首页 > 最新文献

2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)最新文献

英文 中文
MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep Learning 元:深度学习中基于对抗性示例的测试能力多维评估
Siqi Gu, Jiawei Liu, Zhan-wei Hui, Wenhong Liu, Zhenyu Chen
Deep learning (DL) has shown superior performance in many areas, making the quality assurance of DL-based software particularly important. Adversarial examples are generated by deliberately adding subtle perturbations in input samples and can easily attack less reliable DL models. Most existing works only utilize a single metric to evaluate the generated adversarial examples, such as attacking success rate or structure similarity measure. The problem is that they cannot avoid extreme testing situations and provide multifaceted evaluation results.This paper presents MetaA, a multi-dimensional evaluation framework for testing ability of adversarial examples in deep learning. Evaluating the testing ability represents measuring the testing performance to make improvements. Specifically, MetaA performs comprehensive validation on generating adversarial examples from two horizontal and five vertical dimensions. We design MetaA according to the definition of the adversarial examples and the issue mentioned in [1] that how to enrich the evaluation dimension rather than merely quantifying the improvement of DL and software.We conduct several analyses and comparative experiments vertically and horizontally to evaluate the reliability and effectiveness of MetaA. The experimental results show that MetaA can avoid speculation and reach agreement among different indicators when they reflect inconsistencies. The detailed and comprehensive analysis of evaluation results can further guide the optimization of adversarial examples and the quality assurance of DL-based software.
深度学习(DL)在许多领域显示出卓越的性能,这使得基于DL的软件的质量保证变得尤为重要。对抗性示例是通过故意在输入样本中添加微妙的扰动而生成的,可以很容易地攻击不太可靠的深度学习模型。大多数现有的工作只使用单一的度量来评估生成的对抗示例,例如攻击成功率或结构相似性度量。问题是他们无法避免极端的测试情况,并提供多方面的评估结果。本文提出了一种用于深度学习中对抗样例测试能力的多维评估框架meta。评估测试能力代表测量测试性能以做出改进。具体来说,MetaA从两个水平和五个垂直维度生成对抗性示例进行全面验证。我们根据对抗性示例的定义和[1]中提到的如何丰富评估维度而不仅仅是量化DL和软件的改进的问题来设计meta。我们在纵向和横向上进行了多次分析和对比实验,以评估meta的可靠性和有效性。实验结果表明,当不同指标反映不一致性时,meta可以避免猜测,并达成一致。对评价结果进行详细、全面的分析,可以进一步指导对抗性样例的优化和基于dl的软件的质量保证。
{"title":"MetaA: Multi-Dimensional Evaluation of Testing Ability via Adversarial Examples in Deep Learning","authors":"Siqi Gu, Jiawei Liu, Zhan-wei Hui, Wenhong Liu, Zhenyu Chen","doi":"10.1109/QRS57517.2022.00104","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00104","url":null,"abstract":"Deep learning (DL) has shown superior performance in many areas, making the quality assurance of DL-based software particularly important. Adversarial examples are generated by deliberately adding subtle perturbations in input samples and can easily attack less reliable DL models. Most existing works only utilize a single metric to evaluate the generated adversarial examples, such as attacking success rate or structure similarity measure. The problem is that they cannot avoid extreme testing situations and provide multifaceted evaluation results.This paper presents MetaA, a multi-dimensional evaluation framework for testing ability of adversarial examples in deep learning. Evaluating the testing ability represents measuring the testing performance to make improvements. Specifically, MetaA performs comprehensive validation on generating adversarial examples from two horizontal and five vertical dimensions. We design MetaA according to the definition of the adversarial examples and the issue mentioned in [1] that how to enrich the evaluation dimension rather than merely quantifying the improvement of DL and software.We conduct several analyses and comparative experiments vertically and horizontally to evaluate the reliability and effectiveness of MetaA. The experimental results show that MetaA can avoid speculation and reach agreement among different indicators when they reflect inconsistencies. The detailed and comprehensive analysis of evaluation results can further guide the optimization of adversarial examples and the quality assurance of DL-based software.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adopting Misclassification Detection and Outlier Modification to Fault Correction in Deep Learning-Based Systems 基于深度学习系统的误分类检测和离群值修正故障校正
Chuan-Min Chu, Chin-Yu Huang, Neil C. Fang
Over the past few decades, researchers in software engineering (SE) have focused on testing, analyzing, repairing, and generating programs automatically and effectively. Today, combining neural networks and traditional software engineering techniques has major potential to benefit software quality and productivity. Regarding the development of neural networks, deep learning (DL) and convolution neural networks (CNNs) have been widely adopted by software applications for making decisions or providing suggestions. Considering life-critical DL-based applications, there is a need to correct the wrong decisions made by DL systems immediately. Therefore, we propose a novel fault-correction framework for alleviating potential misclassification issues of DL systems called the Outlier Modification for DL Systems (OMDLS). Our experiment results with two public datasets using different scales and label numbers to show that modifying the outliers based on the misclassification pairs can improve accuracy by up to 2.12% without retraining the model and modifying the inference immediately.
在过去的几十年里,软件工程(SE)的研究人员一直专注于自动有效地测试、分析、修复和生成程序。今天,将神经网络和传统的软件工程技术结合起来,对软件质量和生产力有很大的好处。在神经网络的发展方面,深度学习(deep learning, DL)和卷积神经网络(convolutional neural network, cnn)已被广泛应用于软件应用中,用于决策或提供建议。考虑到生命攸关的基于DL的应用程序,需要立即纠正DL系统做出的错误决策。因此,我们提出了一种新的错误纠正框架,用于减轻深度学习系统潜在的错误分类问题,称为深度学习系统的离群值修正(OMDLS)。我们在两个不同尺度和标签号的公共数据集上的实验结果表明,在不立即重新训练模型和修改推理的情况下,基于错误分类对修改异常值可以提高准确率高达2.12%。
{"title":"Adopting Misclassification Detection and Outlier Modification to Fault Correction in Deep Learning-Based Systems","authors":"Chuan-Min Chu, Chin-Yu Huang, Neil C. Fang","doi":"10.1109/QRS57517.2022.00108","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00108","url":null,"abstract":"Over the past few decades, researchers in software engineering (SE) have focused on testing, analyzing, repairing, and generating programs automatically and effectively. Today, combining neural networks and traditional software engineering techniques has major potential to benefit software quality and productivity. Regarding the development of neural networks, deep learning (DL) and convolution neural networks (CNNs) have been widely adopted by software applications for making decisions or providing suggestions. Considering life-critical DL-based applications, there is a need to correct the wrong decisions made by DL systems immediately. Therefore, we propose a novel fault-correction framework for alleviating potential misclassification issues of DL systems called the Outlier Modification for DL Systems (OMDLS). Our experiment results with two public datasets using different scales and label numbers to show that modifying the outliers based on the misclassification pairs can improve accuracy by up to 2.12% without retraining the model and modifying the inference immediately.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128698115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QRS 2022 Steering Committee QRS 2022指导委员会
{"title":"QRS 2022 Steering Committee","authors":"","doi":"10.1109/qrs57517.2022.00006","DOIUrl":"https://doi.org/10.1109/qrs57517.2022.00006","url":null,"abstract":"","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124658754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coverage Testing of Industrial Simulink Models using Monte-Carlo and SMT-Based Methods 基于蒙特卡罗和smt方法的工业Simulink模型覆盖测试
Daisuke Ishii, Takashi Tomita, Toshiaki Aoki, The Quyen Ngo, Thi Bich Ngoc Do, Hideaki Takai
Simulink is a popular tool for modeling cyber-physical systems. As more models are produced in industry, automated quality assurance of models becomes increasingly important. This paper describes an empirical evaluation of four methods for the coverage testing of Simulink models: A) SimuLink Design Verifier (SLDV), a dedicated official tool; B) Template-Based Monte-Carlo (TBMC) method, a random test generation method that utilizes input signal templates; C) SMT- Based Model Checking (SBMC) method that conducts static analysis via encoding models into logic formulas; and D) a hybrid method of B and C. Based on the evaluation results, we carefully designed the hybrid method to complement the features of TBMC and SBMC. In the experiments, we have applied the methods to fourteen models and evaluated their performance. The results show that the hybrid method achieved better results than SLDV for several models.
Simulink是一种流行的网络物理系统建模工具。随着工业中生产的模型越来越多,模型的自动化质量保证变得越来越重要。本文对Simulink模型覆盖率测试的四种方法进行了实证评价:A) Simulink设计验证器(SLDV),一种专用的官方工具;B)基于模板的蒙特卡罗(TBMC)方法,一种利用输入信号模板的随机测试生成方法;C) SMT- Based Model Checking (SBMC)方法,通过将模型编码为逻辑公式进行静态分析;D) B和c的混合方法。根据评价结果,我们精心设计了混合方法,以补充TBMC和SBMC的特点。在实验中,我们将这些方法应用于14个模型,并对它们的性能进行了评估。结果表明,混合方法在多个模型上均优于SLDV方法。
{"title":"Coverage Testing of Industrial Simulink Models using Monte-Carlo and SMT-Based Methods","authors":"Daisuke Ishii, Takashi Tomita, Toshiaki Aoki, The Quyen Ngo, Thi Bich Ngoc Do, Hideaki Takai","doi":"10.1109/QRS57517.2022.00050","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00050","url":null,"abstract":"Simulink is a popular tool for modeling cyber-physical systems. As more models are produced in industry, automated quality assurance of models becomes increasingly important. This paper describes an empirical evaluation of four methods for the coverage testing of Simulink models: A) SimuLink Design Verifier (SLDV), a dedicated official tool; B) Template-Based Monte-Carlo (TBMC) method, a random test generation method that utilizes input signal templates; C) SMT- Based Model Checking (SBMC) method that conducts static analysis via encoding models into logic formulas; and D) a hybrid method of B and C. Based on the evaluation results, we carefully designed the hybrid method to complement the features of TBMC and SBMC. In the experiments, we have applied the methods to fourteen models and evaluated their performance. The results show that the hybrid method achieved better results than SLDV for several models.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Low-Dimensional Software Code Representation using BERT and ELMo 基于BERT和ELMo的有效的低维软件代码表示
Srijoni Majumdar, Ashutosh Varshney, Partha Pratim Das, Paul D. Clough, S. Chattopadhyay
Contextualised word representations (e.g., ELMo and BERT) have been shown to outperform static representations (e.g., Word2vec, Fasttext, and GloVe) for many NLP tasks. In this paper, we investigate the use of contextualised embeddings for code search and classification, an area receiving less attention. We construct CodeELMo by training ELMo from scratch and fine tuning CodeBERT embeddings using masked language modeling based on natural language (NL) texts related to software development concepts and programming language (PL) texts consisting of method comment pairs from open source code bases. The dimensionality of the Finetuned Code BERT embeddings is reduced using linear transformations and augmented with a CodeELMo representation to develop CodeELBE – a lowdimensional contextualised software code representation. Results for binary classification and retrieval tasks show that CodeELBE1 considerably improves retrieval performance on standard deep code search datasets compared to CodeBERT and baseline BERT models.
在许多NLP任务中,情境化的单词表示(例如ELMo和BERT)已经被证明优于静态表示(例如Word2vec, Fasttext和GloVe)。在本文中,我们研究了上下文化嵌入在代码搜索和分类中的使用,这是一个很少受到关注的领域。我们通过从头开始训练ELMo来构建CodeELMo,并使用基于与软件开发概念相关的自然语言(NL)文本和由来自开源代码库的方法注释对组成的编程语言(PL)文本的掩码语言建模来微调CodeBERT嵌入。精调代码BERT嵌入的维数使用线性变换来降低,并使用CodeELMo表示来增强,从而开发出CodeELBE——一种低维的上下文化软件代码表示。二进制分类和检索任务的结果表明,与CodeBERT和基线BERT模型相比,CodeELBE1显著提高了标准深度代码搜索数据集的检索性能。
{"title":"An Effective Low-Dimensional Software Code Representation using BERT and ELMo","authors":"Srijoni Majumdar, Ashutosh Varshney, Partha Pratim Das, Paul D. Clough, S. Chattopadhyay","doi":"10.1109/QRS57517.2022.00082","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00082","url":null,"abstract":"Contextualised word representations (e.g., ELMo and BERT) have been shown to outperform static representations (e.g., Word2vec, Fasttext, and GloVe) for many NLP tasks. In this paper, we investigate the use of contextualised embeddings for code search and classification, an area receiving less attention. We construct CodeELMo by training ELMo from scratch and fine tuning CodeBERT embeddings using masked language modeling based on natural language (NL) texts related to software development concepts and programming language (PL) texts consisting of method comment pairs from open source code bases. The dimensionality of the Finetuned Code BERT embeddings is reduced using linear transformations and augmented with a CodeELMo representation to develop CodeELBE – a lowdimensional contextualised software code representation. Results for binary classification and retrieval tasks show that CodeELBE1 considerably improves retrieval performance on standard deep code search datasets compared to CodeBERT and baseline BERT models.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132440310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Uncertainty-Aware Behavior Modeling and Quantitative Safety Evaluation for Automatic Flight Control Systems 自动飞行控制系统的不确定性感知行为建模与定量安全评估
Huiyu Liu, Jing Liu, Haiying Sun, Tengfei Li, John Zhang
Automatic flight control systems (AFCS) are safety-critical systems tightly integrating computation, networking and physical processes. However, the uncertainty resulting from evolving dynamics in cyberspace and the physical world can affect the reliability of decision-making in the controller, threatening the system’s safety. How to accurately capture the uncertainty, effectively control the aircraft and improve safety has become an unavoidable challenge for the software industry. To this end, we define an uncertainty-aware modeling language (UAML), which supports modeling the AFCS’s dynamic behavior and environmental uncertainty using formal specifications. We use a machine learning-based method to predict the risk levels in operating environments as the representation of uncertainty from the physical world. The prediction result is transferred to UAML as the parameters. On this basis, we present a framework for quantitative safety evaluation using statistical model checking based on UPPAAL-SMC to help AFCS make reliable decisions at runtime. We illustrate our approach by modeling and analyzing a realistic example, and the experimental result demonstrates the effectiveness of our approach.
自动飞行控制系统(AFCS)是将计算、网络和物理过程紧密集成在一起的安全关键系统。然而,网络空间和物理世界中不断变化的动态所产生的不确定性会影响控制器决策的可靠性,威胁到系统的安全。如何准确捕捉不确定性,有效控制飞机,提高安全性,已成为软件行业不可回避的挑战。为此,我们定义了一种不确定性感知建模语言(UAML),该语言支持使用正式规范对AFCS的动态行为和环境不确定性进行建模。我们使用基于机器学习的方法来预测操作环境中的风险水平,作为来自物理世界的不确定性的表示。将预测结果作为参数传递给UAML。在此基础上,我们提出了一个基于UPPAAL-SMC的统计模型检验的定量安全评估框架,以帮助AFCS在运行时做出可靠的决策。通过对一个实例的建模和分析,验证了该方法的有效性。
{"title":"Uncertainty-Aware Behavior Modeling and Quantitative Safety Evaluation for Automatic Flight Control Systems","authors":"Huiyu Liu, Jing Liu, Haiying Sun, Tengfei Li, John Zhang","doi":"10.1109/QRS57517.2022.00062","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00062","url":null,"abstract":"Automatic flight control systems (AFCS) are safety-critical systems tightly integrating computation, networking and physical processes. However, the uncertainty resulting from evolving dynamics in cyberspace and the physical world can affect the reliability of decision-making in the controller, threatening the system’s safety. How to accurately capture the uncertainty, effectively control the aircraft and improve safety has become an unavoidable challenge for the software industry. To this end, we define an uncertainty-aware modeling language (UAML), which supports modeling the AFCS’s dynamic behavior and environmental uncertainty using formal specifications. We use a machine learning-based method to predict the risk levels in operating environments as the representation of uncertainty from the physical world. The prediction result is transferred to UAML as the parameters. On this basis, we present a framework for quantitative safety evaluation using statistical model checking based on UPPAAL-SMC to help AFCS make reliable decisions at runtime. We illustrate our approach by modeling and analyzing a realistic example, and the experimental result demonstrates the effectiveness of our approach.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ontological Analysis of Safety-Critical Software and Its Anomalies 安全关键软件及其异常的本体论分析
Hezhen Liu, Zhi Jin, Zheng Zheng, Chengqiang Huang, Xun Zhang
The progressively dominant role of software in safety-critical systems raise concerns about the software dependability. There are limited mature practices and guides for assessing software dependability and analyzing system-level hazards triggered by software anomalies. A problem is that faults, errors, and failures that represent software anomalies, albeit with different natures, are usually used indistinctly to predict software dependability, leading to unsolid results. The lack of such consensual conceptualization also leads to poor interoperability between supporting tools, and, consequently, difficulties in anomaly management and software maintenance. Anomaly analysis and management is more tough for safety-critical software due to its higher complexity and the safety-critical nature. The complex context of safety-critical software causes difficulties in determining the evolution/propagation path of software anomalies and the impact on system safety. To capture the nature of safety-critical software and support an understanding of mechanisms of software anomalies and associated hazards, we propose three reference ontologies: Safety-critical Software Ontology, Software Fault Ontology and Software-failure-induced Hazard Ontology, which are built based on international standards, guides, and relevant conceptual models. We also discuss the relationships among them. That will facilitate a better understanding of the software anomaly mechanisms and the design of intervening/mitigation solutions. We demonstrate how these ontologies can help analyze software problems of real-world safety-critical systems.
软件在安全关键系统中逐渐占据主导地位,这引起了人们对软件可靠性的关注。评估软件可靠性和分析由软件异常触发的系统级危害的成熟实践和指南是有限的。一个问题是,尽管具有不同的性质,但表示软件异常的故障、错误和失败通常被模糊地用于预测软件的可靠性,从而导致不可靠的结果。这种共识概念化的缺乏还会导致支持工具之间的互操作性差,从而导致异常管理和软件维护方面的困难。由于异常的复杂性和安全关键性,异常分析和管理对于安全关键型软件来说更加困难。安全关键型软件的复杂环境导致在确定软件异常的演化/传播路径以及对系统安全的影响方面存在困难。为了捕捉安全关键型软件的本质并支持对软件异常和相关危害机制的理解,我们提出了三个参考本体:安全关键型软件本体、软件故障本体和软件故障诱导危害本体,它们是基于国际标准、指南和相关概念模型构建的。我们还讨论了它们之间的关系。这将有助于更好地理解软件异常机制和设计干预/缓解解决方案。我们将演示这些本体如何帮助分析现实世界安全关键系统的软件问题。
{"title":"An Ontological Analysis of Safety-Critical Software and Its Anomalies","authors":"Hezhen Liu, Zhi Jin, Zheng Zheng, Chengqiang Huang, Xun Zhang","doi":"10.1109/QRS57517.2022.00040","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00040","url":null,"abstract":"The progressively dominant role of software in safety-critical systems raise concerns about the software dependability. There are limited mature practices and guides for assessing software dependability and analyzing system-level hazards triggered by software anomalies. A problem is that faults, errors, and failures that represent software anomalies, albeit with different natures, are usually used indistinctly to predict software dependability, leading to unsolid results. The lack of such consensual conceptualization also leads to poor interoperability between supporting tools, and, consequently, difficulties in anomaly management and software maintenance. Anomaly analysis and management is more tough for safety-critical software due to its higher complexity and the safety-critical nature. The complex context of safety-critical software causes difficulties in determining the evolution/propagation path of software anomalies and the impact on system safety. To capture the nature of safety-critical software and support an understanding of mechanisms of software anomalies and associated hazards, we propose three reference ontologies: Safety-critical Software Ontology, Software Fault Ontology and Software-failure-induced Hazard Ontology, which are built based on international standards, guides, and relevant conceptual models. We also discuss the relationships among them. That will facilitate a better understanding of the software anomaly mechanisms and the design of intervening/mitigation solutions. We demonstrate how these ontologies can help analyze software problems of real-world safety-critical systems.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MC/DC Test Case Automatic Generation for Safety-Critical Systems 安全关键系统的MC/DC测试用例自动生成
Cong Wang, Haiying Sun, Hui Dou, HongTao Chen, Jing Liu
Testing is an essential part of the software development of Safety-Critical Systems (SCSs). Since it can automatically generate test cases using the system requirement models, Model-Based Testing (MBT) is suitable for SCSs. However, most of the existing system modeling languages for SCSs mainly focus on representing functional requirements rather than safety, e.g., SysML. In this paper, we first propose a modeling language, Safety SysML State Machine (S2MSM), to guarantee safety during the requirement modeling stage. Second, we propose a model transformation algorithm to transform the S2MSM model into an intermediate model. Then, we design a time flow operation sequence that simulates the external real-time environment. Finally, we generate test cases from the intermediate model according to the MC/DC criterion and time flow operation sequence. We conduct a case study on a real-world SCS application to demonstrate the effectiveness and efficiency of the proposed approach.
测试是安全关键系统软件开发的重要组成部分。由于它可以使用系统需求模型自动生成测试用例,因此基于模型的测试(MBT)适合于scs。然而,大多数现有的系统建模语言主要侧重于表示功能需求,而不是安全性,例如SysML。本文首先提出了一种建模语言——安全SysML状态机(S2MSM),以保证需求建模阶段的安全性。其次,提出了一种模型转换算法,将S2MSM模型转换为中间模型。然后,我们设计了一个模拟外部实时环境的时间流操作序列。最后,根据MC/DC准则和时间流操作顺序,从中间模型生成测试用例。我们对一个实际的SCS应用进行了案例研究,以证明所建议方法的有效性和效率。
{"title":"MC/DC Test Case Automatic Generation for Safety-Critical Systems","authors":"Cong Wang, Haiying Sun, Hui Dou, HongTao Chen, Jing Liu","doi":"10.1109/QRS57517.2022.00079","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00079","url":null,"abstract":"Testing is an essential part of the software development of Safety-Critical Systems (SCSs). Since it can automatically generate test cases using the system requirement models, Model-Based Testing (MBT) is suitable for SCSs. However, most of the existing system modeling languages for SCSs mainly focus on representing functional requirements rather than safety, e.g., SysML. In this paper, we first propose a modeling language, Safety SysML State Machine (S2MSM), to guarantee safety during the requirement modeling stage. Second, we propose a model transformation algorithm to transform the S2MSM model into an intermediate model. Then, we design a time flow operation sequence that simulates the external real-time environment. Finally, we generate test cases from the intermediate model according to the MC/DC criterion and time flow operation sequence. We conduct a case study on a real-world SCS application to demonstrate the effectiveness and efficiency of the proposed approach.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115164525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability and Cost aware Multi-'omain Service Deployment Optimization 可用性和成本意识多域服务部署优化
Chuangchuang Zhang, Yanming Liu, Hong-yong Yang, Yihao Li, Shuning Zhang
Network Function Virtualization (NFV) achieves flexible provisioning of network services by using Service Function Chain (SFC) composed of a set of Virtual Network Functions (VNFs). However, complex multi-domain networks pose serious challenges to multi-domain service deployment with availability guarantee. In this paper, we study the availability and cost aware multi-domain service deployment optimization problem. We formulate a multi-objective optimization model with the aim to minimize resource consumption cost and operating cost, while guaranteeing availability by jointly considering VNF failures and server failures, as well as cross-domain deployment operating cost. Then, we design a VNF backup based multi-domain SFC deployment algorithm to reduce resource consumption cost and operating cost. The evaluation results demonstrate that our proposed algorithm can achieve lower resource consumption cost and operating cost than comparison algorithms.
NFV (Network Function Virtualization)是一种网络功能虚拟化技术,它利用由一组虚拟网络功能(VNFs)组成的SFC (Service Function Chain)来实现网络服务的灵活发放。然而,复杂的多域网络给多域业务部署带来了严峻的挑战。本文研究了具有可用性和成本意识的多域服务部署优化问题。我们建立了多目标优化模型,以最小化资源消耗成本和运营成本为目标,同时综合考虑VNF故障和服务器故障,以及跨域部署运营成本,保证可用性。然后,设计了一种基于VNF备份的多域SFC部署算法,以降低资源消耗成本和运行成本。评价结果表明,与比较算法相比,本文提出的算法可以实现更低的资源消耗成本和运行成本。
{"title":"Availability and Cost aware Multi-'omain Service Deployment Optimization","authors":"Chuangchuang Zhang, Yanming Liu, Hong-yong Yang, Yihao Li, Shuning Zhang","doi":"10.1109/QRS57517.2022.00051","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00051","url":null,"abstract":"Network Function Virtualization (NFV) achieves flexible provisioning of network services by using Service Function Chain (SFC) composed of a set of Virtual Network Functions (VNFs). However, complex multi-domain networks pose serious challenges to multi-domain service deployment with availability guarantee. In this paper, we study the availability and cost aware multi-domain service deployment optimization problem. We formulate a multi-objective optimization model with the aim to minimize resource consumption cost and operating cost, while guaranteeing availability by jointly considering VNF failures and server failures, as well as cross-domain deployment operating cost. Then, we design a VNF backup based multi-domain SFC deployment algorithm to reduce resource consumption cost and operating cost. The evaluation results demonstrate that our proposed algorithm can achieve lower resource consumption cost and operating cost than comparison algorithms.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115960383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Identification of Performance Changes at Code Level 在代码级别自动识别性能变化
D. Reichelt, Stefan Kühne, W. Hasselbring
To develop software with optimal performance, even small performance changes need to be identified. Identifying performance changes is challenging since the performance of software is influenced by non-deterministic factors. Therefore, not every performance change is measurable with reasonable effort. In this work, we discuss which performance changes are measurable at code level with reasonable measurement effort and how to identify them. We present (1) an analysis of the boundaries of measuring performance changes, (2) an approach for determining a configuration for reproducible performance change identification, and (3) an evaluation comparing of how well our approach is able to identify performance changes in the application server Jetty compared with the usage of Jetty’s own performance regression benchmarks.Thereby, we find (1) that small performance differences are only measurable by fine-grained measurement workloads, (2) that performance changes caused by the change of one operation can be identified using a unit-test-sized workload definition and a suitable configuration, and (3) that using our approach identifies small performance regressions more efficiently than using Jetty’s performance regression benchmarks.
为了开发具有最佳性能的软件,即使是很小的性能变化也需要被识别出来。识别性能变化具有挑战性,因为软件的性能受到不确定性因素的影响。因此,并不是每一个性能变化都可以通过合理的努力来衡量。在这项工作中,我们讨论了哪些性能变化是可以在代码级别上通过合理的测量工作来测量的,以及如何识别它们。我们提出(1)对测量性能变化的边界的分析,(2)确定可重复的性能变化识别的配置的方法,以及(3)与使用Jetty自己的性能回归基准相比,我们的方法能够识别应用服务器Jetty中的性能变化的程度的评估比较。因此,我们发现(1)微小的性能差异只能通过细粒度的测量工作负载来测量,(2)可以使用单元测试大小的工作负载定义和合适的配置来识别由一个操作变化引起的性能变化,以及(3)使用我们的方法比使用Jetty的性能回归基准更有效地识别小的性能回归。
{"title":"Automated Identification of Performance Changes at Code Level","authors":"D. Reichelt, Stefan Kühne, W. Hasselbring","doi":"10.1109/QRS57517.2022.00096","DOIUrl":"https://doi.org/10.1109/QRS57517.2022.00096","url":null,"abstract":"To develop software with optimal performance, even small performance changes need to be identified. Identifying performance changes is challenging since the performance of software is influenced by non-deterministic factors. Therefore, not every performance change is measurable with reasonable effort. In this work, we discuss which performance changes are measurable at code level with reasonable measurement effort and how to identify them. We present (1) an analysis of the boundaries of measuring performance changes, (2) an approach for determining a configuration for reproducible performance change identification, and (3) an evaluation comparing of how well our approach is able to identify performance changes in the application server Jetty compared with the usage of Jetty’s own performance regression benchmarks.Thereby, we find (1) that small performance differences are only measurable by fine-grained measurement workloads, (2) that performance changes caused by the change of one operation can be identified using a unit-test-sized workload definition and a suitable configuration, and (3) that using our approach identifies small performance regressions more efficiently than using Jetty’s performance regression benchmarks.","PeriodicalId":143812,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122530498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1