首页 > 最新文献

2016 Third International Conference on Trustworthy Systems and their Applications (TSA)最新文献

英文 中文
A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation 一种改进克隆区域估计的复制-移动伪造检测方案
Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang
To estimate a clone region in a digital image is an important task of copy-move forgery (CMF) detection, which is one of the key techniques of digital image forensics. Most existing keypoint-based CMF detection schemes are weak in distinguishing the clone regions and the similar regions. However, some misjudgments may be resulted in some similar regions, which are not the clone regions. To solve this problem, a novel copy-move forgery detection scheme is proposed. To avoid misjudgments, rough clone regions are estimated first, which can obviously reduce the false positive rate. And then the customized threshold is created in accordance with characteristics of each image, which can reduce the false negative rate as far as possible. Experimental results show that our proposed scheme obviously restrains the interference by the similar regions and has an outstanding performance on estimating clone regions.
估计数字图像中的克隆区域是复制-移动伪造(CMF)检测的重要任务,是数字图像取证的关键技术之一。现有的基于关键点的CMF检测方案在区分克隆区和相似区方面比较弱。然而,一些错误的判断可能导致一些相似的区域,这些区域不是无性系区域。为了解决这一问题,提出了一种新的复制-移动伪造检测方案。为了避免误判,首先估计粗糙克隆区域,可以明显降低假阳性率。然后根据每张图像的特征创建自定义阈值,尽可能降低误报率。实验结果表明,该方法明显抑制了相似区域的干扰,在克隆区域估计方面具有较好的性能。
{"title":"A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation","authors":"Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang","doi":"10.1109/TSA.2016.12","DOIUrl":"https://doi.org/10.1109/TSA.2016.12","url":null,"abstract":"To estimate a clone region in a digital image is an important task of copy-move forgery (CMF) detection, which is one of the key techniques of digital image forensics. Most existing keypoint-based CMF detection schemes are weak in distinguishing the clone regions and the similar regions. However, some misjudgments may be resulted in some similar regions, which are not the clone regions. To solve this problem, a novel copy-move forgery detection scheme is proposed. To avoid misjudgments, rough clone regions are estimated first, which can obviously reduce the false positive rate. And then the customized threshold is created in accordance with characteristics of each image, which can reduce the false negative rate as far as possible. Experimental results show that our proposed scheme obviously restrains the interference by the similar regions and has an outstanding performance on estimating clone regions.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134390364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Search Based Context-Aware Approach for Understanding and Localizing the Fault via Weighted Call Graph 基于加权呼叫图的搜索上下文感知故障理解与定位方法
Jingxuan Tu, Xiaoyuan Xie, Yuming Zhou, Baowen Xu, Lin Chen
Strictly speaking, fault localization includes assessing the code risk of being faulty and identifying the real fault. In practice, only highlighting some possible faulty statements is not helpful enough to reason the roots of the observed failures in a system. Programmers need to manually inspect the highlighted risky statements one by one, reading and understanding their contexts, in order to identify the real faulty ones. However, most related works have been focusing on risk assessment by simply ignoring the fault identification, which makes such techniques much less practical in real world. Therefore, in this paper, we propose a context-aware approach to assist fault comprehension and identification. Built on risk assessment results, our approach searches for the faults on Weighted Call Graph. In our approach the risky statements are re-ordered by function call chains, which can provide much richer information to understand the context and hence reduce the efforts in manual code inspection. Case studies with three open-source systems show that the proposed approach could help to improve the effectiveness of the whole fault localization process.
严格地说,故障定位包括评估代码出现故障的风险和识别真正的故障。在实践中,仅仅突出显示一些可能的错误语句对于推断系统中观察到的故障的根源并没有足够的帮助。程序员需要手动逐个检查突出显示的风险语句,阅读并理解它们的上下文,以便识别真正的错误语句。然而,大多数相关工作都将重点放在风险评估上,而忽略了故障识别,这使得这些技术在现实世界中的实用性大大降低。因此,在本文中,我们提出了一种上下文感知的方法来帮助故障理解和识别。该方法以风险评估结果为基础,在加权呼叫图上搜索故障。在我们的方法中,风险语句通过函数调用链重新排序,这可以提供更丰富的信息来理解上下文,从而减少手工代码检查的工作量。基于三个开源系统的实例研究表明,该方法有助于提高整个故障定位过程的有效性。
{"title":"A Search Based Context-Aware Approach for Understanding and Localizing the Fault via Weighted Call Graph","authors":"Jingxuan Tu, Xiaoyuan Xie, Yuming Zhou, Baowen Xu, Lin Chen","doi":"10.1109/TSA.2016.20","DOIUrl":"https://doi.org/10.1109/TSA.2016.20","url":null,"abstract":"Strictly speaking, fault localization includes assessing the code risk of being faulty and identifying the real fault. In practice, only highlighting some possible faulty statements is not helpful enough to reason the roots of the observed failures in a system. Programmers need to manually inspect the highlighted risky statements one by one, reading and understanding their contexts, in order to identify the real faulty ones. However, most related works have been focusing on risk assessment by simply ignoring the fault identification, which makes such techniques much less practical in real world. Therefore, in this paper, we propose a context-aware approach to assist fault comprehension and identification. Built on risk assessment results, our approach searches for the faults on Weighted Call Graph. In our approach the risky statements are re-ordered by function call chains, which can provide much richer information to understand the context and hence reduce the efforts in manual code inspection. Case studies with three open-source systems show that the proposed approach could help to improve the effectiveness of the whole fault localization process.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116318493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications X-Prcaf:基于暴露保护缓存文件从泄漏在Android社交应用程序
Qi Tang, Wen Zhang, Xiaoyong Li, Bin Wang
With the high frequent use of social applications on Android platform, the cache file privacy disclosure issues have become increasingly serious. To our best knowledge, there is no effective privacy protection solution for social applications cache files. In this paper, we analyze the present situation of social applications cache file leaks on Android platform, and provide a privacy disclosure assessment criterion based on file storage directories and security state machines. And a cache file privacy protection framework, X-Prcaf (Xposed-based-Protecting-Cache-File), is proposed, which can make social applications avoid privacy data leaks in running process. This framework mainly uses taint tracking technology, operating system hook technology, and cryptographic technology. It aims to protect the entire life cycle of the social applications cache files, by strategy pre-generation, real-time monitoring and security reinforcement. Experiments demonstrate that X-Prcaf has a good effect on the cache file leaks of social software.
随着社交应用在Android平台上的频繁使用,缓存文件隐私泄露问题日益严重。据我们所知,目前还没有针对社交应用缓存文件的有效隐私保护解决方案。本文分析了Android平台上社交应用缓存文件泄露的现状,提出了基于文件存储目录和安全状态机的隐私泄露评估标准。提出了一种缓存文件隐私保护框架X-Prcaf (exposed -based- protection - cache - file),可以使社交应用在运行过程中避免隐私数据泄露。该框架主要使用了污点跟踪技术、操作系统钩子技术和加密技术。通过策略预生成、实时监控和安全加固,保护社交应用缓存文件的整个生命周期。实验表明,X-Prcaf对社交软件的缓存文件泄露具有良好的效果。
{"title":"X-Prcaf : Xposed Based Protecting Cache File from Leaks in Android Social Applications","authors":"Qi Tang, Wen Zhang, Xiaoyong Li, Bin Wang","doi":"10.1109/TSA.2016.13","DOIUrl":"https://doi.org/10.1109/TSA.2016.13","url":null,"abstract":"With the high frequent use of social applications on Android platform, the cache file privacy disclosure issues have become increasingly serious. To our best knowledge, there is no effective privacy protection solution for social applications cache files. In this paper, we analyze the present situation of social applications cache file leaks on Android platform, and provide a privacy disclosure assessment criterion based on file storage directories and security state machines. And a cache file privacy protection framework, X-Prcaf (Xposed-based-Protecting-Cache-File), is proposed, which can make social applications avoid privacy data leaks in running process. This framework mainly uses taint tracking technology, operating system hook technology, and cryptographic technology. It aims to protect the entire life cycle of the social applications cache files, by strategy pre-generation, real-time monitoring and security reinforcement. Experiments demonstrate that X-Prcaf has a good effect on the cache file leaks of social software.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121278258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
What Are the Dominant Projects in the GitHub Python Ecosystem? 什么是GitHub Python生态系统中的主导项目?
Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu
GitHub, a popular social-software-development platform, has fostered a variety of software ecosystems where projects depend on one another and co-evolve together. The projects located in the central hub of the ecosystem are supposed to be important and could affect a number of other projects. However, few researches have investigated the dominant projects in a software ecosystem. In this study, we aim to identify the most influential projects in the GitHub Python ecosystem. We first construct the GitHub Python ecosystem with 19797 projects by identifying their inter-dependencies. Then, we calculate the four kinds of centrality metrics to measure the centrality and influence of each project in the ecosystem. Finally, we evaluate the project's popularity using GitHub social methods and compare the consistency of the two measurements. Our results indicate that 1) the most influential projects are mostly custom libraries; 2) only a small number of projects have large values of the centrality metrics; 3) the dominant projects are not always popular among the GitHub users. Our results help the researchers and practitioners gain a better understanding of the GitHub Python ecosystem.
GitHub是一个受欢迎的社交软件开发平台,它培育了各种各样的软件生态系统,在这些生态系统中,项目相互依赖,共同发展。位于生态系统中心枢纽的项目应该是重要的,可能会影响许多其他项目。然而,很少有研究调查了软件生态系统中的主导项目。在这项研究中,我们的目标是确定GitHub Python生态系统中最具影响力的项目。我们首先通过确定19797个项目的相互依赖关系来构建GitHub Python生态系统。然后,我们计算了四种中心性指标来衡量生态系统中每个项目的中心性和影响力。最后,我们使用GitHub社交方法评估项目的受欢迎程度,并比较两种测量方法的一致性。结果表明:1)最具影响力的项目多为自定义库;2)只有少数项目的中心性指标值较大;3)主导项目并不总是受GitHub用户的欢迎。我们的研究结果有助于研究人员和从业者更好地了解GitHub Python生态系统。
{"title":"What Are the Dominant Projects in the GitHub Python Ecosystem?","authors":"Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu","doi":"10.1109/TSA.2016.23","DOIUrl":"https://doi.org/10.1109/TSA.2016.23","url":null,"abstract":"GitHub, a popular social-software-development platform, has fostered a variety of software ecosystems where projects depend on one another and co-evolve together. The projects located in the central hub of the ecosystem are supposed to be important and could affect a number of other projects. However, few researches have investigated the dominant projects in a software ecosystem. In this study, we aim to identify the most influential projects in the GitHub Python ecosystem. We first construct the GitHub Python ecosystem with 19797 projects by identifying their inter-dependencies. Then, we calculate the four kinds of centrality metrics to measure the centrality and influence of each project in the ecosystem. Finally, we evaluate the project's popularity using GitHub social methods and compare the consistency of the two measurements. Our results indicate that 1) the most influential projects are mostly custom libraries; 2) only a small number of projects have large values of the centrality metrics; 3) the dominant projects are not always popular among the GitHub users. Our results help the researchers and practitioners gain a better understanding of the GitHub Python ecosystem.","PeriodicalId":114541,"journal":{"name":"2016 Third International Conference on Trustworthy Systems and their Applications (TSA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2016 Third International Conference on Trustworthy Systems and their Applications (TSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1