首页 > 最新文献

2022 IEEE 29th Annual Software Technology Conference (STC)最新文献

英文 中文
Experience-Based Guidelines for Effective Planning & Management of Software Integration & Test Activities in the Agile/DevSecOps Environment 在敏捷/DevSecOps环境中有效规划和管理软件集成和测试活动的基于经验的指南
Pub Date : 2022-10-01 DOI: 10.1109/stc55697.2022.00028
Emily Arseneault, D. Boudreau, Jarred Lien, Gregory Young
Agile teams need to be ready to fail and try again. The Integration and Test (I&S) team is integral to this process because they provide the benchmarks against which DevSecOps development teams measure their work products. The integration process for Agile features must be flexible enough to handle changing schedules and requirements, while continuing to drive the program teams toward the ultimate goal of a successful program sell-off activity. Throughout the life of the contract the I&T team must continually integrate new features; work with the hardware & software teams to ensure product quality is preserved; and regression test the system at each software build release to ensure product stability. As the defense industry continues maturing its applications of the Agile and Devsecops philosophies, this family of I&T activities must be defined, managed, and executed within these frameworks.This presentation discusses in detail the integration of new features activity in I&T. Provided are practical. proven, experience-based guidelines for planning and managing this effort in the Agile framework. These guidelines derive from the successful integration of new capabilities into an unclassified foreign system, on a program employing DevSecOps. Information presented in this lecture is recommended to individuals interested in, or tasked with, this responsibility.
敏捷团队需要准备好失败并再次尝试。集成和测试(I&S)团队是这个过程不可或缺的一部分,因为他们提供了DevSecOps开发团队衡量其工作产品的基准。敏捷特性的集成过程必须足够灵活,以处理不断变化的时间表和需求,同时继续推动项目团队朝着成功的项目销售活动的最终目标前进。在合同的整个生命周期中,集成与测试团队必须不断地集成新特性;与硬件和软件团队合作,确保产品质量;并且在每次软件构建发布时对系统进行回归测试,以确保产品的稳定性。随着国防工业对敏捷和Devsecops哲学的应用不断成熟,必须在这些框架内定义、管理和执行这一系列的I&T活动。本报告详细讨论了集成与测试中新特性活动的集成。提供的都是实用的。在敏捷框架中规划和管理这些工作的经过验证的、基于经验的指导方针。这些指导方针源于在一个采用DevSecOps的项目上将新能力成功地集成到一个非机密的外国系统中。本讲座中提供的信息推荐给对这一职责感兴趣或负有此职责的个人。
{"title":"Experience-Based Guidelines for Effective Planning & Management of Software Integration & Test Activities in the Agile/DevSecOps Environment","authors":"Emily Arseneault, D. Boudreau, Jarred Lien, Gregory Young","doi":"10.1109/stc55697.2022.00028","DOIUrl":"https://doi.org/10.1109/stc55697.2022.00028","url":null,"abstract":"Agile teams need to be ready to fail and try again. The Integration and Test (I&S) team is integral to this process because they provide the benchmarks against which DevSecOps development teams measure their work products. The integration process for Agile features must be flexible enough to handle changing schedules and requirements, while continuing to drive the program teams toward the ultimate goal of a successful program sell-off activity. Throughout the life of the contract the I&T team must continually integrate new features; work with the hardware & software teams to ensure product quality is preserved; and regression test the system at each software build release to ensure product stability. As the defense industry continues maturing its applications of the Agile and Devsecops philosophies, this family of I&T activities must be defined, managed, and executed within these frameworks.This presentation discusses in detail the integration of new features activity in I&T. Provided are practical. proven, experience-based guidelines for planning and managing this effort in the Agile framework. These guidelines derive from the successful integration of new capabilities into an unclassified foreign system, on a program employing DevSecOps. Information presented in this lecture is recommended to individuals interested in, or tasked with, this responsibility.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133430049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing a Communication Network between Bases Station applied for Group of Drones 无人机群基站间通信网络的实现
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00025
Julio Opolski Netto, Robison Cris Brito, F. Favarim, Luis Felipe Priester, E. Todt
The use of Unmanned Aerial Vehicle (UAV) have been shown to be increasingly frequent for a diversity of applications, mainly in agriculture. The mapping of large areas for analysis purposes is common and it is considered a challenge due to the short range of the UAVs. The base stations utilization for drone recharge and important information obtainment is a relevant proposal. This paper features a low energy cost long range communication system between in base stations. Using Internet of Things (IoT) concepts and the possibility of utilizing a diversity of communication protocols in just a single device, this paper shows the integration between microcontroller, server and operator interface. The developed system is capable of identifying a drone that just landed in a base station through RFID technology, and send this and other information in real time through the command line “gateway” to the server using LoRa technology and Message Queuing Telemetry (MQTT) protocol.
无人驾驶飞行器(UAV)的使用已被证明越来越频繁地用于各种应用,主要是在农业领域。为分析目的绘制大面积地图是常见的,由于无人机的航程较短,这被认为是一项挑战。利用基站为无人机充电和获取重要信息是一个相关的建议。本文提出了一种低能耗的基站间远程通信系统。利用物联网(IoT)概念和在单个设备中利用多种通信协议的可能性,本文展示了微控制器,服务器和操作员界面之间的集成。开发的系统能够通过RFID技术识别刚刚降落在基站的无人机,并使用LoRa技术和消息队列遥测(MQTT)协议通过命令行“网关”实时发送此信息和其他信息到服务器。
{"title":"Implementing a Communication Network between Bases Station applied for Group of Drones","authors":"Julio Opolski Netto, Robison Cris Brito, F. Favarim, Luis Felipe Priester, E. Todt","doi":"10.1109/STC55697.2022.00025","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00025","url":null,"abstract":"The use of Unmanned Aerial Vehicle (UAV) have been shown to be increasingly frequent for a diversity of applications, mainly in agriculture. The mapping of large areas for analysis purposes is common and it is considered a challenge due to the short range of the UAVs. The base stations utilization for drone recharge and important information obtainment is a relevant proposal. This paper features a low energy cost long range communication system between in base stations. Using Internet of Things (IoT) concepts and the possibility of utilizing a diversity of communication protocols in just a single device, this paper shows the integration between microcontroller, server and operator interface. The developed system is capable of identifying a drone that just landed in a base station through RFID technology, and send this and other information in real time through the command line “gateway” to the server using LoRa technology and Message Queuing Telemetry (MQTT) protocol.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System 利用LSTM和专家系统从漏洞报告中自动提取软件名称
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00024
Igor Khokhlov, A. Okutan, Ryan Bryla, Steven Simmons, Mehdi Mirakhorli
Software vulnerabilities are closely monitored by the security community to timely address the security and privacy issues in software systems. Before a vulnerability is published by vulnerability management systems, it needs to be characterized to highlight its unique attributes, including affected software products and versions, to help security professionals prioritize their patches. Associating product names and versions with disclosed vulnerabilities may require a labor-intensive process that may delay their publication and fix, and thereby give attackers more time to exploit them. This work proposes a machine learning method to extract software product names and versions from unstructured CVE descriptions automatically. It uses Word2Vec and Char2Vec models to create context-aware features from CVE descriptions and uses these features to train a Named Entity Recognition (NER) model using bidirectional Long short-term memory (LSTM) networks. Based on the attributes of the product names and versions in previously published CVE descriptions, we created a set of Expert System (ES) rules to refine the predictions of the NER model and improve the performance of the developed method. Experiment results on real-life CVE examples indicate that using the trained NER model and the set of ES rules, software names and versions in unstructured CVE descriptions could be identified with F-Measure values above 0.95.
软件漏洞由安全社区密切监控,以及时解决软件系统的安全和隐私问题。在漏洞管理系统发布漏洞之前,需要对其进行特征化,以突出其独特的属性,包括受影响的软件产品和版本,以帮助安全专业人员优先考虑他们的补丁。将产品名称和版本与公开的漏洞关联起来可能需要耗费大量人力的过程,这可能会延迟它们的发布和修复,从而给攻击者更多的时间来利用它们。本文提出了一种从非结构化CVE描述中自动提取软件产品名称和版本的机器学习方法。它使用Word2Vec和Char2Vec模型从CVE描述中创建上下文感知特征,并使用这些特征训练使用双向长短期记忆(LSTM)网络的命名实体识别(NER)模型。基于先前发布的CVE描述中产品名称和版本的属性,我们创建了一组专家系统(ES)规则来改进NER模型的预测并提高所开发方法的性能。实际CVE实例的实验结果表明,使用训练好的NER模型和ES规则集,可以识别非结构化CVE描述中的软件名称和版本,F-Measure值大于0.95。
{"title":"Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System","authors":"Igor Khokhlov, A. Okutan, Ryan Bryla, Steven Simmons, Mehdi Mirakhorli","doi":"10.1109/STC55697.2022.00024","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00024","url":null,"abstract":"Software vulnerabilities are closely monitored by the security community to timely address the security and privacy issues in software systems. Before a vulnerability is published by vulnerability management systems, it needs to be characterized to highlight its unique attributes, including affected software products and versions, to help security professionals prioritize their patches. Associating product names and versions with disclosed vulnerabilities may require a labor-intensive process that may delay their publication and fix, and thereby give attackers more time to exploit them. This work proposes a machine learning method to extract software product names and versions from unstructured CVE descriptions automatically. It uses Word2Vec and Char2Vec models to create context-aware features from CVE descriptions and uses these features to train a Named Entity Recognition (NER) model using bidirectional Long short-term memory (LSTM) networks. Based on the attributes of the product names and versions in previously published CVE descriptions, we created a set of Expert System (ES) rules to refine the predictions of the NER model and improve the performance of the developed method. Experiment results on real-life CVE examples indicate that using the trained NER model and the set of ES rules, software names and versions in unstructured CVE descriptions could be identified with F-Measure values above 0.95.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126380968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Documentation: Automating Document Preparation with your DevSecOps Pipeline 连续文档:使用DevSecOps管道自动化文档准备
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00029
Bill Andel
End item deliveries to government customers are usually accompanied by a multitude of required documents, typically in print-ready formats such as Microsoft Word or Adobe Portable Document Format (PDF). Preparing these documents requires tedious manual collation and re-formatting of data from a multitude of data sources, which takes a significant amount of labor, is error-prone, and incurs lengthy review and approval cycles.How can we modernize our document preparation to support continuous release and delivery? Continuous Documentation (CDoc)! By leveraging the Authoritative Sources of Truth (ASOTs) for data already within our DevSecOps pipelines, we can extend the concept of “Documents as Code” (DaC) to reliably and repeatably automate document preparation using a suite of Free and Open-Source Software (FOSS) tools. Continuous Documentation ensures documents are ready for delivery and release in the print-ready formats customers expect at the same time as the software they accompany.
交付给政府客户的最终产品通常附带大量所需文件,通常是可打印的格式,例如Microsoft Word或Adobe Portable Document Format (PDF)。准备这些文档需要对来自大量数据源的数据进行繁琐的手工整理和重新格式化,这需要大量的人力,容易出错,并且需要冗长的审查和批准周期。我们如何使文档准备现代化,以支持持续发布和交付?连续文档(CDoc)!通过利用DevSecOps管道中已经存在的数据的权威真相来源(ASOTs),我们可以扩展“文档即代码”(DaC)的概念,使用一套免费和开源软件(FOSS)工具可靠且可重复地自动化文档准备。持续文档确保文档以客户期望的打印格式交付和发布,同时伴随软件。
{"title":"Continuous Documentation: Automating Document Preparation with your DevSecOps Pipeline","authors":"Bill Andel","doi":"10.1109/STC55697.2022.00029","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00029","url":null,"abstract":"End item deliveries to government customers are usually accompanied by a multitude of required documents, typically in print-ready formats such as Microsoft Word or Adobe Portable Document Format (PDF). Preparing these documents requires tedious manual collation and re-formatting of data from a multitude of data sources, which takes a significant amount of labor, is error-prone, and incurs lengthy review and approval cycles.How can we modernize our document preparation to support continuous release and delivery? Continuous Documentation (CDoc)! By leveraging the Authoritative Sources of Truth (ASOTs) for data already within our DevSecOps pipelines, we can extend the concept of “Documents as Code” (DaC) to reliably and repeatably automate document preparation using a suite of Free and Open-Source Software (FOSS) tools. Continuous Documentation ensures documents are ready for delivery and release in the print-ready formats customers expect at the same time as the software they accompany.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128975466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Zero Trust Validation: from Practice to Theory : An empirical research project to improve Zero Trust implementations 零信任验证:从实践到理论:改进零信任实施的实证研究项目
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00021
Y. Bobbert, J. Scheerder
How can high-level directives concerning risk, cybersecurity and compliance be operationalized in the central nervous system of any organization above a certain complexity? How can the effectiveness of technological solutions for security be proven and measured, and how can this technology be aligned with the governance and financial goals at the board level? These are the essential questions for any CEO, CIO or CISO that is concerned with the wellbeing of the firm. The concept of Zero Trust (ZT) approaches information and cybersecurity from the perspective of the asset to be protected, and from the value that asset represents. Zero Trust has been around for quite some time. Most professionals associate Zero Trust with a particular architectural approach to cybersecurity, involving concepts such as segments, resources that are accessed in a secure manner and the maxim “always verify never trust”. This paper describes the current state of the art in Zero Trust usage. We investigate the limitations of current approaches and how these are addressed in the form of Critical Success Factors in the Zero Trust Framework developed by ON2IT ‘Zero Trust Innovators’ (1). Furthermore, this paper describes the design and engineering of a Zero Trust artefact that addresses the problems at hand (2), according to Design Science Research (DSR). The last part of this paper outlines the setup of an empirical validation trough practitioner oriented research, in order to gain a broader acceptance and implementation of Zero Trust strategies (3). The final result is a proposed framework and associated technology which, via Zero Trust principles, addresses multiple layers of the organization to grasp and align cybersecurity risks and understand the readiness and fitness of the organization and its measures to counter cybersecurity risks.
关于风险、网络安全和合规性的高级指令如何在任何组织的中枢神经系统中具有一定的复杂性?如何证明和衡量安全技术解决方案的有效性,以及如何使该技术与董事会级别的治理和财务目标保持一致?对于任何关心公司健康的首席执行官、首席信息官或首席信息安全官来说,这些都是必不可少的问题。零信任(Zero Trust, ZT)的概念是从要保护的资产和资产所代表的价值的角度来处理信息和网络安全的。零信任已经存在很长一段时间了。大多数专业人士将零信任与特定的网络安全架构方法联系在一起,包括分段、以安全方式访问的资源以及“永远验证永远不信任”的格言等概念。本文描述了零信任技术使用的现状。我们研究了当前方法的局限性,以及如何以ON2IT“零信任创新者”开发的零信任框架中的关键成功因素的形式解决这些问题(1)。此外,根据设计科学研究(DSR),本文描述了解决手头问题的零信任工件的设计和工程(2)。本文的最后一部分概述了通过面向从业者的研究建立经验验证,以便获得更广泛的接受和实施零信任策略(3)。最终的结果是一个拟议的框架和相关技术,通过零信任原则,解决了组织的多个层面,以掌握和调整网络安全风险,并了解组织的准备和适合度及其应对网络安全风险的措施。
{"title":"Zero Trust Validation: from Practice to Theory : An empirical research project to improve Zero Trust implementations","authors":"Y. Bobbert, J. Scheerder","doi":"10.1109/STC55697.2022.00021","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00021","url":null,"abstract":"How can high-level directives concerning risk, cybersecurity and compliance be operationalized in the central nervous system of any organization above a certain complexity? How can the effectiveness of technological solutions for security be proven and measured, and how can this technology be aligned with the governance and financial goals at the board level? These are the essential questions for any CEO, CIO or CISO that is concerned with the wellbeing of the firm. The concept of Zero Trust (ZT) approaches information and cybersecurity from the perspective of the asset to be protected, and from the value that asset represents. Zero Trust has been around for quite some time. Most professionals associate Zero Trust with a particular architectural approach to cybersecurity, involving concepts such as segments, resources that are accessed in a secure manner and the maxim “always verify never trust”. This paper describes the current state of the art in Zero Trust usage. We investigate the limitations of current approaches and how these are addressed in the form of Critical Success Factors in the Zero Trust Framework developed by ON2IT ‘Zero Trust Innovators’ (1). Furthermore, this paper describes the design and engineering of a Zero Trust artefact that addresses the problems at hand (2), according to Design Science Research (DSR). The last part of this paper outlines the setup of an empirical validation trough practitioner oriented research, in order to gain a broader acceptance and implementation of Zero Trust strategies (3). The final result is a proposed framework and associated technology which, via Zero Trust principles, addresses multiple layers of the organization to grasp and align cybersecurity risks and understand the readiness and fitness of the organization and its measures to counter cybersecurity risks.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128583183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Neural Model for Generating Method Names from Combined Contexts 从组合上下文生成方法名的神经模型
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00009
Zane Varner, Çerağ Oğuztüzün, Feng Long
The names given to methods within a software system are critical to the success of both software development and maintenance. Meaningful and concise method names save developers both time and effort when attempting to understand and use the code. Our study focuses on learning concise and meaningful method names from word tokens found within the contexts of a method, including the method documentation, input parameters, return type, method body, and enclosing class. Combining the approaches of previous studies, we constructed both an RNN encoder-decoder model with attention as well as a Transformer model, each tested using different combinations of contextual information as input. Our experiments demonstrate that a model that uses all of the mentioned contexts will have a higher performance than a model that uses any subset of the contexts. Furthermore, we demonstrate that the Transformer model outperforms the RNN model in this scenario.
软件系统中方法的名称对于软件开发和维护的成功至关重要。在试图理解和使用代码时,有意义和简洁的方法名节省了开发人员的时间和精力。我们的研究侧重于从方法上下文(包括方法文档、输入参数、返回类型、方法体和封闭类)中的单词标记中学习简洁而有意义的方法名称。结合以往的研究方法,我们构建了一个带有注意力的RNN编码器-解码器模型和一个Transformer模型,每个模型都使用上下文信息的不同组合作为输入进行测试。我们的实验表明,使用所有上述上下文的模型将比使用任何上下文子集的模型具有更高的性能。此外,我们证明了Transformer模型在这种情况下优于RNN模型。
{"title":"Neural Model for Generating Method Names from Combined Contexts","authors":"Zane Varner, Çerağ Oğuztüzün, Feng Long","doi":"10.1109/STC55697.2022.00009","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00009","url":null,"abstract":"The names given to methods within a software system are critical to the success of both software development and maintenance. Meaningful and concise method names save developers both time and effort when attempting to understand and use the code. Our study focuses on learning concise and meaningful method names from word tokens found within the contexts of a method, including the method documentation, input parameters, return type, method body, and enclosing class. Combining the approaches of previous studies, we constructed both an RNN encoder-decoder model with attention as well as a Transformer model, each tested using different combinations of contextual information as input. Our experiments demonstrate that a model that uses all of the mentioned contexts will have a higher performance than a model that uses any subset of the contexts. Furthermore, we demonstrate that the Transformer model outperforms the RNN model in this scenario.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model-Agnostic Scoring Methods for Artificial Intelligence Assurance 人工智能保障的模型不可知评分方法
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00011
Md. Nazmul Kabir Sikder, Feras A. Batarseh, Pei Wang, Nitish Gorentala
State of the art Artificial Intelligence Assurance (AIA) methods validate AI systems based on predefined goals and standards, are applied within a given domain, and are designed for a specific AI algorithm. Existing works do not provide information on assuring subjective AI goals such as fairness and trustworthiness. Other assurance goals are frequently required in an intelligent deployment, including explainability, safety, and security. Accordingly, issues such as value loading, generalization, context, and scalability arise; however, achieving multiple assurance goals without major trade-offs is generally deemed an unattainable task. In this manuscript, we present two AIA pipelines that are model-agnostic, independent of the domain (such as: healthcare, energy, banking), and provide scores for AIA goals including explainability, safety, and security. The two pipelines: Adversarial Logging Scoring Pipeline (ALSP) and Requirements Feedback Scoring Pipeline (RFSP) are scalable and tested with multiple use cases, such as a water distribution network and a telecommunications network, to illustrate their benefits. ALSP optimizes models using a game theory approach and it also logs and scores the actions of an AI model to detect adversarial inputs, and assures the datasets used for training. RFSP identifies the best hyper-parameters using a Bayesian approach and provides assurance scores for subjective goals such as ethical AI using user inputs and statistical assurance measures. Each pipeline has three algorithms that enforce the final assurance scores and other outcomes. Unlike ALSP (which is a parallel process), RFSP is user-driven and its actions are sequential. Data are collected for experimentation; the results of both pipelines are presented and contrasted.
最先进的人工智能保证(AIA)方法基于预定义的目标和标准验证人工智能系统,在给定的领域内应用,并为特定的人工智能算法设计。现有的工作没有提供有关确保公平和可信度等主观人工智能目标的信息。在智能部署中经常需要其他保证目标,包括可解释性、安全性和安全性。因此,出现了诸如值加载、泛化、上下文和可扩展性等问题;然而,在没有重大权衡的情况下实现多个保证目标通常被认为是不可能完成的任务。在本文中,我们提出了两个与模型无关、独立于领域(如:医疗保健、能源、银行)的AIA管道,并提供了AIA目标(包括可解释性、安全性和安全性)的分数。这两种管道:对抗性测井评分管道(ALSP)和需求反馈评分管道(RFSP)是可扩展的,并在多个用例中进行了测试,例如配水网络和电信网络,以说明它们的好处。ALSP使用博弈论方法优化模型,它还记录和评分人工智能模型的动作,以检测对抗性输入,并确保用于训练的数据集。RFSP使用贝叶斯方法识别最佳超参数,并使用用户输入和统计保证措施为主观目标(如道德人工智能)提供保证分数。每个管道都有三种算法来执行最终的保证分数和其他结果。与ALSP(并行进程)不同,RFSP是用户驱动的,其操作是顺序的。收集数据用于实验;给出了两种管道的计算结果并进行了对比。
{"title":"Model-Agnostic Scoring Methods for Artificial Intelligence Assurance","authors":"Md. Nazmul Kabir Sikder, Feras A. Batarseh, Pei Wang, Nitish Gorentala","doi":"10.1109/STC55697.2022.00011","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00011","url":null,"abstract":"State of the art Artificial Intelligence Assurance (AIA) methods validate AI systems based on predefined goals and standards, are applied within a given domain, and are designed for a specific AI algorithm. Existing works do not provide information on assuring subjective AI goals such as fairness and trustworthiness. Other assurance goals are frequently required in an intelligent deployment, including explainability, safety, and security. Accordingly, issues such as value loading, generalization, context, and scalability arise; however, achieving multiple assurance goals without major trade-offs is generally deemed an unattainable task. In this manuscript, we present two AIA pipelines that are model-agnostic, independent of the domain (such as: healthcare, energy, banking), and provide scores for AIA goals including explainability, safety, and security. The two pipelines: Adversarial Logging Scoring Pipeline (ALSP) and Requirements Feedback Scoring Pipeline (RFSP) are scalable and tested with multiple use cases, such as a water distribution network and a telecommunications network, to illustrate their benefits. ALSP optimizes models using a game theory approach and it also logs and scores the actions of an AI model to detect adversarial inputs, and assures the datasets used for training. RFSP identifies the best hyper-parameters using a Bayesian approach and provides assurance scores for subjective goals such as ethical AI using user inputs and statistical assurance measures. Each pipeline has three algorithms that enforce the final assurance scores and other outcomes. Unlike ALSP (which is a parallel process), RFSP is user-driven and its actions are sequential. Data are collected for experimentation; the results of both pipelines are presented and contrasted.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction to AI Assurance for Policy Makers 政策制定者人工智能保障导论
Pub Date : 2022-10-01 DOI: 10.1109/stc55697.2022.00016
Luke Biersmith, P. Laplante
The deployment of artificial intelligence (AI) applications has accelerated faster than most scientists, policymakers and business leaders could have predicted. AI enabled technologies are facing the public in many ways including infrastructure, consumer products and home applications. Because many of these technologies present risk either in the form of physical injury or unfair outcomes, policy makers must consider the need for oversight. Most policymakers, however, lack the technical knowledge to judge whether an emerging AI technology is safe, effective and requires oversight, therefore depending on experts opinion. But policymakers are better served when, in addition to expert opinion, they have some general understanding of existing guidelines and regulations.While not comprehensive, this work provides an overview of AI legislation and directives at the international, U.S. state and federal levels. It also covers business standards, and technical society initiatives. This work can serve as a resource for policymakers and other key stakeholders and an entry point to their understanding of AI policy.
人工智能(AI)应用的部署速度比大多数科学家、政策制定者和商业领袖所能预测的要快。人工智能技术在很多方面都面向公众,包括基础设施、消费产品和家庭应用。由于这些技术中的许多都存在人身伤害或不公平结果的风险,政策制定者必须考虑监督的必要性。然而,大多数政策制定者缺乏技术知识来判断新兴的人工智能技术是否安全、有效并需要监督,因此取决于专家的意见。但是,除了专家意见之外,如果政策制定者对现有的指导方针和法规有一定的了解,他们就能得到更好的服务。虽然不全面,但这项工作概述了国际、美国州和联邦层面的人工智能立法和指令。它还涵盖了业务标准和技术社会活动。这项工作可以作为政策制定者和其他关键利益相关者的资源,并作为他们理解人工智能政策的切入点。
{"title":"Introduction to AI Assurance for Policy Makers","authors":"Luke Biersmith, P. Laplante","doi":"10.1109/stc55697.2022.00016","DOIUrl":"https://doi.org/10.1109/stc55697.2022.00016","url":null,"abstract":"The deployment of artificial intelligence (AI) applications has accelerated faster than most scientists, policymakers and business leaders could have predicted. AI enabled technologies are facing the public in many ways including infrastructure, consumer products and home applications. Because many of these technologies present risk either in the form of physical injury or unfair outcomes, policy makers must consider the need for oversight. Most policymakers, however, lack the technical knowledge to judge whether an emerging AI technology is safe, effective and requires oversight, therefore depending on experts opinion. But policymakers are better served when, in addition to expert opinion, they have some general understanding of existing guidelines and regulations.While not comprehensive, this work provides an overview of AI legislation and directives at the international, U.S. state and federal levels. It also covers business standards, and technical society initiatives. This work can serve as a resource for policymakers and other key stakeholders and an entry point to their understanding of AI policy.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123456627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Generation of Software Security Scoring Systems Leveraging Human Expert Opinion 利用人类专家意见的软件安全评分系统的生成
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00023
P. Mell
While the existence of many security elements in software can be measured (e.g., vulnerabilities, security controls, or privacy controls), it is challenging to measure their relative security impact. In the physical world we can often measure the impact of individual elements to a system. However, in cyber security we often lack ground truth (i.e., the ability to directly measure significance). In this work we propose to solve this by leveraging human expert opinion to provide ground truth. Experts are iteratively asked to compare pairs of security elements to determine their relative significance. On the back end our knowledge encoding tool performs a form of binary insertion sort on a set of security elements using each expert as an oracle for the element comparisons. The tool not only sorts the elements (note that equality may be permitted), but it also records the strength or degree of each relationship. The output is a directed acyclic ‘constraint’ graph that provides a total ordering among the sets of equivalent elements. Multiple constraint graphs are then unified together to form a single graph that is used to generate a scoring or prioritization system.For our empirical study, we apply this domain-agnostic measurement approach to generate scoring/prioritization systems in the areas of vulnerability scoring, privacy control prioritization, and cyber security control evaluation.
虽然可以测量软件中存在的许多安全元素(例如,漏洞、安全控制或隐私控制),但测量它们的相对安全影响是具有挑战性的。在物理世界中,我们经常可以度量单个元素对系统的影响。然而,在网络安全领域,我们往往缺乏基础真相(即直接衡量重要性的能力)。在这项工作中,我们建议通过利用人类专家意见来提供基础事实来解决这个问题。专家被反复要求比较安全元素对,以确定它们的相对重要性。在后端,我们的知识编码工具对一组安全元素执行一种形式的二进制插入排序,使用每个专家作为元素比较的oracle。该工具不仅对元素进行排序(注意可能允许相等),而且还记录每个关系的强度或程度。输出是一个有向无环“约束”图,它提供了等效元素集合之间的总排序。然后将多个约束图统一在一起,形成用于生成评分或优先级系统的单个图。在我们的实证研究中,我们应用这种领域不可知的测量方法来生成漏洞评分、隐私控制优先级和网络安全控制评估领域的评分/优先级系统。
{"title":"The Generation of Software Security Scoring Systems Leveraging Human Expert Opinion","authors":"P. Mell","doi":"10.1109/STC55697.2022.00023","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00023","url":null,"abstract":"While the existence of many security elements in software can be measured (e.g., vulnerabilities, security controls, or privacy controls), it is challenging to measure their relative security impact. In the physical world we can often measure the impact of individual elements to a system. However, in cyber security we often lack ground truth (i.e., the ability to directly measure significance). In this work we propose to solve this by leveraging human expert opinion to provide ground truth. Experts are iteratively asked to compare pairs of security elements to determine their relative significance. On the back end our knowledge encoding tool performs a form of binary insertion sort on a set of security elements using each expert as an oracle for the element comparisons. The tool not only sorts the elements (note that equality may be permitted), but it also records the strength or degree of each relationship. The output is a directed acyclic ‘constraint’ graph that provides a total ordering among the sets of equivalent elements. Multiple constraint graphs are then unified together to form a single graph that is used to generate a scoring or prioritization system.For our empirical study, we apply this domain-agnostic measurement approach to generate scoring/prioritization systems in the areas of vulnerability scoring, privacy control prioritization, and cyber security control evaluation.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125665712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Failures in Artificial Intelligent Learning Systems (FAILS) 分析人工智能学习系统中的故障(FAILS)
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00010
Francis Durso, M. Raunak, Rick Kuhn, R. Kacker
We learn more from analyzing failures in engineering than by studying successes. There is significant value in documenting and tracking AI failures in sufficient detail to understand their root causes, and to put processes and practices in place toward preventing similar problems in the future. Similar efforts to track and record vulnerabilities in traditional software led to the establishment of National Vulnerability Database, which has contributed towards understanding vulnerability trends, their root causes, and how to prevent them [1], [3].
我们从分析工程中的失败中学到的东西比研究成功要多。充分详细地记录和跟踪人工智能故障,以了解其根本原因,并将流程和实践放在适当位置,以防止将来出现类似问题,这是有重要价值的。类似的对传统软件漏洞的跟踪和记录导致了国家漏洞数据库的建立,这有助于了解漏洞的趋势、根源以及如何预防漏洞[1],[3]。
{"title":"Analyzing Failures in Artificial Intelligent Learning Systems (FAILS)","authors":"Francis Durso, M. Raunak, Rick Kuhn, R. Kacker","doi":"10.1109/STC55697.2022.00010","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00010","url":null,"abstract":"We learn more from analyzing failures in engineering than by studying successes. There is significant value in documenting and tracking AI failures in sufficient detail to understand their root causes, and to put processes and practices in place toward preventing similar problems in the future. Similar efforts to track and record vulnerabilities in traditional software led to the establishment of National Vulnerability Database, which has contributed towards understanding vulnerability trends, their root causes, and how to prevent them [1], [3].","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 29th Annual Software Technology Conference (STC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1