授信息学。大约有600名学生学习计算机。这些课程应在期末考试或乱流中获得评分。另外还采用富于弹性的学习监控手段来跟踪和提高学习效果。为了提高效率和效力,我们从2004年开始在电脑上进行了这些毫无识别的、没有创造性的业绩控制程序。自从2009年我们使用了以对所有结果的数字签名为基础的新型高端审计系统之后,我们也开始对电脑进行分类审计。在报告中我们描述了我们迄今为止最大的以电脑为基础的表现控制。我们在2010年8月在生物学、医药和运动科学(mda)的基础上运行了以赛亚书1:15)古国家电脑室曾两次被人核对过。总共有18人参加了两次检查,他们的任务是确保实施绩检查。在本报告中,我们认可必要的业绩控制程序、安全有关的信息以及我们为业绩控制程序建立的成套结构。报告还列入了我们的核对表,并说明了苏人控制系统以及您采用的基于审计的问题。
{"title":"Computer-basierte high-stake Leistungskontrolle mit Sioux","authors":"Markus Dahinden, H. Hinterberger","doi":"10.3929/ETHZ-A-006885948","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006885948","url":null,"abstract":"Seit 10 Jahren unterrichtet das Departement Informatik der ETH Zurich rund 600 Studierende der Naturwissenschaften in Informatik computergestutzt. Diese Lehrveranstaltungen werden im Rahmen von Semesterendprufungen oder Sessionsprufungen benotet. Zudem werden formative Lernerfolgskontrollen eingesetzt, um den Lernerfolg zu verfolgen und zu erhohen. Zur Effizienz- und Effektivitatssteigerung fuhren wir seit 2004 diese unbenoteten, formativen Leistungskontrollen am Computer durch. Durch die Entwicklung des neuartigen high-stake Prufungssystems Sioux, welches auf der digitalen Signierung aller Resultate basiert, fuhren wir seit 2009 auch benotete Prufungen am Computer durch. In diesem Bericht beschreiben wir unsere bisher grosste Computer-basierte Leistungskontrolle, welche wir im August 2010 im Rahmen der Basisprufungen der Studiengange Biologie, Pharmazie und Bewegungswissenschaften & Sport mit 269 Studierenden durchgefuhrt haben. Diese wurden in zwei Serien in den offentlichen Computerraumen im Hauptgebaude der ETH Zurich gepruft. Insgesamt standen wahrend der zweimal einstundigen Prufung 18 Personen im Einsatz, welche die rekursfahige Durchfuhrung der Leistungskontrolle garantieren sollten. In diesem Bericht erlautern wir die fur diese Leistungskontrolle notigen Vorabklarungen, die sicherheitsrelevanten Uberlegungen und beschreiben, welche Ablaufstrukturen wir fur diese Leistungskontrolle geschaffen haben. Der Bericht beinhaltet zudem unsere Checklisten und beschreibt das Prufungssystem Sioux sowie die verwendeten Problem-basierten Prufungsfragen.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79943611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Making informatics work for everyone 让信息学为每个人服务
Pub Date : 2010-09-01 DOI: 10.3929/ETHZ-A-006884775
H. Hinterberger
This report has originally been presented to the Rector of ETH Zurich in March, 2008, as a white paper to discuss issues related to teaching basic competences required for the professional use of computers in the natural sciences at ETH Zurich. It describes how the challenges this raises have uncovered the need for novel approaches to realistically teach the use of computers. The report recounts how, with the support of funds from the Rector, it has been possible to address these problems and at the same time create novel and motivating teaching materials that are also useful in other educational environments. This report has been motivated by four concerns, raised by the teaching issues it discusses: awareness, continuity, synergy, and outreach.
本报告最初于2008年3月提交给苏黎世联邦理工学院校长,作为白皮书讨论苏黎世联邦理工学院自然科学专业计算机专业使用所需的教学基本能力相关问题。它描述了这些挑战如何揭示了对新方法的需求,以现实地教授计算机的使用。该报告叙述了在校长资金的支持下,如何能够解决这些问题,同时编写新颖和激励人心的教材,这些教材在其他教育环境中也很有用。本报告的动机是四个问题,它讨论的教学问题提出:意识,连续性,协同作用和推广。
{"title":"Making informatics work for everyone","authors":"H. Hinterberger","doi":"10.3929/ETHZ-A-006884775","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006884775","url":null,"abstract":"This report has originally been presented to the Rector of ETH Zurich in March, 2008, as a white paper to discuss issues related to teaching basic competences required for the professional use of computers in the natural sciences at ETH Zurich. It describes how the challenges this raises have uncovered the need for novel approaches to realistically teach the use of computers. The report recounts how, with the support of funds from the Rector, it has been possible to address these problems and at the same time create novel and motivating teaching materials that are also useful in other educational environments. This report has been motivated by four concerns, raised by the teaching issues it discusses: awareness, continuity, synergy, and outreach.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"336 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80647150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experiments in computer system design 计算机系统设计实验
Pub Date : 2010-07-01 DOI: 10.3929/ETHZ-A-006885986
N. Wirth
{"title":"Experiments in computer system design","authors":"N. Wirth","doi":"10.3929/ETHZ-A-006885986","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006885986","url":null,"abstract":"","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"123 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79789558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems 基于权限安全模型的应用合谋攻击及其对现代智能手机系统的启示
Pub Date : 2010-04-01 DOI: 10.3929/ETHZ-A-006936208
Claudio Marforio, Aurélien Francillon, Srdjan Capkun
We show that the way in which permission-based mechanisms are used on today's mobile platforms enables attacks by colluding applications that communicate over overt and covert communication channels. These attacks allow applications to indirectly execute operations that those applications, based on their declared permissions, should not be able to execute. Example operations include disclosure of users private data (e.g., phone book and calendar entries) to remote parties by applications that do not have direct access to such data or cannot directly establish remote connections. We further show that on today’s mobile platforms users are not made aware of possible implications of application collusion--quite the contrary--users are implicitly lead to believe that by approving the installation of each application independently, based on its declared permissions, they can limit the damage that an application can cause. In this work, we show that this is not correct and that application permissions should be displayed to the users differently (e.g., in their aggregated form), reflecting their actual implications. We demonstrate the practicality of application collusion attacks by implementing several applications and example covert channels on an Android platform and an example channel on a Windows Phone 7 platform. We study free applications from the Android market and show that the potential for application collusion is significant. Finally, we discuss countermeasures that can be used to mitigate these attacks.
我们展示了在当今的移动平台上使用基于许可的机制的方式,可以通过通过公开和隐蔽的通信通道进行通信的串通应用程序来实现攻击。这些攻击允许应用程序间接执行这些应用程序根据其声明的权限不应该执行的操作。示例操作包括通过不能直接访问这些数据或不能直接建立远程连接的应用程序向远程方披露用户私人数据(例如,电话簿和日历条目)。我们进一步表明,在今天的移动平台上,用户没有意识到应用程序合谋的可能影响——恰恰相反——用户被隐含地引导相信,通过基于其声明的权限独立批准每个应用程序的安装,他们可以限制应用程序可能造成的损害。在这项工作中,我们表明这是不正确的,应用程序权限应该以不同的方式显示给用户(例如,以聚合形式),以反映其实际含义。我们通过在Android平台上实现几个应用程序和示例隐蔽通道以及在Windows Phone 7平台上实现示例通道来演示应用程序共谋攻击的实用性。我们研究了来自Android市场的免费应用程序,并表明应用程序合谋的可能性是显著的。最后,我们讨论了可以用来减轻这些攻击的对策。
{"title":"Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems","authors":"Claudio Marforio, Aurélien Francillon, Srdjan Capkun","doi":"10.3929/ETHZ-A-006936208","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006936208","url":null,"abstract":"We show that the way in which permission-based mechanisms are used on today's mobile platforms enables attacks by colluding applications that communicate over overt and covert communication channels. These attacks allow applications to indirectly execute operations that those applications, based on their declared permissions, should not be able to execute. Example operations include disclosure of users private data (e.g., phone book and calendar entries) to remote parties by applications that do not have direct access to such data or cannot directly establish remote connections. We further show that on today’s mobile platforms users are not made aware of possible implications of application collusion--quite the contrary--users are implicitly lead to believe that by approving the installation of each application independently, based on its declared permissions, they can limit the damage that an application can cause. In this work, we show that this is not correct and that application permissions should be displayed to the users differently (e.g., in their aggregated form), reflecting their actual implications. We demonstrate the practicality of application collusion attacks by implementing several applications and example covert channels on an Android platform and an example channel on a Windows Phone 7 platform. We study free applications from the Android market and show that the potential for application collusion is significant. Finally, we discuss countermeasures that can be used to mitigate these attacks.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73783381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
期刊
CTIT technical reports series
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1