首页 > 最新文献

2022 IEEE 29th Annual Software Technology Conference (STC)最新文献

英文 中文
Bayesian Approach for Regression Testing (BART) using Test Suite Prioritization 使用测试套件优先级的回归测试贝叶斯方法(BART)
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00027
Prabuddh Gupta, Divya Balakrishna, Rohit R. Shende, Vikram Raina, Shalini Lal, Aditya Doshatti, Lalitha Sripada, Mitesh Sharma, Shiva Thamilavel
Majority of the current state-of-the-art test suite (TS) prioritization algorithms for black-box testing focus on improving average percentage of fault detected (APFD) metric. These however suffer from two critical challenges 1) high time complexity of $ge O(n^{2})$ where n is the number of test suites, and 2) limited ability to self-stop TS Prioritization (TSP) computation if the system under test (SUT) becomes highly stable. In this work we present an approach to overcome these two challenges while achieving high APFD efficiency over the conventional random ordering. A novel algorithm called Bayesian approach to regression testing (BART) is developed herein which models continuous integration (CI) cycle’s attributes like test suite life cycle (TSLC), stability and bugs as Bayesian inference pattern namely Dirichlet-Multinomial model. This work demonstrates that BART’s APFD metrics improve significantly in comparison to conventional random ordering and therefore this approach achieves for the first time a complexity of $O(nlogn)$ for black-box based test prioritization.
目前大多数用于黑盒测试的最先进的测试套件(TS)优先级算法都关注于提高故障检测的平均百分比(APFD)度量。然而,这些方法面临两个关键挑战:1)高时间复杂度$ $ O(n^{2})$,其中n是测试套件的数量;2)如果被测系统(SUT)变得高度稳定,则自停止TS优先级(TSP)计算的能力有限。在这项工作中,我们提出了一种方法来克服这两个挑战,同时实现比传统随机排序更高的APFD效率。本文提出了一种新的贝叶斯回归测试方法(BART),该方法将持续集成(CI)周期的测试套件生命周期(TSLC)、稳定性和bug等属性建模为贝叶斯推理模式,即Dirichlet-Multinomial模型。这项工作表明,与传统的随机排序相比,BART的APFD指标有了显著的改善,因此这种方法首次实现了基于黑盒的测试优先级复杂度为$ 0 (nlogn)$。
{"title":"Bayesian Approach for Regression Testing (BART) using Test Suite Prioritization","authors":"Prabuddh Gupta, Divya Balakrishna, Rohit R. Shende, Vikram Raina, Shalini Lal, Aditya Doshatti, Lalitha Sripada, Mitesh Sharma, Shiva Thamilavel","doi":"10.1109/STC55697.2022.00027","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00027","url":null,"abstract":"Majority of the current state-of-the-art test suite (TS) prioritization algorithms for black-box testing focus on improving average percentage of fault detected (APFD) metric. These however suffer from two critical challenges 1) high time complexity of $ge O(n^{2})$ where n is the number of test suites, and 2) limited ability to self-stop TS Prioritization (TSP) computation if the system under test (SUT) becomes highly stable. In this work we present an approach to overcome these two challenges while achieving high APFD efficiency over the conventional random ordering. A novel algorithm called Bayesian approach to regression testing (BART) is developed herein which models continuous integration (CI) cycle’s attributes like test suite life cycle (TSLC), stability and bugs as Bayesian inference pattern namely Dirichlet-Multinomial model. This work demonstrates that BART’s APFD metrics improve significantly in comparison to conventional random ordering and therefore this approach achieves for the first time a complexity of $O(nlogn)$ for black-box based test prioritization.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116253643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Ledger Technology Design using Hyperledger Fabric and a Clinical Trial Use Case 使用超级账本结构的分布式账本技术设计和临床试验用例
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00031
R. Kuhn, Joshua D. Roberts, David F. Ferraiolo, J. Defranco
Industry continues to be challenged when attempting to share data among organizations, especially when the data comes from different database management systems (DBMS) and different DBMS schemas. Another concern is that privacy laws may require some types of data to be protected under local access policies. We describe a secure data sharing solution using Next-generation Database Access Control (NDAC) and the Data Block Matrix (DBM). A clinical trial data use case is discussed, as well as a description of a proof-of-concept implementation of the DBM using Hyperledger Fabric. The solution described allows data access where the data resides, rather than exchanging or being centrally stored. Additionally, it solves the conflict between conventional blockchain use and privacy regulations, by using a form of distributed ledger technology that meets ‘right to erasure’ requirements.
当试图在组织之间共享数据时,行业仍然面临挑战,特别是当数据来自不同的数据库管理系统(DBMS)和不同的DBMS模式时。另一个担忧是,隐私法可能要求某些类型的数据在本地访问策略下受到保护。我们描述了一个使用下一代数据库访问控制(NDAC)和数据块矩阵(DBM)的安全数据共享解决方案。讨论了一个临床试验数据用例,以及使用Hyperledger Fabric的DBM的概念验证实现的描述。所描述的解决方案允许访问数据所在的位置,而不是交换或集中存储。此外,它通过使用一种满足“删除权”要求的分布式账本技术,解决了传统区块链使用与隐私法规之间的冲突。
{"title":"A Distributed Ledger Technology Design using Hyperledger Fabric and a Clinical Trial Use Case","authors":"R. Kuhn, Joshua D. Roberts, David F. Ferraiolo, J. Defranco","doi":"10.1109/STC55697.2022.00031","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00031","url":null,"abstract":"Industry continues to be challenged when attempting to share data among organizations, especially when the data comes from different database management systems (DBMS) and different DBMS schemas. Another concern is that privacy laws may require some types of data to be protected under local access policies. We describe a secure data sharing solution using Next-generation Database Access Control (NDAC) and the Data Block Matrix (DBM). A clinical trial data use case is discussed, as well as a description of a proof-of-concept implementation of the DBM using Hyperledger Fabric. The solution described allows data access where the data resides, rather than exchanging or being centrally stored. Additionally, it solves the conflict between conventional blockchain use and privacy regulations, by using a form of distributed ledger technology that meets ‘right to erasure’ requirements.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134271191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ExClaim: Explainable Neural Claim Verification Using Rationalization ExClaim:使用合理化的可解释神经索赔验证
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00012
Sai Gurrapu, Lifu Huang, Feras A. Batarseh
With the advent of deep learning, text generation language models have improved dramatically, with text at a similar level as human-written text. This can lead to rampant misinformation because content can now be created cheaply and distributed quickly. Automated claim verification methods exist to validate claims, but they lack foundational data and often use mainstream news as evidence sources that are strongly biased towards a specific agenda. Current claim verification methods use deep neural network models and complex algorithms for a high classification accuracy but it is at the expense of model explainability. The models are black-boxes and their decision-making process and the steps it took to arrive at a final prediction are obfuscated from the user. We introduce a novel claim verification approach, namely: ExClaim, that attempts to provide an explainable claim verification system with foundational evidence. Inspired by the legal system, ExClaim leverages rationalization to provide a verdict for the claim and justifies the verdict through a natural language explanation (rationale) to describe the model’s decision-making process. ExClaim treats the verdict classification task as a question-answer problem and achieves a performance of 0.93 F1 score. It provides subtasks explanations to also justify the intermediate outcomes. Statistical and Explainable AI (XAI) evaluations are conducted to ensure valid and trustworthy outcomes. Ensuring claim verification systems are assured, rational, and explainable is an essential step toward improving Human-AI trust and the accessibility of black-box systems.
随着深度学习的出现,文本生成语言模型得到了极大的改进,文本与人类书写的文本处于相似的水平。这可能导致猖獗的错误信息,因为内容现在可以廉价地创建和快速分发。现有的自动索赔验证方法可以验证索赔,但它们缺乏基础数据,并且经常使用主流新闻作为证据来源,这些新闻强烈偏向于特定议程。目前的索赔验证方法使用深度神经网络模型和复杂的算法来获得较高的分类精度,但以牺牲模型的可解释性为代价。模型是黑盒,它们的决策过程和达到最终预测所采取的步骤对用户来说是模糊的。我们介绍了一种新的权利要求验证方法,即:ExClaim,它试图提供一个具有基础证据的可解释的权利要求验证系统。受法律制度的启发,ExClaim利用合理化为索赔提供判决,并通过自然语言解释(理由)来证明判决的正当性,以描述模型的决策过程。ExClaim将判决分类任务视为一个问答问题,实现了0.93 F1分的性能。它提供了子任务解释,也证明了中间结果。进行统计和可解释的人工智能(XAI)评估以确保有效和可信的结果。确保索赔验证系统是可靠的、合理的和可解释的,这是提高人类与人工智能信任和黑盒系统可访问性的重要一步。
{"title":"ExClaim: Explainable Neural Claim Verification Using Rationalization","authors":"Sai Gurrapu, Lifu Huang, Feras A. Batarseh","doi":"10.1109/STC55697.2022.00012","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00012","url":null,"abstract":"With the advent of deep learning, text generation language models have improved dramatically, with text at a similar level as human-written text. This can lead to rampant misinformation because content can now be created cheaply and distributed quickly. Automated claim verification methods exist to validate claims, but they lack foundational data and often use mainstream news as evidence sources that are strongly biased towards a specific agenda. Current claim verification methods use deep neural network models and complex algorithms for a high classification accuracy but it is at the expense of model explainability. The models are black-boxes and their decision-making process and the steps it took to arrive at a final prediction are obfuscated from the user. We introduce a novel claim verification approach, namely: ExClaim, that attempts to provide an explainable claim verification system with foundational evidence. Inspired by the legal system, ExClaim leverages rationalization to provide a verdict for the claim and justifies the verdict through a natural language explanation (rationale) to describe the model’s decision-making process. ExClaim treats the verdict classification task as a question-answer problem and achieves a performance of 0.93 F1 score. It provides subtasks explanations to also justify the intermediate outcomes. Statistical and Explainable AI (XAI) evaluations are conducted to ensure valid and trustworthy outcomes. Ensuring claim verification systems are assured, rational, and explainable is an essential step toward improving Human-AI trust and the accessibility of black-box systems.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133089647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AI Assurance for the Public – Trust but Verify, Continuously 公众的人工智能保证——信任,但要不断验证
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00032
P. Laplante, Rick Kuhn
Artificial intelligence (AI) systems are increasingly seen in many public facing applications such as self-driving land vehicles, autonomous aircraft, medical systems and financial systems. AI systems should equal or surpass human performance, but given the consequences of failure or erroneous or unfair decisions in these systems, how do we assure the public that these systems work as intended and will not cause harm? For example, that an autonomous vehicle does not crash or that intelligent credit scoring system is not biased, even after passing substantial acceptance testing prior to release. In this paper we discuss AI trust and assurance and related concepts, that is, assured autonomy, particularly for critical systems. Then we discuss how to establish trust through AI assurance activities throughout the system development lifecycle. Finally, we introduce a “trust but verify continuously” approach to AI assurance, which describes assured autonomy activities in a model based systems development context and includes postdelivery activities for continuous assurance.
人工智能(AI)系统越来越多地出现在许多面向公众的应用中,如自动驾驶陆地车辆、自动驾驶飞机、医疗系统和金融系统。人工智能系统应该赶上或超过人类的表现,但考虑到这些系统失败或错误或不公平决策的后果,我们如何向公众保证这些系统按预期工作,不会造成伤害?例如,即使在发布之前通过了大量的验收测试,自动驾驶汽车也不会发生碰撞,或者智能信用评分系统不会有偏见。在本文中,我们讨论了人工智能信任和保证以及相关的概念,即保证自治,特别是对于关键系统。然后我们讨论如何在整个系统开发生命周期中通过AI保证活动建立信任。最后,我们介绍了一种“信任但持续验证”的人工智能保证方法,它描述了基于模型的系统开发环境中有保证的自主性活动,并包括持续保证的交付后活动。
{"title":"AI Assurance for the Public – Trust but Verify, Continuously","authors":"P. Laplante, Rick Kuhn","doi":"10.1109/STC55697.2022.00032","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00032","url":null,"abstract":"Artificial intelligence (AI) systems are increasingly seen in many public facing applications such as self-driving land vehicles, autonomous aircraft, medical systems and financial systems. AI systems should equal or surpass human performance, but given the consequences of failure or erroneous or unfair decisions in these systems, how do we assure the public that these systems work as intended and will not cause harm? For example, that an autonomous vehicle does not crash or that intelligent credit scoring system is not biased, even after passing substantial acceptance testing prior to release. In this paper we discuss AI trust and assurance and related concepts, that is, assured autonomy, particularly for critical systems. Then we discuss how to establish trust through AI assurance activities throughout the system development lifecycle. Finally, we introduce a “trust but verify continuously” approach to AI assurance, which describes assured autonomy activities in a model based systems development context and includes postdelivery activities for continuous assurance.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115877711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modular and Expandable Testbed for Evaluating ML-based Bug Finders 基于ml的Bug查找器的模块化和可扩展测试平台
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00017
Philippe Dessauw, A. Delaitre, Hialo Muniz Carvalho, Vadim Okun
This extended abstract presents the implementation of a modular and expandable testbed for crafting, modifying, and testing ML-based bug finders.
这个扩展的抽象展示了一个模块化和可扩展的测试平台的实现,用于制作、修改和测试基于ml的bug查找器。
{"title":"A Modular and Expandable Testbed for Evaluating ML-based Bug Finders","authors":"Philippe Dessauw, A. Delaitre, Hialo Muniz Carvalho, Vadim Okun","doi":"10.1109/STC55697.2022.00017","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00017","url":null,"abstract":"This extended abstract presents the implementation of a modular and expandable testbed for crafting, modifying, and testing ML-based bug finders.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proxy Verification and Validation For Critical Autonomous and AI Systems 关键自治和人工智能系统的代理验证和验证
Pub Date : 2022-10-01 DOI: 10.1109/STC55697.2022.00014
P. Laplante, M. Kassab, J. Defranco
A challenging problem for software and systems engineers is to provide assurance of operations for a system that is critical but must operate in situations that cannot be easily created in the testing lab. For example, a space system cannot be fully tested in all operational modes until it is launched and nuclear power plants cannot be tested under real critical temperature overload conditions. This situation is particularly challenging when seeking to provide assurance in critical AI systems (CAIS) where the underlying algorithms may be very difficult to verify under any conditions. In these cases using systems that have a similar underlying application, operational profiles, user characteristics, and underlying AI algorithms may be suitable as testing proxies. For example, a robot vacuum may have significant operational and implementation similarities to act as a testing proxy for some aspects of an autonomous vehicle.In this work we discuss the challenges in assured autonomy for CAIS and suggest a way forward using proxy systems. We describe a methodology for characterizing CAIS and matching them to their non-critical proxy equivalent. Examples are given along with a discussion of the history of other kinds of proxy verification and validation
对于软件和系统工程师来说,一个具有挑战性的问题是为一个关键的系统提供操作保证,但它必须在不容易在测试实验室中创建的情况下运行。例如,空间系统在发射之前无法在所有操作模式下进行全面测试,核电站无法在真正的临界温度过载条件下进行测试。当寻求在关键人工智能系统(CAIS)中提供保证时,这种情况尤其具有挑战性,因为在任何条件下都很难验证底层算法。在这些情况下,使用具有类似底层应用程序、操作概要、用户特征和底层AI算法的系统可能适合作为测试代理。例如,机器人吸尘器可能具有重要的操作和实现相似性,可以作为自动驾驶汽车某些方面的测试代理。在这项工作中,我们讨论了CAIS在保证自治方面的挑战,并提出了使用代理系统的前进方向。我们描述了一种表征CAIS的方法,并将它们与它们的非关键代理等同物进行匹配。给出了示例,并讨论了其他类型的代理验证和确认的历史
{"title":"Proxy Verification and Validation For Critical Autonomous and AI Systems","authors":"P. Laplante, M. Kassab, J. Defranco","doi":"10.1109/STC55697.2022.00014","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00014","url":null,"abstract":"A challenging problem for software and systems engineers is to provide assurance of operations for a system that is critical but must operate in situations that cannot be easily created in the testing lab. For example, a space system cannot be fully tested in all operational modes until it is launched and nuclear power plants cannot be tested under real critical temperature overload conditions. This situation is particularly challenging when seeking to provide assurance in critical AI systems (CAIS) where the underlying algorithms may be very difficult to verify under any conditions. In these cases using systems that have a similar underlying application, operational profiles, user characteristics, and underlying AI algorithms may be suitable as testing proxies. For example, a robot vacuum may have significant operational and implementation similarities to act as a testing proxy for some aspects of an autonomous vehicle.In this work we discuss the challenges in assured autonomy for CAIS and suggest a way forward using proxy systems. We describe a methodology for characterizing CAIS and matching them to their non-critical proxy equivalent. Examples are given along with a discussion of the history of other kinds of proxy verification and validation","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123365773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Layered Reference Model for Penetration Testing with Reinforcement Learning and Attack Graphs 基于强化学习和攻击图的渗透测试分层参考模型
Pub Date : 2022-06-14 DOI: 10.1109/STC55697.2022.00015
Tyler Cody
This paper considers key challenges to using re-inforcement learning (RL) with attack graphs to automate penetration testing in real-world applications from a systems perspective. RL approaches to automated penetration testing are actively being developed, but there is no consensus view on the representation of computer networks with which RL should be interacting. Moreover, there are significant open challenges to how those representations can be grounded to the real networks where RL solution methods are applied. This paper elaborates on representation and grounding using topic challenges of interacting with real networks in real-time, emulating realistic adversary behavior, and handling unstable, evolving networks. These challenges are both practical and mathematical, and they directly concern the reliability and dependability of penetration testing systems. This paper proposes a layered reference model to help organize related research and engineering efforts. The presented layered reference model contrasts traditional models of attack graph workflows because it is not scoped to a sequential, feed-forward generation and analysis process, but to broader aspects of lifecycle and continuous deployment. Researchers and practitioners can use the presented layered reference model as a first-principles outline to help orient the systems engineering of their penetration testing systems.
本文从系统的角度考虑了在实际应用中使用带有攻击图的强化学习(RL)来自动化渗透测试的主要挑战。自动化渗透测试的RL方法正在积极开发中,但是对于RL应该与之交互的计算机网络的表示没有一致的观点。此外,对于如何将这些表示与应用RL解决方案方法的真实网络相结合,存在重大的开放挑战。本文通过与真实网络实时交互、模拟真实对手行为以及处理不稳定、不断发展的网络等主题挑战,详细阐述了表征和基础。这些挑战既有实际意义又有数学意义,它们直接关系到渗透测试系统的可靠性和可靠性。本文提出了一个分层参考模型,以帮助组织相关的研究和工程工作。所提出的分层参考模型与传统的攻击图工作流模型形成了对比,因为它的范围不限于顺序的、前馈的生成和分析过程,而是生命周期和持续部署的更广泛的方面。研究人员和实践者可以使用所提出的分层参考模型作为第一原则大纲,以帮助定位他们的渗透测试系统的系统工程。
{"title":"A Layered Reference Model for Penetration Testing with Reinforcement Learning and Attack Graphs","authors":"Tyler Cody","doi":"10.1109/STC55697.2022.00015","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00015","url":null,"abstract":"This paper considers key challenges to using re-inforcement learning (RL) with attack graphs to automate penetration testing in real-world applications from a systems perspective. RL approaches to automated penetration testing are actively being developed, but there is no consensus view on the representation of computer networks with which RL should be interacting. Moreover, there are significant open challenges to how those representations can be grounded to the real networks where RL solution methods are applied. This paper elaborates on representation and grounding using topic challenges of interacting with real networks in real-time, emulating realistic adversary behavior, and handling unstable, evolving networks. These challenges are both practical and mathematical, and they directly concern the reliability and dependability of penetration testing systems. This paper proposes a layered reference model to help organize related research and engineering efforts. The presented layered reference model contrasts traditional models of attack graph workflows because it is not scoped to a sequential, feed-forward generation and analysis process, but to broader aspects of lifecycle and continuous deployment. Researchers and practitioners can use the presented layered reference model as a first-principles outline to help orient the systems engineering of their penetration testing systems.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115644886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fault Localization in Cloud using Centrality Measures 基于中心性度量的云故障定位
Pub Date : 2021-09-23 DOI: 10.1109/STC55697.2022.00033
R. NarayanaaS, M. Sivaranjan, S. LekshmiR
Fault localization is an imperative method in fault tolerance in a distributed environment that designs a blueprint for continuing the ongoing process even when one or many modules are non-functional. Visualizing a distributed environment as a graph, whose nodes represent faults (fault graph), allows us to introduce probabilistic weights to both edges and nodes that cause the faults. With multiple modules like databases, run-time cloud, etc. making up a distributed environment and extensively, a cloud environment, we aim to address the problem of optimally and accurately performing fault localization in a distributed environment by modifying the Graph optimization approach to localization and centrality, specific to fault graphs.
故障定位是分布式环境容错中的一种必要方法,分布式环境可以设计蓝图,以便在一个或多个模块失效时继续执行正在进行的流程。将分布式环境可视化为一个图,其节点表示故障(故障图),允许我们向导致故障的边和节点引入概率权重。数据库、运行时云等多个模块组成了一个分布式环境和一个广泛的云环境,我们的目标是通过修改图优化方法来定位和中心性,具体到故障图,解决在分布式环境中最优、准确地执行故障定位的问题。
{"title":"Fault Localization in Cloud using Centrality Measures","authors":"R. NarayanaaS, M. Sivaranjan, S. LekshmiR","doi":"10.1109/STC55697.2022.00033","DOIUrl":"https://doi.org/10.1109/STC55697.2022.00033","url":null,"abstract":"Fault localization is an imperative method in fault tolerance in a distributed environment that designs a blueprint for continuing the ongoing process even when one or many modules are non-functional. Visualizing a distributed environment as a graph, whose nodes represent faults (fault graph), allows us to introduce probabilistic weights to both edges and nodes that cause the faults. With multiple modules like databases, run-time cloud, etc. making up a distributed environment and extensively, a cloud environment, we aim to address the problem of optimally and accurately performing fault localization in a distributed environment by modifying the Graph optimization approach to localization and centrality, specific to fault graphs.","PeriodicalId":170123,"journal":{"name":"2022 IEEE 29th Annual Software Technology Conference (STC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125016158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 29th Annual Software Technology Conference (STC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1