首页 > 最新文献

2018 5th International Conference on Dependable Systems and Their Applications (DSA)最新文献

英文 中文
Interval Estimation of Process Capability Indices Based on the Weibull Distributed Quality Data of Supplier Products 基于威布尔分布质量数据的供应商过程能力指标区间估计
Yanhe Cui, Jun Yang
Process capability indices (PCIs) play an important role in analyzing process quality capability. However, the occurrence of data fraud events indicates that suppliers may provide false information, which may result in inappropriate choices for customers. Thus, to estimate PCIs and further check authenticity of data provided by suppliers, it is necessary to carry out process capability analysis from supplier products. The quality data of supplier products are doubly truncated based on technical requirements. Considering many quality characteristics of products from practical processes follow Weibull distributions, we propose an interval estimation method of PCIs using the truncated Weibull data. First, Monte Carlo-EM algorithm is applied to estimate unknown parameters. Then, a quantile-filling algorithm is adopted to transform Weibull truncated data into pseudo-complete data. After pseudo-complete data are obtained, we apply generalized confidence interval to calculate interval estimation of PCIs. Finally, an example is provided to illustrate the implement of the proposed method.
过程能力指数在过程质量能力分析中起着重要的作用。然而,数据欺诈事件的发生表明供应商可能会提供虚假信息,从而导致客户做出不正确的选择。因此,为了评估pci,进一步检查供应商提供的数据的真实性,需要从供应商产品进行过程能力分析。根据技术要求,对供应商产品的质量数据进行双重截断。考虑到实际生产过程中产品的许多质量特征都遵循威布尔分布,提出了一种利用截断威布尔数据进行pci区间估计的方法。首先,采用蒙特卡罗- em算法对未知参数进行估计。然后,采用分位数填充算法将威布尔截断的数据转换为伪完备数据。在获得伪完备数据后,我们应用广义置信区间计算cpi的区间估计。最后,给出了一个实例来说明该方法的实现。
{"title":"Interval Estimation of Process Capability Indices Based on the Weibull Distributed Quality Data of Supplier Products","authors":"Yanhe Cui, Jun Yang","doi":"10.1109/DSA.2018.00024","DOIUrl":"https://doi.org/10.1109/DSA.2018.00024","url":null,"abstract":"Process capability indices (PCIs) play an important role in analyzing process quality capability. However, the occurrence of data fraud events indicates that suppliers may provide false information, which may result in inappropriate choices for customers. Thus, to estimate PCIs and further check authenticity of data provided by suppliers, it is necessary to carry out process capability analysis from supplier products. The quality data of supplier products are doubly truncated based on technical requirements. Considering many quality characteristics of products from practical processes follow Weibull distributions, we propose an interval estimation method of PCIs using the truncated Weibull data. First, Monte Carlo-EM algorithm is applied to estimate unknown parameters. Then, a quantile-filling algorithm is adopted to transform Weibull truncated data into pseudo-complete data. After pseudo-complete data are obtained, we apply generalized confidence interval to calculate interval estimation of PCIs. Finally, an example is provided to illustrate the implement of the proposed method.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134535356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Failure Modes Detection of Nuclear Systems Using Machine Learning 核系统故障模式的机器学习检测
David Tian, Jiamei Deng, E. Zio, F. Maio, Fu-cheng Liao
Early detection of the failure of a nuclear system is an important topic in nuclear energy. This paper proposes three machine learning methodologies to detect the failure modes (FM) of the Lead-Bismuth Eutectic eXperimental Accelerator Driven System (LBE-XADS) nuclear system after the first 10%, 50% and 90% time periods of the 3000 seconds mission time of the LBEXADS. The first methodology detects the FM of the LBE-XADS after the first 10% time period and consists of two Gaussian mixture-based (GM-based) classifiers. The second methodology detects the FM of the LBE-XADS after the first 50% time period and consists of a GM-based classifier and a neural network MLP1. The third methodology detects the failure mode of the LBE-XADS after the first 90% time period and consists of a GM-based classifier and a neural network MLP2. The three proposed methodologies outperformed the fuzzy similarity approach of the previous work.
核系统故障的早期检测是核能领域的一个重要课题。本文提出了三种机器学习方法来检测铅铋共晶实验加速器驱动系统(LBE-XADS)核系统在3000秒任务时间的前10%、50%和90%的失效模式(FM)。第一种方法检测LBE-XADS在前10%时间段后的FM,并由两个基于高斯混合(gm)的分类器组成。第二种方法在前50%时间段后检测LBE-XADS的FM,由基于gm的分类器和神经网络MLP1组成。第三种方法检测LBE-XADS在前90%时间段后的故障模式,由基于gm的分类器和神经网络MLP2组成。提出的三种方法优于以前工作的模糊相似方法。
{"title":"Failure Modes Detection of Nuclear Systems Using Machine Learning","authors":"David Tian, Jiamei Deng, E. Zio, F. Maio, Fu-cheng Liao","doi":"10.1109/DSA.2018.00017","DOIUrl":"https://doi.org/10.1109/DSA.2018.00017","url":null,"abstract":"Early detection of the failure of a nuclear system is an important topic in nuclear energy. This paper proposes three machine learning methodologies to detect the failure modes (FM) of the Lead-Bismuth Eutectic eXperimental Accelerator Driven System (LBE-XADS) nuclear system after the first 10%, 50% and 90% time periods of the 3000 seconds mission time of the LBEXADS. The first methodology detects the FM of the LBE-XADS after the first 10% time period and consists of two Gaussian mixture-based (GM-based) classifiers. The second methodology detects the FM of the LBE-XADS after the first 50% time period and consists of a GM-based classifier and a neural network MLP1. The third methodology detects the failure mode of the LBE-XADS after the first 90% time period and consists of a GM-based classifier and a neural network MLP2. The three proposed methodologies outperformed the fuzzy similarity approach of the previous work.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method-Level Permission Analysis Based on Static Call Graph of Android Apps 基于Android应用静态呼叫图的方法级权限分析
Yan Hu, W. Kong, Deng Ding, Jun Yan
Android permission system is important for protecting the privacy of mobile phone users. However, Android apps may not always use permissions correctly. In Android, accesses to priviledged hardware or private information are generally conducted by calling APIs protected by certain types of permissions. Thus, people can analyze the method call statistics to gain insights into the usage of permissions in the Android App code. For Android Apps whose source codes are not available, the analysis process will face two major challenges: (1) mapping permission to APIs; (2) handle the thousands of methods and method invocations. To deal with the challenges, we propose a method-level permission usage analysis, which is adopted to analyze the disassembled bytecode of an Android App. We model the behaviors of App code by its static call graph. A social ranking method is applied upon the static call graph, and generate a ranking of all the methods in the target Android App. Based on the ranking results, we further provide a configurable permission-sensitive subgraph generation algorithm to direct our analysis to high ranked method, and inspect permission-specific subgraph of that typical method to get a very clear view of the compact calling structure of permission-sensitive methods.
Android权限系统对于保护手机用户的隐私非常重要。然而,Android应用程序可能并不总是正确使用权限。在Android中,访问特权硬件或私有信息通常是通过调用受特定类型权限保护的api来进行的。因此,人们可以分析方法调用统计数据,以深入了解Android应用程序代码中权限的使用情况。对于源代码不可用的Android应用程序,分析过程将面临两个主要挑战:(1)将权限映射到api;(2)处理成千上万的方法和方法调用。为了应对这些挑战,我们提出了一种方法级的权限使用分析方法,用于分析Android应用程序的反汇编字节码。我们通过静态调用图对应用程序代码的行为进行建模。在静态调用图上应用社会排序方法,生成目标Android App中所有方法的排序。基于排序结果,我们进一步提供了一个可配置的权限敏感子图生成算法,将我们的分析导向排名高的方法,并检查该典型方法的权限特定子图,以非常清晰地看到权限敏感方法的紧凑调用结构。
{"title":"Method-Level Permission Analysis Based on Static Call Graph of Android Apps","authors":"Yan Hu, W. Kong, Deng Ding, Jun Yan","doi":"10.1109/DSA.2018.00014","DOIUrl":"https://doi.org/10.1109/DSA.2018.00014","url":null,"abstract":"Android permission system is important for protecting the privacy of mobile phone users. However, Android apps may not always use permissions correctly. In Android, accesses to priviledged hardware or private information are generally conducted by calling APIs protected by certain types of permissions. Thus, people can analyze the method call statistics to gain insights into the usage of permissions in the Android App code. For Android Apps whose source codes are not available, the analysis process will face two major challenges: (1) mapping permission to APIs; (2) handle the thousands of methods and method invocations. To deal with the challenges, we propose a method-level permission usage analysis, which is adopted to analyze the disassembled bytecode of an Android App. We model the behaviors of App code by its static call graph. A social ranking method is applied upon the static call graph, and generate a ranking of all the methods in the target Android App. Based on the ranking results, we further provide a configurable permission-sensitive subgraph generation algorithm to direct our analysis to high ranked method, and inspect permission-specific subgraph of that typical method to get a very clear view of the compact calling structure of permission-sensitive methods.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130166666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Theoretical Analysis on the Impacts of Misestimated Test Cases 错误估计测试用例影响的理论分析
Yanhong Xu, Beibei Yin, Xiaohui Wan, Chenglong Li, Zheng Zheng
The outcomes of test play an important role in fault localization. Due to the oracle problem, there are a large number of test cases unlabelled in testing. They can not be used directly and it seriously affects the effectiveness of Spectrum-based fault localization techniques(SBFL). To utilize those test cases, various approaches have been proposed to estimate test outcomes. However, there is no guarantee that all unlabelled test cases are identified correctly. It is unknown that how these misestimated test cases will influence the performance of SBFL. In this paper, a theoretical analysis on the impacts of misestimated test cases is performed by considering two different types of misestimating. There are 24 risk evaluation formulas investigated in our study. Based on the analysis, some suggestions are provided for the labelling of unlabelled test cases to make it be beneficial to locate faults.
测试结果在故障定位中起着重要的作用。由于oracle的问题,有大量的测试用例在测试中没有标记。它们不能直接使用,严重影响了基于谱的故障定位技术(SBFL)的有效性。为了利用这些测试用例,已经提出了各种方法来评估测试结果。然而,不能保证所有未标记的测试用例都被正确识别。这些错误估计的测试用例将如何影响SBFL的性能是未知的。本文通过考虑两种不同类型的错误估计,从理论上分析了错误估计对测试用例的影响。本研究共研究了24种风险评价公式。在此基础上,提出了对未标记测试用例进行标记的建议,使其有利于故障定位。
{"title":"A Theoretical Analysis on the Impacts of Misestimated Test Cases","authors":"Yanhong Xu, Beibei Yin, Xiaohui Wan, Chenglong Li, Zheng Zheng","doi":"10.1109/DSA.2018.00028","DOIUrl":"https://doi.org/10.1109/DSA.2018.00028","url":null,"abstract":"The outcomes of test play an important role in fault localization. Due to the oracle problem, there are a large number of test cases unlabelled in testing. They can not be used directly and it seriously affects the effectiveness of Spectrum-based fault localization techniques(SBFL). To utilize those test cases, various approaches have been proposed to estimate test outcomes. However, there is no guarantee that all unlabelled test cases are identified correctly. It is unknown that how these misestimated test cases will influence the performance of SBFL. In this paper, a theoretical analysis on the impacts of misestimated test cases is performed by considering two different types of misestimating. There are 24 risk evaluation formulas investigated in our study. Based on the analysis, some suggestions are provided for the labelling of unlabelled test cases to make it be beneficial to locate faults.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Permission-Based Security Policies 生成基于权限的安全策略
Xin Li, Hua Vy Le Thanh, Yuxin Deng, Julian T Dolby
For access control in Java or .NET web applications, methods on the runtime stack are examined by the runtime systems for granted permissions, to prohibit from executing untrusted codes. There are quite limited research work on automatically generating security policies for configuring application components. In practice, configuring a security policy of web applications almost relies on the expertise of developers. In this work, we present an approach to automatically generating permission-based security policies for Java applications to pass the runtime authorization. Our technique is based on context-sensitive static proram analysis in the framework of conditional weighted pushdown systems. To tackle with the challenges of access rights analysis such as to statically identify permissions to be examined at stack inspection points, we propose to apply a uniform abstract interpretation of program calling contexts which are used to glue various analysis modules involved in access rights analysis including points-to analysis, string analysis and policy generation analysis. As a result, we can statically identify relevant permissions at the stack inspection sites and perform context-sensitive policy generation analysis.
对于Java或. net web应用程序中的访问控制,运行时系统检查运行时堆栈上的方法以获得授予的权限,以禁止执行不受信任的代码。关于自动生成用于配置应用程序组件的安全策略的研究工作相当有限。在实践中,配置web应用程序的安全策略几乎依赖于开发人员的专业知识。在这项工作中,我们提出了一种方法,为Java应用程序自动生成基于权限的安全策略,以通过运行时授权。我们的技术是基于条件加权下推系统框架下的上下文敏感静态程序分析。为了解决访问权限分析的难题,如在堆栈检查点静态识别要检查的权限,我们建议应用程序调用上下文的统一抽象解释,该解释用于粘合访问权限分析中涉及的各种分析模块,包括点对分析、字符串分析和策略生成分析。因此,我们可以静态地识别堆栈检查站点的相关权限,并执行上下文敏感的策略生成分析。
{"title":"Generating Permission-Based Security Policies","authors":"Xin Li, Hua Vy Le Thanh, Yuxin Deng, Julian T Dolby","doi":"10.1109/DSA.2018.00013","DOIUrl":"https://doi.org/10.1109/DSA.2018.00013","url":null,"abstract":"For access control in Java or .NET web applications, methods on the runtime stack are examined by the runtime systems for granted permissions, to prohibit from executing untrusted codes. There are quite limited research work on automatically generating security policies for configuring application components. In practice, configuring a security policy of web applications almost relies on the expertise of developers. In this work, we present an approach to automatically generating permission-based security policies for Java applications to pass the runtime authorization. Our technique is based on context-sensitive static proram analysis in the framework of conditional weighted pushdown systems. To tackle with the challenges of access rights analysis such as to statically identify permissions to be examined at stack inspection points, we propose to apply a uniform abstract interpretation of program calling contexts which are used to glue various analysis modules involved in access rights analysis including points-to analysis, string analysis and policy generation analysis. As a result, we can statically identify relevant permissions at the stack inspection sites and perform context-sensitive policy generation analysis.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSA 2018 Steering and Organizing Committees DSA 2018指导委员会和组织委员会
{"title":"DSA 2018 Steering and Organizing Committees","authors":"","doi":"10.1109/dsa.2018.00008","DOIUrl":"https://doi.org/10.1109/dsa.2018.00008","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting b区块链的安全性分析:以51%攻击检测为例
Congcong Ye, Guoqiang Li, Hongming Cai, Yonggen Gu, Akira Fukuda
Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%- Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.
最近,勒索病毒WannaCry在全球爆发,使得区块链成为热门话题。区块链的安全性一直是人们关注的焦点,也是区块链在全球范围内没有得到广泛应用的主要原因。许多研究使用数学推导的方法来分析区块链51%攻击的影响,这是非常僵硬和难以理解的。本文提出了一种模拟区块链过程的方法,发现了攻击方式、攻击能力和区块链安全性之间的规律。我们以51%-Attacks为例,使用Java来模拟其运行过程。通过调整攻击能力的值,我们可以得到区块链的大多数状态,并分析诚实状态变为攻击状态的概率。用各种形式对实验结果进行了分析和展示,验证了该方法的正确性和可行性。该方法也可以作为区块链的中间件软件实现,用于检测区块链的安全性。
{"title":"Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting","authors":"Congcong Ye, Guoqiang Li, Hongming Cai, Yonggen Gu, Akira Fukuda","doi":"10.1109/DSA.2018.00015","DOIUrl":"https://doi.org/10.1109/DSA.2018.00015","url":null,"abstract":"Recently, the global outbreak of a blackmail virus WannaCry, makes the blockchain a hot topic. The security of blockchain is always the focus of people's attention, and it is also the main reason why the blockchain has not been widely used all over the world. Many researches use mathematical derivation method to analyse the 51%- Attacks influence of blockchain, which is very stiff and difficult to understand. In this paper, we propose a method to simulate blockchain's process and discover the rule between attacking method, attacking power and security of blockchain. We take 51%-Attacks as an example and use Java to simulate the running process. By adjusting the value of attacking power, we can get most states of blockchain and analyze the probability that honest state becomes attacking state. We use various forms to analyze and show the experimental result, which verify our method is correct and feasible. This method can also be implemented as a middleware software of blockchain to detect the security of blockchain.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122903102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Message from the DSA 2018 General Chair 2018年DSA总主席致辞
{"title":"Message from the DSA 2018 General Chair","authors":"","doi":"10.1109/dsa.2018.00006","DOIUrl":"https://doi.org/10.1109/dsa.2018.00006","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124115117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSA 2018 Poster Abstracts DSA 2018海报摘要
{"title":"DSA 2018 Poster Abstracts","authors":"","doi":"10.1109/dsa.2018.00011","DOIUrl":"https://doi.org/10.1109/dsa.2018.00011","url":null,"abstract":"","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127338391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage MCDC-Star:基于白盒的自动化测试生成,用于高MC/DC覆盖率
Linghuan Hu, W. E. Wong, D. R. Kuhn, R. Kacker
The US Federal Aviation Administration requires complete modified condition/decision coverage (MC/DC) for the most critical (level A) software. Complete MC/DC is a gold standard for thoroughness of testing. However, it is challenging to generate test cases to achieve high MC/DC as it requires testers to manually conduct complex control flow analysis. In this paper, we propose MCDC-Star, a white-box based automated test case generation technique for achieving high MC/DC coverage criterion using greedy-based symbolic execution. By analyzing the control-flow of the subject program, MCDC-Star generates test cases that can improve the MC/DC efficiently and effectively. An experiment using three industrial programs was conducted, and the results show its high effectiveness and efficiency.
美国联邦航空管理局要求对最关键的(A级)软件进行完整的修改条件/决策覆盖(MC/DC)。完整的MC/DC是测试彻底性的黄金标准。然而,生成测试用例以实现高MC/DC是具有挑战性的,因为它需要测试人员手动执行复杂的控制流分析。在本文中,我们提出了MCDC-Star,这是一种基于白盒的自动化测试用例生成技术,用于使用基于贪婪的符号执行来实现高MC/DC覆盖率标准。通过分析主题程序的控制流程,MCDC-Star生成测试用例,可以高效地改进MC/DC。采用三种工业方案进行了实验,结果表明了该方法的有效性和高效性。
{"title":"MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage","authors":"Linghuan Hu, W. E. Wong, D. R. Kuhn, R. Kacker","doi":"10.1109/DSA.2018.00027","DOIUrl":"https://doi.org/10.1109/DSA.2018.00027","url":null,"abstract":"The US Federal Aviation Administration requires complete modified condition/decision coverage (MC/DC) for the most critical (level A) software. Complete MC/DC is a gold standard for thoroughness of testing. However, it is challenging to generate test cases to achieve high MC/DC as it requires testers to manually conduct complex control flow analysis. In this paper, we propose MCDC-Star, a white-box based automated test case generation technique for achieving high MC/DC coverage criterion using greedy-based symbolic execution. By analyzing the control-flow of the subject program, MCDC-Star generates test cases that can improve the MC/DC efficiently and effectively. An experiment using three industrial programs was conducted, and the results show its high effectiveness and efficiency.","PeriodicalId":117496,"journal":{"name":"2018 5th International Conference on Dependable Systems and Their Applications (DSA)","volume":"73 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114012877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 5th International Conference on Dependable Systems and Their Applications (DSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1