首页 > 最新文献

2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)最新文献

英文 中文
Automatically Repairing SQL Faults 自动修复SQL错误
Yun Guo, Nan Li, J. Offutt, Amihai Motro
SQL is the standard database language, yet SQL statements can be complex and expensive to debug by hand. Automatic program repair techniques have the potential to reduce cost significantly. A previous attempt to repair SQL faults automatically used a decision tree (DT) algorithm that succeeded in some cases, but also generated many patches that passed the automated tests but that were not acceptable to the engineers. This paper proposes a novel fault localization and repair technique to repair faulty SQL statements. It targets faults in two common SQL constructs, JOIN and WHERE. It identifies the fault location and type precisely, and then creates a patch to fix the fault. We implemented this technique in a tool, and evaluated it on five medium to large-scale databases using 825 faulty queries with various complexity and faulty types. Experimental results showed that this technique can identify and repair JOIN faults when the DT approach is infeasible, and repair WHERE faults at about the same rate as the DT approach. Moreover, patches generated by our approach are more acceptable to engineers, and the tool is much faster.
SQL是标准的数据库语言,但是手工调试SQL语句可能很复杂,而且代价很高。自动程序修复技术具有显著降低成本的潜力。以前尝试使用决策树(DT)算法自动修复SQL错误,该算法在某些情况下成功,但也生成了许多通过自动化测试的补丁,但工程师无法接受这些补丁。本文提出了一种新的错误定位和修复技术来修复错误的SQL语句。它针对两种常见SQL结构(JOIN和WHERE)中的错误。它可以准确地识别故障的位置和类型,并创建补丁来修复故障。我们在一个工具中实现了这项技术,并使用825个具有不同复杂性和错误类型的错误查询在5个中型到大型数据库上对其进行了评估。实验结果表明,该方法可以在DT方法不可行的情况下识别和修复JOIN故障,并以与DT方法相同的速度修复WHERE故障。此外,我们的方法生成的补丁更容易被工程师接受,并且工具更快。
{"title":"Automatically Repairing SQL Faults","authors":"Yun Guo, Nan Li, J. Offutt, Amihai Motro","doi":"10.1109/QRS.2018.00063","DOIUrl":"https://doi.org/10.1109/QRS.2018.00063","url":null,"abstract":"SQL is the standard database language, yet SQL statements can be complex and expensive to debug by hand. Automatic program repair techniques have the potential to reduce cost significantly. A previous attempt to repair SQL faults automatically used a decision tree (DT) algorithm that succeeded in some cases, but also generated many patches that passed the automated tests but that were not acceptable to the engineers. This paper proposes a novel fault localization and repair technique to repair faulty SQL statements. It targets faults in two common SQL constructs, JOIN and WHERE. It identifies the fault location and type precisely, and then creates a patch to fix the fault. We implemented this technique in a tool, and evaluated it on five medium to large-scale databases using 825 faulty queries with various complexity and faulty types. Experimental results showed that this technique can identify and repair JOIN faults when the DT approach is infeasible, and repair WHERE faults at about the same rate as the DT approach. Moreover, patches generated by our approach are more acceptable to engineers, and the tool is much faster.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Title Page iii 第三页标题
{"title":"Title Page iii","authors":"","doi":"10.1109/qrs.2018.00002","DOIUrl":"https://doi.org/10.1109/qrs.2018.00002","url":null,"abstract":"","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114975055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Experiences with the Engineering of a Medical Device Using State-Based Formal Methods 基于状态的形式化方法在医疗器械工程中的经验分析
A. Mashkoor, Alexander Egyed
The use of software has become ubiquitous and prevalent in modern medical devices such as hemodialysis machines. Consequently, the failure rate of medical devices due to software faults is also increasing. While next-generation software-intensive medical devices contribute to providing better health care and ease of use, their development is becoming unprecedentedly complex and challenging. The critical nature of this domain – particularly its direct implications on health and safety – requires extraordinary measures to ensure the correct and reliable function of such systems. Formal methods are proven to provide approaches, techniques, and tools for correct engineering of software and systems. However, their use in the contemporary medical software engineering is still marginal. In order to promote the use of (state-based) formal methods and showcase their effectiveness in design and development of critical medical devices, we present the hemodialysis case study challenge problem in this article. We also analyze the novelties and limitations of several solutions implementing the case study and explore research challenges that still need to be addressed in future.
在血液透析机等现代医疗设备中,软件的使用已经变得无处不在。因此,医疗器械因软件故障导致的故障率也在不断上升。虽然下一代软件密集型医疗设备有助于提供更好的医疗保健和易用性,但它们的开发正变得前所未有的复杂和具有挑战性。这一领域的关键性质,特别是其对健康和安全的直接影响,要求采取特别措施,确保这类系统的正确和可靠功能。形式化方法被证明为软件和系统的正确工程提供了方法、技术和工具。然而,它们在当代医学软件工程中的应用仍然是边缘的。为了促进(基于状态的)形式化方法的使用,并展示其在关键医疗设备的设计和开发中的有效性,我们在本文中提出了血液透析案例研究挑战问题。我们还分析了实施案例研究的几种解决方案的新颖性和局限性,并探讨了未来仍需要解决的研究挑战。
{"title":"Analysis of Experiences with the Engineering of a Medical Device Using State-Based Formal Methods","authors":"A. Mashkoor, Alexander Egyed","doi":"10.1109/QRS.2018.00021","DOIUrl":"https://doi.org/10.1109/QRS.2018.00021","url":null,"abstract":"The use of software has become ubiquitous and prevalent in modern medical devices such as hemodialysis machines. Consequently, the failure rate of medical devices due to software faults is also increasing. While next-generation software-intensive medical devices contribute to providing better health care and ease of use, their development is becoming unprecedentedly complex and challenging. The critical nature of this domain – particularly its direct implications on health and safety – requires extraordinary measures to ensure the correct and reliable function of such systems. Formal methods are proven to provide approaches, techniques, and tools for correct engineering of software and systems. However, their use in the contemporary medical software engineering is still marginal. In order to promote the use of (state-based) formal methods and showcase their effectiveness in design and development of critical medical devices, we present the hemodialysis case study challenge problem in this article. We also analyze the novelties and limitations of several solutions implementing the case study and explore research challenges that still need to be addressed in future.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification of Security Related Bug Reports via Text Mining Using Supervised and Unsupervised Classification 基于监督和非监督分类的文本挖掘安全相关Bug报告识别
K. Goseva-Popstojanova, Jacob Tyo
While many prior works used text mining for automating different tasks related to software bug reports, few works considered the security aspects. This paper is focused on automated classification of software bug reports to security and not-security related, using both supervised and unsupervised approaches. For both approaches, three types of feature vectors are used. For supervised learning, we experiment with multiple classifiers and training sets with different sizes. Furthermore, we propose a novel unsupervised approach based on anomaly detection. The evaluation is based on three NASA datasets. The results showed that supervised classification is affected more by the learning algorithms than by feature vectors and training only on 25% of the data provides as good results as training on 90% of the data. The supervised learning slightly outperforms the unsupervised learning, at the expense of labeling the training set. In general, datasets with more security information lead to better performance.
虽然许多先前的工作使用文本挖掘来自动化与软件错误报告相关的不同任务,但很少有工作考虑到安全方面。本文的重点是使用监督和非监督两种方法,对软件缺陷报告的安全性和非安全性进行自动分类。对于这两种方法,使用了三种类型的特征向量。对于监督学习,我们使用不同大小的多个分类器和训练集进行实验。在此基础上,提出了一种新的基于异常检测的无监督方法。评估是基于NASA的三个数据集。结果表明,与特征向量相比,学习算法对监督分类的影响更大,仅在25%的数据上进行训练就能获得与在90%的数据上进行训练一样好的结果。监督学习略优于无监督学习,但代价是要标注训练集。通常,具有更多安全信息的数据集会带来更好的性能。
{"title":"Identification of Security Related Bug Reports via Text Mining Using Supervised and Unsupervised Classification","authors":"K. Goseva-Popstojanova, Jacob Tyo","doi":"10.1109/QRS.2018.00047","DOIUrl":"https://doi.org/10.1109/QRS.2018.00047","url":null,"abstract":"While many prior works used text mining for automating different tasks related to software bug reports, few works considered the security aspects. This paper is focused on automated classification of software bug reports to security and not-security related, using both supervised and unsupervised approaches. For both approaches, three types of feature vectors are used. For supervised learning, we experiment with multiple classifiers and training sets with different sizes. Furthermore, we propose a novel unsupervised approach based on anomaly detection. The evaluation is based on three NASA datasets. The results showed that supervised classification is affected more by the learning algorithms than by feature vectors and training only on 25% of the data provides as good results as training on 90% of the data. The supervised learning slightly outperforms the unsupervised learning, at the expense of labeling the training set. In general, datasets with more security information lead to better performance.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130078034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System Kernel 基于行为模式的操作系统内核运行时完整性检查
Xinyue Feng, Qiusong Yang, Lin Shi, Qing Wang
Kernel rootkits pose a serious threat to system security by tampering with the state of operating system inconspicuously. To ensure operating system kernel integrity, Virtual Machine Monitor (VMM) based approaches have been proposed. Most of these approaches use snapshot-based or event-triggered techniques. However, snapshot-based techniques have been suffering from missing transient attacks or significant performance overhead, while event-triggered methods are facing with heavy workload as integrity checking might be triggered by any suspicious actions. In this paper, we propose a novel solution which is a behavior-triggered integrity checking approach named BehaviorKI. By analyzing attacking processes, BehaviorKI can extract a set of behavior patterns which characterize malicious behaviors. BehaviorKI will trigger integrity checking with kernel invariants when a malicious behavior pattern detected. In this way, our approach can alleviate the performance burden by reducing the frequent kernel integrity checking. The experiment results show that Be-haviorKI outperforms existing snapshot-based and event-triggered approaches.
内核rootkit通过对操作系统状态的不可见篡改,对系统安全构成严重威胁。为了保证操作系统内核的完整性,提出了基于虚拟机监控(VMM)的方法。这些方法大多使用基于快照或事件触发的技术。然而,基于快照的技术一直遭受着错失瞬态攻击或显著性能开销的困扰,而事件触发方法则面临着繁重的工作负载,因为任何可疑操作都可能触发完整性检查。在本文中,我们提出了一种新的解决方案,即行为触发的完整性检查方法,称为BehaviorKI。通过分析攻击过程,BehaviorKI可以提取出一组具有恶意行为特征的行为模式。当检测到恶意行为模式时,BehaviorKI将触发带有内核不变量的完整性检查。这样,我们的方法可以通过减少频繁的内核完整性检查来减轻性能负担。实验结果表明,Be-haviorKI优于现有的基于快照和事件触发的方法。
{"title":"BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System Kernel","authors":"Xinyue Feng, Qiusong Yang, Lin Shi, Qing Wang","doi":"10.1109/QRS.2018.00015","DOIUrl":"https://doi.org/10.1109/QRS.2018.00015","url":null,"abstract":"Kernel rootkits pose a serious threat to system security by tampering with the state of operating system inconspicuously. To ensure operating system kernel integrity, Virtual Machine Monitor (VMM) based approaches have been proposed. Most of these approaches use snapshot-based or event-triggered techniques. However, snapshot-based techniques have been suffering from missing transient attacks or significant performance overhead, while event-triggered methods are facing with heavy workload as integrity checking might be triggered by any suspicious actions. In this paper, we propose a novel solution which is a behavior-triggered integrity checking approach named BehaviorKI. By analyzing attacking processes, BehaviorKI can extract a set of behavior patterns which characterize malicious behaviors. BehaviorKI will trigger integrity checking with kernel invariants when a malicious behavior pattern detected. In this way, our approach can alleviate the performance burden by reducing the frequent kernel integrity checking. The experiment results show that Be-haviorKI outperforms existing snapshot-based and event-triggered approaches.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127251776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Security Model for Access Control in Graph-Oriented Databases 面向图数据库访问控制的安全模型
Claudia Morgado, Gisele Busichia Baioco, Tânia Basso, Regina L. O. Moraes
Nowadays, organizations collect vast amounts of data for future analysis. Motivated by this amount of data and requirements of Web2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes a security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study was performed as proof of concept, where the model was instantiated and implemented for Neo4j database. Results showed that access restrictions were applied correctly, avoiding unauthorized access. A schema for Neo4j was provided, once it does not have a native one.
如今,组织为将来的分析收集了大量的数据。受Web2.0的数据量和需求的推动,近年来出现了大量的非关系数据库(NoSQL)。然而,关系数据库中的一些安全特性(例如,访问控制)被留在非关系管理系统中,由应用程序开发,这可能会增加安全漏洞。本文提出了一种基于元数据的安全模型,为NoSQL面向图形的数据库管理系统提供访问控制。目标是支持使用面向图形数据库的应用程序的开发,以保持存储数据的完整性,并保护它们免受未经授权的访问。执行了一个案例研究作为概念证明,其中为Neo4j数据库实例化和实现了模型。结果表明,正确应用了访问限制,避免了未经授权的访问。一旦Neo4j没有本地模式,就提供了它的模式。
{"title":"A Security Model for Access Control in Graph-Oriented Databases","authors":"Claudia Morgado, Gisele Busichia Baioco, Tânia Basso, Regina L. O. Moraes","doi":"10.1109/QRS.2018.00027","DOIUrl":"https://doi.org/10.1109/QRS.2018.00027","url":null,"abstract":"Nowadays, organizations collect vast amounts of data for future analysis. Motivated by this amount of data and requirements of Web2.0, a plethora of non-relational databases (NoSQL) emerged in recent years. However, several security features in relational databases (e.g., access control) have been left in non-relational management systems to be developed by the application, which can raise security breaches. This paper proposes a security model, based on the use of metadata, to provide access control for NoSQL graph-oriented database management system. The goal is to support the development of applications that use graph-oriented database in preserving the integrity of stored data and protect them from non-authorized access. A case study was performed as proof of concept, where the model was instantiated and implemented for Neo4j database. Results showed that access restrictions were applied correctly, avoiding unauthorized access. A schema for Neo4j was provided, once it does not have a native one.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130528909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Method for Predicting Two-Variable Atomicity Violations 一种预测双变量原子性违反的方法
Zhuo Sun, Reng Zeng, Xudong He
As the most common non-deadlock concurrency bugs, atomicity violations are extremely hard to detect during testing since the exhaustive testing of a multi-threaded program is impossible because of the large number of interleavings. The studies in recent years have mainly focused on single-variable atomicity violation. However, those methods are unable to predict or find atomicity violations with multiple variables involved. Many variables are inherently correlated and need to be accessed together with their correlated peers in a consistent manner. These variables need to be either updated together consistently or accessed together to avoid inconsistent update or reading. This paper presents a method for predicting two-variable atomicity violation, based on access correlation between variables and atomicity violation pattern of variable accesses, including algorithms to infer access correlation between variables and to predict atomicity violation using model checking. The effectiveness of our method is evaluated with several real-world systems.
原子性违反是最常见的非死锁并发性错误,在测试期间很难检测到,因为由于大量的交错,不可能对多线程程序进行详尽的测试。近年来的研究主要集中在单变量原子性违背上。然而,这些方法无法预测或发现涉及多个变量的原子性违规。许多变量本质上是相关的,需要以一致的方式与其相关的对等点一起访问。这些变量需要一致地一起更新或一起访问,以避免不一致的更新或读取。本文提出了一种基于变量间访问相关性和变量访问原子性违反模式的双变量原子性违反预测方法,包括变量间访问相关性推断和模型检验预测原子性违反的算法。我们的方法的有效性与几个现实世界的系统进行了评估。
{"title":"A Method for Predicting Two-Variable Atomicity Violations","authors":"Zhuo Sun, Reng Zeng, Xudong He","doi":"10.1109/QRS.2018.00024","DOIUrl":"https://doi.org/10.1109/QRS.2018.00024","url":null,"abstract":"As the most common non-deadlock concurrency bugs, atomicity violations are extremely hard to detect during testing since the exhaustive testing of a multi-threaded program is impossible because of the large number of interleavings. The studies in recent years have mainly focused on single-variable atomicity violation. However, those methods are unable to predict or find atomicity violations with multiple variables involved. Many variables are inherently correlated and need to be accessed together with their correlated peers in a consistent manner. These variables need to be either updated together consistently or accessed together to avoid inconsistent update or reading. This paper presents a method for predicting two-variable atomicity violation, based on access correlation between variables and atomicity violation pattern of variable accesses, including algorithms to infer access correlation between variables and to predict atomicity violation using model checking. The effectiveness of our method is evaluated with several real-world systems.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How Do Defects Hurt Qualities? An Empirical Study on Characterizing a Software Maintainability Ontology in Open Source Software 缺陷是如何伤害品质的?开源软件可维护性本体表征的实证研究
Celia Chen, Shih-Ting Lin, Michael Shoga, Qing Wang, B. Boehm
Beyond the functional requirements of a system, software maintainability is essential for project success. While there exists a large knowledge base of software maintainability, this knowledge is rarely used in open source software due to the large number of developers and inefficiency in identifying quality issues. To effectively utilize the current knowledge base in practice requires a deeper understanding of how problems associated with the different qualities arise and change over time. In this paper, we sample over 6000 real bugs found from several Mozilla products to examine how maintainability is expressed with subgroups of repairability and modifiability. Furthermore, we manually study how these qualities evolve as the products mature, what the root causes of the bugs are for each quality and the impact and dependency of each quality. Our results inform which areas should be focused on to ensure maintainability at different stages of the development and maintenance process.
除了系统的功能需求之外,软件的可维护性对于项目的成功也是必不可少的。虽然存在大量关于软件可维护性的知识库,但由于开发人员数量众多,并且在识别质量问题方面效率低下,这些知识很少在开源软件中使用。为了在实践中有效地利用当前的知识库,需要更深入地了解与不同质量相关的问题如何随着时间的推移而产生和变化。在本文中,我们从几个Mozilla产品中发现了超过6000个真实的bug,以检查可维护性是如何用可修复性和可修改性的子组来表达的。此外,我们手动研究这些质量是如何随着产品的成熟而演变的,每个质量的bug的根本原因是什么,以及每个质量的影响和依赖性。我们的结果告诉我们应该关注哪些领域以确保在开发和维护过程的不同阶段的可维护性。
{"title":"How Do Defects Hurt Qualities? An Empirical Study on Characterizing a Software Maintainability Ontology in Open Source Software","authors":"Celia Chen, Shih-Ting Lin, Michael Shoga, Qing Wang, B. Boehm","doi":"10.1109/QRS.2018.00036","DOIUrl":"https://doi.org/10.1109/QRS.2018.00036","url":null,"abstract":"Beyond the functional requirements of a system, software maintainability is essential for project success. While there exists a large knowledge base of software maintainability, this knowledge is rarely used in open source software due to the large number of developers and inefficiency in identifying quality issues. To effectively utilize the current knowledge base in practice requires a deeper understanding of how problems associated with the different qualities arise and change over time. In this paper, we sample over 6000 real bugs found from several Mozilla products to examine how maintainability is expressed with subgroups of repairability and modifiability. Furthermore, we manually study how these qualities evolve as the products mature, what the root causes of the bugs are for each quality and the impact and dependency of each quality. Our results inform which areas should be focused on to ensure maintainability at different stages of the development and maintenance process.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125206399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy 利用实时令牌和动态策略提高可靠性和保密性的可证明安全密码ABAC系统
Yan Zhu, Ruyun Yu, Yao Qin, Di Ma, W. Chu
In this paper we address the problem of reliability and security in an open-access data sharing system. We propose a new framework, called cryptographic attribute-based access control (CABAC), in consistent with the standard ABAC model. Moreover, two new mechanisms, real-time Tokens and secure policy decision-making, are introduced for ensuring secure attribute authorization and verifiable policy decision-making. More important, we present a practical CABAC system to support adaptability and flexibility using dynamically chosen policy and real-time attribute acquisition. We prove that our CABAC system is provably secure in four aspects: the attribute Tokens are existentially unforgeable against chosen-time and chosen-attribute attacks, respectively; the secure policy is existentially unforgeable against chosen-object attack under eBDH assumption; and our entire system is semantically secure against chosen-plaintext attack with Token and policy queries under eGDHE assumption.
本文主要研究开放存取数据共享系统的可靠性和安全性问题。我们提出了一个新的框架,称为基于密码属性的访问控制(CABAC),与标准的ABAC模型一致。此外,还引入了实时令牌和安全策略决策两种新机制,以确保安全属性授权和可验证的策略决策。更重要的是,我们提出了一个实用的CABAC系统,通过动态选择策略和实时属性获取来支持适应性和灵活性。我们从四个方面证明了CABAC系统的可证明安全性:属性令牌分别针对选择时间攻击和选择属性攻击是存在不可伪造的;在eBDH假设下,针对选择对象攻击,安全策略是存在不可伪造的;在eGDHE假设下,我们的整个系统在语义上是安全的,不会受到带有令牌和策略查询的选择明文攻击。
{"title":"Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy","authors":"Yan Zhu, Ruyun Yu, Yao Qin, Di Ma, W. Chu","doi":"10.1109/QRS.2018.00041","DOIUrl":"https://doi.org/10.1109/QRS.2018.00041","url":null,"abstract":"In this paper we address the problem of reliability and security in an open-access data sharing system. We propose a new framework, called cryptographic attribute-based access control (CABAC), in consistent with the standard ABAC model. Moreover, two new mechanisms, real-time Tokens and secure policy decision-making, are introduced for ensuring secure attribute authorization and verifiable policy decision-making. More important, we present a practical CABAC system to support adaptability and flexibility using dynamically chosen policy and real-time attribute acquisition. We prove that our CABAC system is provably secure in four aspects: the attribute Tokens are existentially unforgeable against chosen-time and chosen-attribute attacks, respectively; the secure policy is existentially unforgeable against chosen-object attack under eBDH assumption; and our entire system is semantically secure against chosen-plaintext attack with Token and policy queries under eGDHE assumption.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133699192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target Selection for Test-Based Resource Adaptation 基于测试的资源适配目标选择
Arpit Christi, Alex Groce
Building software systems that adapt to changing resources is challenging: developers cannot anticipate all future situations that a software system may face, and even if they could, the effort required would be onerous. A conceptually simple, yet practically applicable, way to build resource adaptive software is to use test-based software minimization, where tests define functionality. One drawback of the approach is that it requires a time-consuming reduction process that removes program statements in order to reduce resource usage, making it impractical for use in deployed systems. We show that statements removed have predictable characteristics, making it possible to use heuristics to choose statements to analyze. We demonstrate the utility of our heuristics via a case study of the NetBeans IDE: using our best heuristic, we were able to compute an effective resource adaptation almost 3 times faster than without heuristic guidance.
构建适应不断变化的资源的软件系统是具有挑战性的:开发人员无法预测软件系统可能面临的所有未来情况,即使他们可以,所需的工作也将是繁重的。构建资源自适应软件的一种概念上简单但实际上适用的方法是使用基于测试的软件最小化,其中测试定义功能。该方法的一个缺点是,它需要一个耗时的减少过程,删除程序语句以减少资源使用,这使得在已部署的系统中使用它不切实际。我们表明,删除的语句具有可预测的特征,这使得使用启发式方法选择要分析的语句成为可能。我们通过NetBeans IDE的一个案例研究来展示我们的启发式的效用:使用我们最好的启发式,我们能够计算有效的资源适应,比没有启发式指导快近3倍。
{"title":"Target Selection for Test-Based Resource Adaptation","authors":"Arpit Christi, Alex Groce","doi":"10.1109/QRS.2018.00059","DOIUrl":"https://doi.org/10.1109/QRS.2018.00059","url":null,"abstract":"Building software systems that adapt to changing resources is challenging: developers cannot anticipate all future situations that a software system may face, and even if they could, the effort required would be onerous. A conceptually simple, yet practically applicable, way to build resource adaptive software is to use test-based software minimization, where tests define functionality. One drawback of the approach is that it requires a time-consuming reduction process that removes program statements in order to reduce resource usage, making it impractical for use in deployed systems. We show that statements removed have predictable characteristics, making it possible to use heuristics to choose statements to analyze. We demonstrate the utility of our heuristics via a case study of the NetBeans IDE: using our best heuristic, we were able to compute an effective resource adaptation almost 3 times faster than without heuristic guidance.","PeriodicalId":114973,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114364323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 IEEE International Conference on Software Quality, Reliability and Security (QRS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1