首页 > 最新文献

2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
Classification Analysis of Bearing Contrived Dataset under Different Levels of Contamination 不同污染程度下轴承人工数据集的分类分析
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00097
Shamanth Manjunath, Ethan Wescoat, Vinita Jansari, Matthew Krugh, L. Mears
Bearings are a common failure component found in roto-dynamic equipment. As a bearing fails, tell-tale signs in collected data indicate progressing damage, depending on the operating conditions and bearing failure mode. This paper classifies bearing damage under different damage levels and operating conditions for contamination failure and focuses on differentiating the collected signals between different contamination levels against the baseline data. A contaminate was measured and mixed into the bearing grease before applying it to the rolling elements. An increasing amount of contamination was mixed into the bearing grease to simulate progressing damage and failure mode. Five classifiers are used to diagnose the condition: Random Forest, Multilayer Perceptron, K-Nearest Neighbor, Decision Tree, and Naive Bayes. The algorithms are compared using four different metrics: weighted average, Precision, Recall, and F-Measure. The algorithms are trained to diagnose failures over multiple operating conditions to circumvent possible operation changes in the real world. The algorithms were trained on the training dataset, and the model was deployed on unseen test data to evaluate the performance of the classifiers. Random forest classifier provided the best classification results with an overall accuracy of 96 % for the test data.
轴承是旋转动力设备中常见的故障部件。当轴承失效时,根据运行条件和轴承失效模式,收集数据中的指示标志表明正在进行的损坏。本文对不同损伤程度和污染失效工况下的轴承损伤进行了分类,重点研究了不同污染程度下采集到的信号与基线数据的区别。在将其应用于滚动元件之前,测量了污染物并将其混合到轴承润滑脂中。在轴承润滑脂中掺入越来越多的污染物,以模拟不断发展的损伤和破坏模式。五种分类器用于诊断疾病:随机森林、多层感知器、k近邻、决策树和朴素贝叶斯。算法使用四个不同的指标进行比较:加权平均值,精度,召回率和F-Measure。这些算法经过训练,可以在多种操作条件下诊断故障,以规避现实世界中可能发生的操作变化。算法在训练数据集上进行训练,模型在未见过的测试数据上部署,以评估分类器的性能。随机森林分类器为测试数据提供了最好的分类结果,总体准确率为96%。
{"title":"Classification Analysis of Bearing Contrived Dataset under Different Levels of Contamination","authors":"Shamanth Manjunath, Ethan Wescoat, Vinita Jansari, Matthew Krugh, L. Mears","doi":"10.1109/ISSREW55968.2022.00097","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00097","url":null,"abstract":"Bearings are a common failure component found in roto-dynamic equipment. As a bearing fails, tell-tale signs in collected data indicate progressing damage, depending on the operating conditions and bearing failure mode. This paper classifies bearing damage under different damage levels and operating conditions for contamination failure and focuses on differentiating the collected signals between different contamination levels against the baseline data. A contaminate was measured and mixed into the bearing grease before applying it to the rolling elements. An increasing amount of contamination was mixed into the bearing grease to simulate progressing damage and failure mode. Five classifiers are used to diagnose the condition: Random Forest, Multilayer Perceptron, K-Nearest Neighbor, Decision Tree, and Naive Bayes. The algorithms are compared using four different metrics: weighted average, Precision, Recall, and F-Measure. The algorithms are trained to diagnose failures over multiple operating conditions to circumvent possible operation changes in the real world. The algorithms were trained on the training dataset, and the model was deployed on unseen test data to evaluate the performance of the classifiers. Random forest classifier provided the best classification results with an overall accuracy of 96 % for the test data.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"63 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ISSRE 2022 Doctorial Symposium Committee: ISSREW 2022 ISSRE 2022博士研讨会委员会:ISSREW 2022
Pub Date : 2022-10-01 DOI: 10.1109/issrew55968.2022.00009
{"title":"ISSRE 2022 Doctorial Symposium Committee: ISSREW 2022","authors":"","doi":"10.1109/issrew55968.2022.00009","DOIUrl":"https://doi.org/10.1109/issrew55968.2022.00009","url":null,"abstract":"","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126136764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Homomorphic multi-label classification of virus strains 病毒株的同态多标记分类
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00082
Junwei Zhou, Botian Lei, Huile Lang
Detecting the gene sequence of virus strains from patients and classifying them into specific strains are very important to provide effective treatment. However, there are significant barriers to sharing the virus strains' gene data in plaintext to the privacy concerns of the patients. Homomorphic encryption is a form of encryption that allows users to calculate encrypted data without decrypting it. Achieving highly accurate viral strain prediction while safeguarding user privacy is a challenge. We develop a secure multi-label virus strains classification method using the homomorphic encryption scheme. We first used the method of statistical genotype frequencies for preprocessing to reduce the gene dimension of viral strains. Second, we improved the TFHE library proposed by Chillotti et al. to accommodate the floating-point input of the neural network to make the homomorphic calculation result more accurate. Finally, we improve computational speed and reduce storage usage by a data packing method that packs multiple feature information into one ciphertext. We successfully calculated 2000 virus strains classification inference steps on 128-bit encrypted test data in 0.09 seconds, reaching an accuracy of 100 %.
检测患者体内病毒株的基因序列并对其进行分类,对提供有效的治疗具有重要意义。然而,由于考虑到患者的隐私问题,以明文形式共享病毒株的基因数据存在很大障碍。同态加密是一种允许用户在不解密的情况下计算加密数据的加密形式。在保护用户隐私的同时实现高度准确的病毒株预测是一项挑战。利用同态加密方案,提出了一种安全的多标签病毒株分类方法。我们首先采用统计基因型频率的方法进行预处理,降低病毒株的基因维数。其次,我们改进了Chillotti等人提出的TFHE库,以适应神经网络的浮点输入,使同态计算结果更加准确。最后,我们通过将多个特征信息打包成一个密文的数据打包方法提高了计算速度并减少了存储空间的使用。我们在0.09秒内对128位加密的测试数据成功计算出2000个病毒株分类推断步骤,准确率达到100%。
{"title":"Homomorphic multi-label classification of virus strains","authors":"Junwei Zhou, Botian Lei, Huile Lang","doi":"10.1109/ISSREW55968.2022.00082","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00082","url":null,"abstract":"Detecting the gene sequence of virus strains from patients and classifying them into specific strains are very important to provide effective treatment. However, there are significant barriers to sharing the virus strains' gene data in plaintext to the privacy concerns of the patients. Homomorphic encryption is a form of encryption that allows users to calculate encrypted data without decrypting it. Achieving highly accurate viral strain prediction while safeguarding user privacy is a challenge. We develop a secure multi-label virus strains classification method using the homomorphic encryption scheme. We first used the method of statistical genotype frequencies for preprocessing to reduce the gene dimension of viral strains. Second, we improved the TFHE library proposed by Chillotti et al. to accommodate the floating-point input of the neural network to make the homomorphic calculation result more accurate. Finally, we improve computational speed and reduce storage usage by a data packing method that packs multiple feature information into one ciphertext. We successfully calculated 2000 virus strains classification inference steps on 128-bit encrypted test data in 0.09 seconds, reaching an accuracy of 100 %.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software Systems 用PyMevol描述Python方法演变:实现可靠软件系统的重要一步
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00044
Haowei Quan, Jiawei Wang, Bo Li, Xiaoning Du, Kui Liu, Li Li
Understanding the evolution of library methods is essential for maintaining high-quality and reliable software systems as those libraries often evolve rapidly in order to meet new requirements such as adding new features, improving performance, or fixing vulnerabilities. Failing to incorporate this evolution may result in compatibility issues that may manifest themselves as runtime crashes, leading to a poor user experience. This is not uncommon for the most popular programming language, Python, for which our community has developed over 380,000 libraries. To help developers better understand their used libraries, we propose to the community a prototype tool called PyMevol to model Python libraries' APIs and their evolution. Specifically, given a Python library, PyMevol statically examines its code to extract APIs (including aliases introduced by Python's import-flow mechanism) from all its released versions to build a history-sensitive alias-aware API explorer tree, a tree structure that allows users to explore the biography of each API so as to quickly locate where and when a given API is introduced, changed, or removed. Our experimental results over five popular real-world Python libraries show that our approach is reliable in achieving its purpose (i.e., over 90 % of accuracy) and helpful in supporting further API-relevant analyses.
理解库方法的发展对于维护高质量和可靠的软件系统是必不可少的,因为这些库经常快速发展,以满足新的需求,例如添加新特性、改进性能或修复漏洞。如果不能整合这种演变,可能会导致兼容性问题,从而导致运行时崩溃,从而导致糟糕的用户体验。这对于最流行的编程语言Python来说并不罕见,我们的社区已经为它开发了超过38万个库。为了帮助开发人员更好地理解他们使用的库,我们向社区提出了一个名为PyMevol的原型工具,用于建模Python库的api及其演变。具体来说,给定一个Python库,PyMevol会静态检查其代码以从所有发布版本中提取API(包括Python的导入流机制引入的别名),以构建一个对历史敏感的感知别名的API资源管理器树,该树结构允许用户浏览每个API的简介,以便快速定位给定API的引入、更改或删除的时间和地点。我们在五个流行的实际Python库上的实验结果表明,我们的方法在实现其目的方面是可靠的(即,超过90%的准确性),并且有助于支持进一步的api相关分析。
{"title":"Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software Systems","authors":"Haowei Quan, Jiawei Wang, Bo Li, Xiaoning Du, Kui Liu, Li Li","doi":"10.1109/ISSREW55968.2022.00044","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00044","url":null,"abstract":"Understanding the evolution of library methods is essential for maintaining high-quality and reliable software systems as those libraries often evolve rapidly in order to meet new requirements such as adding new features, improving performance, or fixing vulnerabilities. Failing to incorporate this evolution may result in compatibility issues that may manifest themselves as runtime crashes, leading to a poor user experience. This is not uncommon for the most popular programming language, Python, for which our community has developed over 380,000 libraries. To help developers better understand their used libraries, we propose to the community a prototype tool called PyMevol to model Python libraries' APIs and their evolution. Specifically, given a Python library, PyMevol statically examines its code to extract APIs (including aliases introduced by Python's import-flow mechanism) from all its released versions to build a history-sensitive alias-aware API explorer tree, a tree structure that allows users to explore the biography of each API so as to quickly locate where and when a given API is introduced, changed, or removed. Our experimental results over five popular real-world Python libraries show that our approach is reliable in achieving its purpose (i.e., over 90 % of accuracy) and helpful in supporting further API-relevant analyses.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130815943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Continuous Verification of Open Source Components in a World of Weak Links 薄弱环节世界中开源组件的持续验证
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00068
T. Hastings, Kristen R. Walcott
We are heading for a perfect storm, making open source software poisoning and next-generation supply chain attacks much easier to execute, which could have major im-plications for organizations. The widespread adoption of open source (99% of today's software utilizes open source), the ease of today's package managers, and the best practice of implementing continuous delivery for software projects provide an unprece-dented opportunity for attack. Once an adversary compromises a project, they can deploy malicious code into production under the auspicious of a software patch. Downstream projects will ingest the compromised patch, and now those projects are potentially running the malicious code. The impact could be implementing backdoors, gathering intelligence, delivering malware, or denying a service. According to Sonatype, a leading commercial software security company, these next-generation supply chain attacks have increased 430 % in the last year and there is not a good way to vet or monitor an open-source project prior to incorporating the project. In this paper, we analyzed two case studies of compromised open source components. We propose six continuous verification controls that enable organizations to make data-driven decisions and mitigate breaches, such as analyzing community metrics and project hygiene using scorecards and monitoring the boundary of the software in production. In one case study, the controls identified high levels of risk immediately even though the package is widely used and has over 7 million downloads a week. In both case studies we found that the controls could have prevented malicious actions despite the project breaches.
我们正在走向一场完美的风暴,使开源软件中毒和下一代供应链攻击更容易执行,这可能对组织产生重大影响。开放源码的广泛采用(今天99%的软件都利用开放源码),今天的包管理器的易用性,以及为软件项目实现持续交付的最佳实践为攻击提供了前所未有的机会。一旦攻击者破坏了项目,他们就可以在软件补丁的掩护下将恶意代码部署到生产环境中。下游项目将摄取受损的补丁,现在这些项目可能正在运行恶意代码。其影响可能是实施后门、收集情报、传递恶意软件或拒绝服务。根据Sonatype(一家领先的商业软件安全公司)的说法,这些下一代供应链攻击在去年增加了430%,并且在合并项目之前没有一个好的方法来审查或监控一个开源项目。在本文中,我们分析了两个受损的开源组件的案例研究。我们提出了六种连续的验证控制,使组织能够做出数据驱动的决策并减轻破坏,例如使用记分卡分析社区度量标准和项目卫生,并监视生产中的软件边界。在一个案例研究中,尽管该软件包被广泛使用,每周下载量超过700万次,但控制人员还是立即识别出了高风险。在这两个案例研究中,我们发现控制可以阻止恶意行为,尽管项目破坏。
{"title":"Continuous Verification of Open Source Components in a World of Weak Links","authors":"T. Hastings, Kristen R. Walcott","doi":"10.1109/ISSREW55968.2022.00068","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00068","url":null,"abstract":"We are heading for a perfect storm, making open source software poisoning and next-generation supply chain attacks much easier to execute, which could have major im-plications for organizations. The widespread adoption of open source (99% of today's software utilizes open source), the ease of today's package managers, and the best practice of implementing continuous delivery for software projects provide an unprece-dented opportunity for attack. Once an adversary compromises a project, they can deploy malicious code into production under the auspicious of a software patch. Downstream projects will ingest the compromised patch, and now those projects are potentially running the malicious code. The impact could be implementing backdoors, gathering intelligence, delivering malware, or denying a service. According to Sonatype, a leading commercial software security company, these next-generation supply chain attacks have increased 430 % in the last year and there is not a good way to vet or monitor an open-source project prior to incorporating the project. In this paper, we analyzed two case studies of compromised open source components. We propose six continuous verification controls that enable organizations to make data-driven decisions and mitigate breaches, such as analyzing community metrics and project hygiene using scorecards and monitoring the boundary of the software in production. In one case study, the controls identified high levels of risk immediately even though the package is widely used and has over 7 million downloads a week. In both case studies we found that the controls could have prevented malicious actions despite the project breaches.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sequential Performance Analysis of Systems that Age and Rejuvenate 老化和再生系统的顺序性能分析
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00061
Leonardo Miranda, Cabral Lima, D. Menasché, Guilherme de Melo Baptista Domingues
Sequential performance analysis aims at evaluating performance indicators in an online fashion. The process stops in accordance with a pre-defined stopping rule, as soon as an anomaly that should produce an alarm is observed. Traditional sequential performance analysis techniques include CUSUM and sequential probability ratio test (SPRT). More recent techniques include the bucket algorithm, wherein tokens are accumulated into buckets when the system degrades, and removed when the system naturally recovers. If the number of tokens in the system reaches a threshold, an alarm is triggered. In this paper, we analyze sequential performance analysis algorithms applied to a system that is subject to rejuvenation. Among our results, we indicate how rejuvenation impacts the time until false alarms, and how to set the optimal rejuvenation rate accounting for the fact that systems can recover from transient performance degradation either naturally, as in standard sequential performance analysis models, or due to rejuvenation.
顺序性能分析的目的是在线评估性能指标。只要观察到应该产生警报的异常,进程就会按照预定义的停止规则停止。传统的序列性能分析技术包括CUSUM和序列概率比检验(SPRT)。最近的技术包括桶算法,其中令牌在系统降级时累积到桶中,并在系统自然恢复时删除。当系统令牌数量达到阈值时,会触发告警。在本文中,我们分析了顺序性能分析算法应用于一个系统,是受到振兴。在我们的研究结果中,我们指出了恢复如何影响假警报之前的时间,以及如何设置最佳的恢复率,因为系统可以从短暂的性能下降中自然恢复,如在标准顺序性能分析模型中,或者由于恢复。
{"title":"Sequential Performance Analysis of Systems that Age and Rejuvenate","authors":"Leonardo Miranda, Cabral Lima, D. Menasché, Guilherme de Melo Baptista Domingues","doi":"10.1109/ISSREW55968.2022.00061","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00061","url":null,"abstract":"Sequential performance analysis aims at evaluating performance indicators in an online fashion. The process stops in accordance with a pre-defined stopping rule, as soon as an anomaly that should produce an alarm is observed. Traditional sequential performance analysis techniques include CUSUM and sequential probability ratio test (SPRT). More recent techniques include the bucket algorithm, wherein tokens are accumulated into buckets when the system degrades, and removed when the system naturally recovers. If the number of tokens in the system reaches a threshold, an alarm is triggered. In this paper, we analyze sequential performance analysis algorithms applied to a system that is subject to rejuvenation. Among our results, we indicate how rejuvenation impacts the time until false alarms, and how to set the optimal rejuvenation rate accounting for the fact that systems can recover from transient performance degradation either naturally, as in standard sequential performance analysis models, or due to rejuvenation.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Disjoint-Partitioning Approach to Enhancing Metamorphic Testing of DBMS 一种增强DBMS的变形测试的分离划分方法
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00056
M. Tang, T. H. Tse, Z. Zhou
Owing to big data, DBMS testing faces the oracle problem, that is, it is difficult to verify execution results against expected outcomes. Rigger and Su applied metamorphic testing to alleviate the challenge. We propose a disjoint-partitioning approach to extend their work. We have conducted an empirical case study on OceanBase, the DBMS associated with the world's fastest online transaction processing system. Even though Ocean- Base has been extensively tested and widely used in the industry, we have unveiled various hidden failures and crashes.
由于大数据的存在,DBMS测试面临着oracle问题,即很难根据预期结果来验证执行结果。Rigger和Su采用变质试验来缓解挑战。我们提出了一种分离分割的方法来扩展他们的工作。我们对与世界上最快的在线事务处理系统相关的数据库管理系统OceanBase进行了实证案例研究。尽管Ocean- Base已经经过了广泛的测试并在行业中广泛使用,但我们也发现了各种隐藏的故障和崩溃。
{"title":"A Disjoint-Partitioning Approach to Enhancing Metamorphic Testing of DBMS","authors":"M. Tang, T. H. Tse, Z. Zhou","doi":"10.1109/ISSREW55968.2022.00056","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00056","url":null,"abstract":"Owing to big data, DBMS testing faces the oracle problem, that is, it is difficult to verify execution results against expected outcomes. Rigger and Su applied metamorphic testing to alleviate the challenge. We propose a disjoint-partitioning approach to extend their work. We have conducted an empirical case study on OceanBase, the DBMS associated with the world's fastest online transaction processing system. Even though Ocean- Base has been extensively tested and widely used in the industry, we have unveiled various hidden failures and crashes.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130876010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast Analysis of Evolving Software Systems 演化软件系统的快速分析
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00038
Anushri Jana, Bharti Chimdyalwar, Susheel Kumar, R. Venkatesh
In this paper, we present an algorithm that efficiently updates results of dataflow analysis in response to incremental changes. Our incremental algorithm work in two phases: it compute summaries for selected procedures in phase 1 by traversing the call graph in bottom-up order and, in phase 2, it updates the dataflow values for selected procedures by traversing call graph in top-down order, thus making the analysis faster. The selection of procedures is done by comparing summaries across the version. We have implemented this algorithm in our proprietary static analysis tool, used by many clientele over the years, for automated defect detection. An evaluation of our algorithm on a core banking application shows that on an average it takes 90 % lesser time in comparison to an exhaustive analysis, demonstrating practical benefit of our algorithm on a real-world evolving software system.
在本文中,我们提出了一种算法,可以有效地更新数据流分析结果,以响应增量变化。我们的增量算法分两个阶段工作:在阶段1中,它通过以自下而上的顺序遍历调用图来计算所选过程的摘要;在阶段2中,它通过以自上而下的顺序遍历调用图来更新所选过程的数据流值,从而使分析更快。程序的选择是通过比较不同版本的摘要来完成的。我们已经在我们专有的静态分析工具中实现了这个算法,多年来被许多客户用于自动缺陷检测。对我们的算法在核心银行应用程序上的评估表明,与详尽的分析相比,它平均花费的时间减少了90%,这证明了我们的算法在现实世界不断发展的软件系统上的实际优势。
{"title":"Fast Analysis of Evolving Software Systems","authors":"Anushri Jana, Bharti Chimdyalwar, Susheel Kumar, R. Venkatesh","doi":"10.1109/ISSREW55968.2022.00038","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00038","url":null,"abstract":"In this paper, we present an algorithm that efficiently updates results of dataflow analysis in response to incremental changes. Our incremental algorithm work in two phases: it compute summaries for selected procedures in phase 1 by traversing the call graph in bottom-up order and, in phase 2, it updates the dataflow values for selected procedures by traversing call graph in top-down order, thus making the analysis faster. The selection of procedures is done by comparing summaries across the version. We have implemented this algorithm in our proprietary static analysis tool, used by many clientele over the years, for automated defect detection. An evaluation of our algorithm on a core banking application shows that on an average it takes 90 % lesser time in comparison to an exhaustive analysis, demonstrating practical benefit of our algorithm on a real-world evolving software system.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Colour Space Defence: Simple, Intuitive, but Effective 色彩空间防御:简单,直观,但有效
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00086
Pei Yang, Jing Wang, Huandong Wang
Deep neural networks (DNNs) are widely applied in autonomous intelligent systems. However, DNNs are vulnerable to adversarial attacks from exclusively crafted input images, leading to performance degradation such as wrong classifications. A wrong classification made by an AIS could result in severe and possibly lethal consequences. While several existing works proposed applying classic computer vision techniques to adversarial defense, these methods generally deteriorate the input information to a considerable extent. To re-store model performances while minimising such deterioration, we propose a novel method for adversarial defence named Colour Space Defence. We first demonstrated the weak transferability of adversarial information across different colour spaces. We then proposed to defend against adversarial examples by ensembling models trained in multiple colour spaces. Experiments have verified the validity of Colour Space Defence in maintaining performances on clean images. In most cases of defence, this method outperformed several of its comparators.
深度神经网络在自主智能系统中有着广泛的应用。然而,dnn很容易受到来自专门制作的输入图像的对抗性攻击,导致性能下降,例如错误分类。AIS的错误分类可能会导致严重甚至致命的后果。虽然已有的一些研究提出将经典的计算机视觉技术应用于对抗性防御,但这些方法通常会在相当程度上破坏输入信息。为了在最大限度地减少这种退化的同时恢复模型的性能,我们提出了一种新的对抗性防御方法,称为颜色空间防御。我们首先证明了敌对信息在不同色彩空间中的弱可转移性。然后,我们提出通过在多个色彩空间中训练的集成模型来防御对抗性示例。实验验证了彩色空间防御在保持干净图像性能方面的有效性。在大多数辩护案件中,这种方法的表现优于若干比较方法。
{"title":"Colour Space Defence: Simple, Intuitive, but Effective","authors":"Pei Yang, Jing Wang, Huandong Wang","doi":"10.1109/ISSREW55968.2022.00086","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00086","url":null,"abstract":"Deep neural networks (DNNs) are widely applied in autonomous intelligent systems. However, DNNs are vulnerable to adversarial attacks from exclusively crafted input images, leading to performance degradation such as wrong classifications. A wrong classification made by an AIS could result in severe and possibly lethal consequences. While several existing works proposed applying classic computer vision techniques to adversarial defense, these methods generally deteriorate the input information to a considerable extent. To re-store model performances while minimising such deterioration, we propose a novel method for adversarial defence named Colour Space Defence. We first demonstrated the weak transferability of adversarial information across different colour spaces. We then proposed to defend against adversarial examples by ensembling models trained in multiple colour spaces. Experiments have verified the validity of Colour Space Defence in maintaining performances on clean images. In most cases of defence, this method outperformed several of its comparators.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124193163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies 一种通过移除硬件依赖来自动重新托管嵌入式固件的方法
Pub Date : 2022-10-01 DOI: 10.1109/ISSREW55968.2022.00033
A. Ketterer, Asha Shekar, E. Yi, S. Bagchi, Abraham A. Clements
Firmware emulation is useful for finding vulnerabil-ities, performing debugging, and testing functionalities. However, the process of enabling firmware to execute in an emulator (i.e., re-hosting) is difficult. Each piece of the firmware may depend on hardware peripherals outside the microcontroller that are inaccessible during emulation. Current practices involve painstakingly disentangling these dependencies or replacing them with developed models that emulate functions interacting with hardware. Unfortunately, both are highly manual and error-prone. In this paper, we introduce a systematic graph-based approach to analyze firmware binaries and determine which functions need to be replaced. Our approach is customizable to balance the fidelity of the emulation and the amount of effort it would take to achieve the emulation by modeling functions. We run our algorithm across a number of firmware binaries and show its ability to capture and remove a large majority of hardware dependencies.
固件仿真对于发现漏洞、执行调试和测试功能非常有用。然而,使固件在模拟器中执行的过程(即重新托管)是困难的。固件的每个部分都可能依赖于在仿真期间无法访问的微控制器外部的硬件外设。当前的实践包括费力地解开这些依赖关系,或者用模拟与硬件交互的功能的开发模型代替它们。不幸的是,这两种方法都是高度手工化且容易出错的。在本文中,我们介绍了一种系统的基于图形的方法来分析固件二进制文件并确定需要替换哪些功能。我们的方法是可定制的,以平衡仿真的保真度和通过建模功能实现仿真所需的工作量。我们在许多固件二进制文件上运行我们的算法,并展示了它捕获和删除大部分硬件依赖的能力。
{"title":"An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies","authors":"A. Ketterer, Asha Shekar, E. Yi, S. Bagchi, Abraham A. Clements","doi":"10.1109/ISSREW55968.2022.00033","DOIUrl":"https://doi.org/10.1109/ISSREW55968.2022.00033","url":null,"abstract":"Firmware emulation is useful for finding vulnerabil-ities, performing debugging, and testing functionalities. However, the process of enabling firmware to execute in an emulator (i.e., re-hosting) is difficult. Each piece of the firmware may depend on hardware peripherals outside the microcontroller that are inaccessible during emulation. Current practices involve painstakingly disentangling these dependencies or replacing them with developed models that emulate functions interacting with hardware. Unfortunately, both are highly manual and error-prone. In this paper, we introduce a systematic graph-based approach to analyze firmware binaries and determine which functions need to be replaced. Our approach is customizable to balance the fidelity of the emulation and the amount of effort it would take to achieve the emulation by modeling functions. We run our algorithm across a number of firmware binaries and show its ability to capture and remove a large majority of hardware dependencies.","PeriodicalId":178302,"journal":{"name":"2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1