首页 > 最新文献

2018 5th International Conference on Dependable Systems and Their Applications (DSA)最新文献

英文 中文
Interval Estimation of Process Capability Indices Based on the Weibull Distributed Quality Data of Supplier Products 基于威布尔分布质量数据的供应商过程能力指标区间估计
Yanhe Cui, Jun Yang
Process capability indices (PCIs) play an important role in analyzing process quality capability. However, the occurrence of data fraud events indicates that suppliers may provide false information, which may result in inappropriate choices for customers. Thus, to estimate PCIs and further check authenticity of data provided by suppliers, it is necessary to carry out process capability analysis from supplier products. The quality data of supplier products are doubly truncated based on technical requirements. Considering many quality characteristics of products from practical processes follow Weibull distributions, we propose an interval estimation method of PCIs using the truncated Weibull data. First, Monte Carlo-EM algorithm is applied to estimate unknown parameters. Then, a quantile-filling algorithm is adopted to transform Weibull truncated data into pseudo-complete data. After pseudo-complete data are obtained, we apply generalized confidence interval to calculate interval estimation of PCIs. Finally, an example is provided to illustrate the implement of the proposed method.
过程能力指数在过程质量能力分析中起着重要的作用。然而,数据欺诈事件的发生表明供应商可能会提供虚假信息,从而导致客户做出不正确的选择。因此,为了评估pci,进一步检查供应商提供的数据的真实性,需要从供应商产品进行过程能力分析。根据技术要求,对供应商产品的质量数据进行双重截断。考虑到实际生产过程中产品的许多质量特征都遵循威布尔分布,提出了一种利用截断威布尔数据进行pci区间估计的方法。首先,采用蒙特卡罗- em算法对未知参数进行估计。然后,采用分位数填充算法将威布尔截断的数据转换为伪完备数据。在获得伪完备数据后,我们应用广义置信区间计算cpi的区间估计。最后,给出了一个实例来说明该方法的实现。
{"title":"Interval Estimation of Process Capability Indices Based on the Weibull Distributed Quality Data of Supplier Products","authors":"Yanhe Cui, Jun Yang","doi":"10.1109/DSA.2018.00024","DOIUrl":"https://doi.org/10.1109/DSA.2018.00024","url":null,"abstract":"Process capability indices (PCIs) play an important role in analyzing process quality capability. However, the occurrence of data fraud events indicates that suppliers may provide false information, which may result in inappropriate choices for customers. Thus, to estimate PCIs and further check authenticity of data provided by suppliers, it is necessary to carry out process capability analysis from supplier products. The quality data of supplier products are doubly truncated based on technical requirements. Considering many quality characteristics of products from practical processes follow Weibull distributions, we propose an interval estimation method of PCIs using the truncated Weibull data. First, Monte Carlo-EM algorithm is applied to estimate unknown parameters. Then, a quantile-filling algorithm is adopted to transform Weibull truncated data into pseudo-complete data. After pseudo-complete data are obtained, we apply generalized confidence interval to calculate interval estimation of PCIs. Finally, an example is provided to illustrate the implement of the proposed method.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134535356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Failure Modes Detection of Nuclear Systems Using Machine Learning 核系统故障模式的机器学习检测
David Tian, Jiamei Deng, E. Zio, F. Maio, Fu-cheng Liao
Early detection of the failure of a nuclear system is an important topic in nuclear energy. This paper proposes three machine learning methodologies to detect the failure modes (FM) of the Lead-Bismuth Eutectic eXperimental Accelerator Driven System (LBE-XADS) nuclear system after the first 10%, 50% and 90% time periods of the 3000 seconds mission time of the LBEXADS. The first methodology detects the FM of the LBE-XADS after the first 10% time period and consists of two Gaussian mixture-based (GM-based) classifiers. The second methodology detects the FM of the LBE-XADS after the first 50% time period and consists of a GM-based classifier and a neural network MLP1. The third methodology detects the failure mode of the LBE-XADS after the first 90% time period and consists of a GM-based classifier and a neural network MLP2. The three proposed methodologies outperformed the fuzzy similarity approach of the previous work.
核系统故障的早期检测是核能领域的一个重要课题。本文提出了三种机器学习方法来检测铅铋共晶实验加速器驱动系统(LBE-XADS)核系统在3000秒任务时间的前10%、50%和90%的失效模式(FM)。第一种方法检测LBE-XADS在前10%时间段后的FM,并由两个基于高斯混合(gm)的分类器组成。第二种方法在前50%时间段后检测LBE-XADS的FM,由基于gm的分类器和神经网络MLP1组成。第三种方法检测LBE-XADS在前90%时间段后的故障模式,由基于gm的分类器和神经网络MLP2组成。提出的三种方法优于以前工作的模糊相似方法。
{"title":"Failure Modes Detection of Nuclear Systems Using Machine Learning","authors":"David Tian, Jiamei Deng, E. Zio, F. Maio, Fu-cheng Liao","doi":"10.1109/DSA.2018.00017","DOIUrl":"https://doi.org/10.1109/DSA.2018.00017","url":null,"abstract":"Early detection of the failure of a nuclear system is an important topic in nuclear energy. This paper proposes three machine learning methodologies to detect the failure modes (FM) of the Lead-Bismuth Eutectic eXperimental Accelerator Driven System (LBE-XADS) nuclear system after the first 10%, 50% and 90% time periods of the 3000 seconds mission time of the LBEXADS. The first methodology detects the FM of the LBE-XADS after the first 10% time period and consists of two Gaussian mixture-based (GM-based) classifiers. The second methodology detects the FM of the LBE-XADS after the first 50% time period and consists of a GM-based classifier and a neural network MLP1. The third methodology detects the failure mode of the LBE-XADS after the first 90% time period and consists of a GM-based classifier and a neural network MLP2. The three proposed methodologies outperformed the fuzzy similarity approach of the previous work.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method-Level Permission Analysis Based on Static Call Graph of Android Apps 基于Android应用静态呼叫图的方法级权限分析
Yan Hu, W. Kong, Deng Ding, Jun Yan
Android permission system is important for protecting the privacy of mobile phone users. However, Android apps may not always use permissions correctly. In Android, accesses to priviledged hardware or private information are generally conducted by calling APIs protected by certain types of permissions. Thus, people can analyze the method call statistics to gain insights into the usage of permissions in the Android App code. For Android Apps whose source codes are not available, the analysis process will face two major challenges: (1) mapping permission to APIs; (2) handle the thousands of methods and method invocations. To deal with the challenges, we propose a method-level permission usage analysis, which is adopted to analyze the disassembled bytecode of an Android App. We model the behaviors of App code by its static call graph. A social ranking method is applied upon the static call graph, and generate a ranking of all the methods in the target Android App. Based on the ranking results, we further provide a configurable permission-sensitive subgraph generation algorithm to direct our analysis to high ranked method, and inspect permission-specific subgraph of that typical method to get a very clear view of the compact calling structure of permission-sensitive methods.
Android权限系统对于保护手机用户的隐私非常重要。然而,Android应用程序可能并不总是正确使用权限。在Android中,访问特权硬件或私有信息通常是通过调用受特定类型权限保护的api来进行的。因此,人们可以分析方法调用统计数据,以深入了解Android应用程序代码中权限的使用情况。对于源代码不可用的Android应用程序,分析过程将面临两个主要挑战:(1)将权限映射到api;(2)处理成千上万的方法和方法调用。为了应对这些挑战,我们提出了一种方法级的权限使用分析方法,用于分析Android应用程序的反汇编字节码。我们通过静态调用图对应用程序代码的行为进行建模。在静态调用图上应用社会排序方法,生成目标Android App中所有方法的排序。基于排序结果,我们进一步提供了一个可配置的权限敏感子图生成算法,将我们的分析导向排名高的方法,并检查该典型方法的权限特定子图,以非常清晰地看到权限敏感方法的紧凑调用结构。
{"title":"Method-Level Permission Analysis Based on Static Call Graph of Android Apps","authors":"Yan Hu, W. Kong, Deng Ding, Jun Yan","doi":"10.1109/DSA.2018.00014","DOIUrl":"https://doi.org/10.1109/DSA.2018.00014","url":null,"abstract":"Android permission system is important for protecting the privacy of mobile phone users. However, Android apps may not always use permissions correctly. In Android, accesses to priviledged hardware or private information are generally conducted by calling APIs protected by certain types of permissions. Thus, people can analyze the method call statistics to gain insights into the usage of permissions in the Android App code. For Android Apps whose source codes are not available, the analysis process will face two major challenges: (1) mapping permission to APIs; (2) handle the thousands of methods and method invocations. To deal with the challenges, we propose a method-level permission usage analysis, which is adopted to analyze the disassembled bytecode of an Android App. We model the behaviors of App code by its static call graph. A social ranking method is applied upon the static call graph, and generate a ranking of all the methods in the target Android App. Based on the ranking results, we further provide a configurable permission-sensitive subgraph generation algorithm to direct our analysis to high ranked method, and inspect permission-specific subgraph of that typical method to get a very clear view of the compact calling structure of permission-sensitive methods.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130166666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Theoretical Analysis on the Impacts of Misestimated Test Cases 错误估计测试用例影响的理论分析
Yanhong Xu, Beibei Yin, Xiaohui Wan, Chenglong Li, Zheng Zheng
The outcomes of test play an important role in fault localization. Due to the oracle problem, there are a large number of test cases unlabelled in testing. They can not be used directly and it seriously affects the effectiveness of Spectrum-based fault localization techniques(SBFL). To utilize those test cases, various approaches have been proposed to estimate test outcomes. However, there is no guarantee that all unlabelled test cases are identified correctly. It is unknown that how these misestimated test cases will influence the performance of SBFL. In this paper, a theoretical analysis on the impacts of misestimated test cases is performed by considering two different types of misestimating. There are 24 risk evaluation formulas investigated in our study. Based on the analysis, some suggestions are provided for the labelling of unlabelled test cases to make it be beneficial to locate faults.
测试结果在故障定位中起着重要的作用。由于oracle的问题,有大量的测试用例在测试中没有标记。它们不能直接使用,严重影响了基于谱的故障定位技术(SBFL)的有效性。为了利用这些测试用例,已经提出了各种方法来评估测试结果。然而,不能保证所有未标记的测试用例都被正确识别。这些错误估计的测试用例将如何影响SBFL的性能是未知的。本文通过考虑两种不同类型的错误估计,从理论上分析了错误估计对测试用例的影响。本研究共研究了24种风险评价公式。在此基础上,提出了对未标记测试用例进行标记的建议,使其有利于故障定位。
{"title":"A Theoretical Analysis on the Impacts of Misestimated Test Cases","authors":"Yanhong Xu, Beibei Yin, Xiaohui Wan, Chenglong Li, Zheng Zheng","doi":"10.1109/DSA.2018.00028","DOIUrl":"https://doi.org/10.1109/DSA.2018.00028","url":null,"abstract":"The outcomes of test play an important role in fault localization. Due to the oracle problem, there are a large number of test cases unlabelled in testing. They can not be used directly and it seriously affects the effectiveness of Spectrum-based fault localization techniques(SBFL). To utilize those test cases, various approaches have been proposed to estimate test outcomes. However, there is no guarantee that all unlabelled test cases are identified correctly. It is unknown that how these misestimated test cases will influence the performance of SBFL. In this paper, a theoretical analysis on the impacts of misestimated test cases is performed by considering two different types of misestimating. There are 24 risk evaluation formulas investigated in our study. Based on the analysis, some suggestions are provided for the labelling of unlabelled test cases to make it be beneficial to locate faults.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Permission-Based Security Policies 生成基于权限的安全策略
Xin Li, Hua Vy Le Thanh, Yuxin Deng, Julian T Dolby
For access control in Java or .NET web applications, methods on the runtime stack are examined by the runtime systems for granted permissions, to prohibit from executing untrusted codes. There are quite limited research work on automatically generating security policies for configuring application components. In practice, configuring a security policy of web applications almost relies on the expertise of developers. In this work, we present an approach to automatically generating permission-based security policies for Java applications to pass the runtime authorization. Our technique is based on context-sensitive static proram analysis in the framework of conditional weighted pushdown systems. To tackle with the challenges of access rights analysis such as to statically identify permissions to be examined at stack inspection points, we propose to apply a uniform abstract interpretation of program calling contexts which are used to glue various analysis modules involved in access rights analysis including points-to analysis, string analysis and policy generation analysis. As a result, we can statically identify relevant permissions at the stack inspection sites and perform context-sensitive policy generation analysis.
对于Java或. net web应用程序中的访问控制,运行时系统检查运行时堆栈上的方法以获得授予的权限,以禁止执行不受信任的代码。关于自动生成用于配置应用程序组件的安全策略的研究工作相当有限。在实践中,配置web应用程序的安全策略几乎依赖于开发人员的专业知识。在这项工作中,我们提出了一种方法,为Java应用程序自动生成基于权限的安全策略,以通过运行时授权。我们的技术是基于条件加权下推系统框架下的上下文敏感静态程序分析。为了解决访问权限分析的难题,如在堆栈检查点静态识别要检查的权限,我们建议应用程序调用上下文的统一抽象解释,该解释用于粘合访问权限分析中涉及的各种分析模块,包括点对分析、字符串分析和策略生成分析。因此,我们可以静态地识别堆栈检查站点的相关权限,并执行上下文敏感的策略生成分析。
{"title":"Generating Permission-Based Security Policies","authors":"Xin Li, Hua Vy Le Thanh, Yuxin Deng, Julian T Dolby","doi":"10.1109/DSA.2018.00013","DOIUrl":"https://doi.org/10.1109/DSA.2018.00013","url":null,"abstract":"For access control in Java or .NET web applications, methods on the runtime stack are examined by the runtime systems for granted permissions, to prohibit from executing untrusted codes. There are quite limited research work on automatically generating security policies for configuring application components. In practice, configuring a security policy of web applications almost relies on the expertise of developers. In this work, we present an approach to automatically generating permission-based security policies for Java applications to pass the runtime authorization. Our technique is based on context-sensitive static proram analysis in the framework of conditional weighted pushdown systems. To tackle with the challenges of access rights analysis such as to statically identify permissions to be examined at stack inspection points, we propose to apply a uniform abstract interpretation of program calling contexts which are used to glue various analysis modules involved in access rights analysis including points-to analysis, string analysis and policy generation analysis. As a result, we can statically identify relevant permissions at the stack inspection sites and perform context-sensitive policy generation analysis.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSA 2018 Steering and Organizing Committees DSA 2018指导委员会和组织委员会
{"title":"DSA 2018 Steering and Organizing Committees","authors":"","doi":"10.1109/dsa.2018.00008","DOIUrl":"https://doi.org/10.1109/dsa.2018.00008","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting b区块链的安全性分析:以51%攻击检测为例
Congcong Ye, Guoqiang Li, Hongming Cai, Yonggen Gu, Akira Fukuda
Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%- Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.
最近,勒索病毒WannaCry在全球爆发,使得区块链成为热门话题。区块链的安全性一直是人们关注的焦点,也是区块链在全球范围内没有得到广泛应用的主要原因。许多研究使用数学推导的方法来分析区块链51%攻击的影响,这是非常僵硬和难以理解的。本文提出了一种模拟区块链过程的方法,发现了攻击方式、攻击能力和区块链安全性之间的规律。我们以51%-Attacks为例,使用Java来模拟其运行过程。通过调整攻击能力的值,我们可以得到区块链的大多数状态,并分析诚实状态变为攻击状态的概率。用各种形式对实验结果进行了分析和展示,验证了该方法的正确性和可行性。该方法也可以作为区块链的中间件软件实现,用于检测区块链的安全性。
{"title":"Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting","authors":"Congcong Ye, Guoqiang Li, Hongming Cai, Yonggen Gu, Akira Fukuda","doi":"10.1109/DSA.2018.00015","DOIUrl":"https://doi.org/10.1109/DSA.2018.00015","url":null,"abstract":"Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%- Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122903102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Message from the DSA 2018 General Chair 2018年DSA总主席致辞
{"title":"Message from the DSA 2018 General Chair","authors":"","doi":"10.1109/dsa.2018.00006","DOIUrl":"https://doi.org/10.1109/dsa.2018.00006","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124115117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSA 2018 Poster Abstracts DSA 2018海报摘要
{"title":"DSA 2018 Poster Abstracts","authors":"","doi":"10.1109/dsa.2018.00011","DOIUrl":"https://doi.org/10.1109/dsa.2018.00011","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127338391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification Model Translation Method toward Behavior Model for CAST 面向CAST的行为模型的验证模型转换方法
Takahiro Ando, Bo Wang, K. Hisazumi, W. Kong, Akira Fukuda, Yasutaka Michiura, Keita Sakemi, M. Matsumoto
In this study, we think the feature of exhaustively verifying the process model of model checking is effective for Causal Analysis based on Systems-Theoretic Accident Model and Process (CAST), and discuss the introduction of the model checking technology in CAST. In particular, we propose a verification model translation method for behavior models which are created in the CAST process. Because the interaction between multiple components is important in CAST, our translation method translates plural related SysML state machine diagrams describing the components behavior to one verification model. The verification model is described in Promela language for SPIN model checker. In order to suppress the cost of the model checking, our translation method has the feature that the verification model to be generated is simple. Furthermore, it has the feature that the correspondence between the related behavior models and the verification model is understandable, and the efficiency of the confirmation of verification result can be improved. In addition, since it has the feature that the communication situation between each state machine is easy to check, it is expected to be utilized for CAST. In this paper, we describe the rules to translate the related SysML state machine diagrams to a simple verification model in Promela.
本文认为模型检验的过程模型穷尽验证的特点对于基于系统理论的事故模型与过程(CAST)的原因分析是有效的,并讨论了模型检验技术在CAST中的引入。特别地,我们提出了一种验证模型转换方法,用于在CAST过程中创建的行为模型。因为多个组件之间的交互在CAST中很重要,所以我们的翻译方法将描述组件行为的多个相关的SysML状态机图转换为一个验证模型。用Promela语言描述了SPIN模型检查器的验证模型。为了抑制模型检查的成本,我们的翻译方法具有生成验证模型简单的特点。此外,它还具有相关行为模型与验证模型之间的对应关系易于理解的特点,可以提高验证结果的确认效率。此外,由于它具有易于检查每个状态机之间的通信情况的特性,因此期望将其用于CAST。在本文中,我们描述了将相关的SysML状态机图转换为Promela中的简单验证模型的规则。
{"title":"Verification Model Translation Method toward Behavior Model for CAST","authors":"Takahiro Ando, Bo Wang, K. Hisazumi, W. Kong, Akira Fukuda, Yasutaka Michiura, Keita Sakemi, M. Matsumoto","doi":"10.1109/DSA.2018.00032","DOIUrl":"https://doi.org/10.1109/DSA.2018.00032","url":null,"abstract":"In this study, we think the feature of exhaustively verifying the process model of model checking is effective for Causal Analysis based on Systems-Theoretic Accident Model and Process (CAST), and discuss the introduction of the model checking technology in CAST. In particular, we propose a verification model translation method for behavior models which are created in the CAST process. Because the interaction between multiple components is important in CAST, our translation method translates plural related SysML state machine diagrams describing the components behavior to one verification model. The verification model is described in Promela language for SPIN model checker. In order to suppress the cost of the model checking, our translation method has the feature that the verification model to be generated is simple. Furthermore, it has the feature that the correspondence between the related behavior models and the verification model is understandable, and the efficiency of the confirmation of verification result can be improved. In addition, since it has the feature that the communication situation between each state machine is easy to check, it is expected to be utilized for CAST. In this paper, we describe the rules to translate the related SysML state machine diagrams to a simple verification model in Promela.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 5th International Conference on Dependable Systems and Their Applications (DSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1