首页 > 最新文献

2016 4th International Conference on Enterprise Systems (ES)最新文献

英文 中文
An Android System Vulnerability Risk Evaluation Method for Heap Overflow 基于堆溢出的Android系统漏洞风险评估方法
Pub Date : 2016-11-01 DOI: 10.1109/ES.2016.18
Dali Zhu, Ying Li, N. Pang, Weimiao Feng
Android smart device has become a preferred target for attackers as it carries plenty of private and sensitive information. However, heap overflow vulnerability in Android system gives the opportunity to execute arbitrary malicious code and even steal personal privacy. The existence of such vulnerability makes Android system too weak to defense attacks and protect privacy. It's necessary to evaluate the security risk brought to the system. However, current vulnerability risk evaluation methods mainly focus on predicting the likelihood of exploiting, which is not enough and convictive for system security researcher. In this paper, we propose an Android system vulnerability risk evaluation method for heap overflow. We detect whether the heap overflow vulnerability is existent in current Android system, and then validate the exploitability by crafted input data. The evaluation result is classified into three kinds: inexistent, existent but not exploitable, existent and exploitable. Experiment results prove the effectiveness and indicate a good performance of the method.
安卓智能设备因携带大量隐私和敏感信息而成为攻击者的首选目标。然而,Android系统中的堆溢出漏洞给了执行任意恶意代码甚至窃取个人隐私的机会。这种漏洞的存在使得Android系统在防御攻击和保护隐私方面过于薄弱。有必要对系统带来的安全风险进行评估。然而,目前的漏洞风险评估方法主要集中在预测被利用的可能性上,这对于系统安全研究人员来说是不够的。本文提出了一种针对堆溢出的Android系统漏洞风险评估方法。我们检测当前Android系统是否存在堆溢出漏洞,然后通过精心制作的输入数据验证漏洞的可利用性。评价结果分为不存在、存在但不可开发、存在且可开发三种。实验结果证明了该方法的有效性和良好的性能。
{"title":"An Android System Vulnerability Risk Evaluation Method for Heap Overflow","authors":"Dali Zhu, Ying Li, N. Pang, Weimiao Feng","doi":"10.1109/ES.2016.18","DOIUrl":"https://doi.org/10.1109/ES.2016.18","url":null,"abstract":"Android smart device has become a preferred target for attackers as it carries plenty of private and sensitive information. However, heap overflow vulnerability in Android system gives the opportunity to execute arbitrary malicious code and even steal personal privacy. The existence of such vulnerability makes Android system too weak to defense attacks and protect privacy. It's necessary to evaluate the security risk brought to the system. However, current vulnerability risk evaluation methods mainly focus on predicting the likelihood of exploiting, which is not enough and convictive for system security researcher. In this paper, we propose an Android system vulnerability risk evaluation method for heap overflow. We detect whether the heap overflow vulnerability is existent in current Android system, and then validate the exploitability by crafted input data. The evaluation result is classified into three kinds: inexistent, existent but not exploitable, existent and exploitable. Experiment results prove the effectiveness and indicate a good performance of the method.","PeriodicalId":184435,"journal":{"name":"2016 4th International Conference on Enterprise Systems (ES)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128242196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An SDKEY Data Protection and Sharing Scheme with Attribute-Based Encryption for Smartphone 基于属性加密的智能手机SDKEY数据保护与共享方案
Pub Date : 2016-11-01 DOI: 10.1109/ES.2016.20
Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao
Android system attracts many malicious applications to steal sensitive data. Not only in storing data, it is also easy to get data leaked while sharing. SDKEY device is an external compute system with Independent arithmetic processor. In this paper. First, we present and implement a method to store and share data safely with cipher policy attribute-based encryption between Android phones, and it is useful in Instant messaging and file managing. Second, we design a security file structure to manage data efficiently. Third, we design a kind of dual-authentication login scheme using both SDKEY and PIN for booting Android OS. Finally, a solution on transparent encryption storage for sensitive message like SMS is proposed. Besides, we also develop a prototype system based on all above solutions in this paper, the performance and security of system are proved and verified from several aspects.
Android系统吸引了许多恶意应用程序窃取敏感数据。不仅在存储数据方面,在共享过程中也很容易泄露数据。SDKEY设备是一个具有独立算术处理器的外部计算系统。在本文中。首先,我们提出并实现了一种在Android手机之间使用基于密码策略属性的加密技术安全地存储和共享数据的方法,该方法在即时通讯和文件管理中非常有用。其次,我们设计了一个安全的文件结构来有效地管理数据。第三,我们设计了一种使用SDKEY和PIN双认证登录方案来启动Android操作系统。最后,提出了一种针对短信等敏感信息的透明加密存储方案。此外,本文还基于上述方案开发了一个原型系统,从多个方面对系统的性能和安全性进行了验证。
{"title":"An SDKEY Data Protection and Sharing Scheme with Attribute-Based Encryption for Smartphone","authors":"Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao","doi":"10.1109/ES.2016.20","DOIUrl":"https://doi.org/10.1109/ES.2016.20","url":null,"abstract":"Android system attracts many malicious applications to steal sensitive data. Not only in storing data, it is also easy to get data leaked while sharing. SDKEY device is an external compute system with Independent arithmetic processor. In this paper. First, we present and implement a method to store and share data safely with cipher policy attribute-based encryption between Android phones, and it is useful in Instant messaging and file managing. Second, we design a security file structure to manage data efficiently. Third, we design a kind of dual-authentication login scheme using both SDKEY and PIN for booting Android OS. Finally, a solution on transparent encryption storage for sensitive message like SMS is proposed. Besides, we also develop a prototype system based on all above solutions in this paper, the performance and security of system are proved and verified from several aspects.","PeriodicalId":184435,"journal":{"name":"2016 4th International Conference on Enterprise Systems (ES)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126027729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smart Decision Making System for Managing Patient Database 面向患者数据库管理的智能决策系统
Pub Date : 2016-11-01 DOI: 10.1109/ES.2016.12
Liuliu Fu, L. Li
A decision support method is developed to capture the classification patterns from the doctor, to establish a new global classification schema, and to classify the new patient cases into facet categories. The proposed system provides valuable recommendations to healthcare providers, and helps them gain more transparent information from patients so as to make better scheduling decisions that minimize the gap between patient demand and the provided services.
开发了一种决策支持方法,从医生那里捕获分类模式,建立新的全局分类模式,并将新病例分类为facet类别。该系统为医疗保健提供者提供了有价值的建议,并帮助他们从患者那里获得更透明的信息,从而做出更好的调度决策,最大限度地减少患者需求与所提供服务之间的差距。
{"title":"A Smart Decision Making System for Managing Patient Database","authors":"Liuliu Fu, L. Li","doi":"10.1109/ES.2016.12","DOIUrl":"https://doi.org/10.1109/ES.2016.12","url":null,"abstract":"A decision support method is developed to capture the classification patterns from the doctor, to establish a new global classification schema, and to classify the new patient cases into facet categories. The proposed system provides valuable recommendations to healthcare providers, and helps them gain more transparent information from patients so as to make better scheduling decisions that minimize the gap between patient demand and the provided services.","PeriodicalId":184435,"journal":{"name":"2016 4th International Conference on Enterprise Systems (ES)","volume":"136 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131239271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Alignment Analysis of Software Product Lines 软件产品线的安全一致性分析
Pub Date : 2016-11-01 DOI: 10.1109/ES.2016.19
Danillo Sprovieri, N. Argyropoulos, C. Souveyet, R. Mazo, H. Mouratidis, A. Fish
Context: Security is becoming increasingly important during software engineering. Software developers should be able to adapt and deploy secure systems in a continuously changing execution context. Method: We use Software Product Lines (SPLs), Business Process Management (BPM) and Security Requirements Engineering (SRE) techniques for anticipating the uncertainty and the changes of security requirements. Results: We provide a method to support developers to incorporate security in the design of SPLs systems. To avoid costly and extensive re-design of SPLs and BPs, we propose a methodology to analyse the strategic change impact of SPLs and BPs. The methodology supports the alignment of organizational strategy and execution level with an emphasis to security. Conclusions: This methodology constitutes a guideline to trace back the impact of change respecting security constraints of SPLs and BPs on different abstraction levels.
背景:在软件工程中,安全性变得越来越重要。软件开发人员应该能够在不断变化的执行环境中调整和部署安全的系统。方法:我们使用软件产品线(SPLs)、业务流程管理(BPM)和安全需求工程(SRE)技术来预测不确定性和安全需求的变化。结果:我们提供了一种方法来支持开发人员将安全性纳入SPLs系统的设计中。为了避免昂贵和广泛的重新设计重点项目和基础设施,我们提出了一种方法来分析重点项目和基础设施的战略变化影响。该方法支持组织战略和执行层的一致性,并强调安全性。结论:该方法构成了一个指导方针,可以追溯在不同抽象层次上关于spc和bp的安全约束的变化的影响。
{"title":"Security Alignment Analysis of Software Product Lines","authors":"Danillo Sprovieri, N. Argyropoulos, C. Souveyet, R. Mazo, H. Mouratidis, A. Fish","doi":"10.1109/ES.2016.19","DOIUrl":"https://doi.org/10.1109/ES.2016.19","url":null,"abstract":"Context: Security is becoming increasingly important during software engineering. Software developers should be able to adapt and deploy secure systems in a continuously changing execution context. Method: We use Software Product Lines (SPLs), Business Process Management (BPM) and Security Requirements Engineering (SRE) techniques for anticipating the uncertainty and the changes of security requirements. Results: We provide a method to support developers to incorporate security in the design of SPLs systems. To avoid costly and extensive re-design of SPLs and BPs, we propose a methodology to analyse the strategic change impact of SPLs and BPs. The methodology supports the alignment of organizational strategy and execution level with an emphasis to security. Conclusions: This methodology constitutes a guideline to trace back the impact of change respecting security constraints of SPLs and BPs on different abstraction levels.","PeriodicalId":184435,"journal":{"name":"2016 4th International Conference on Enterprise Systems (ES)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116007513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discovering the Academic Situation of Students by Relationship Mining 利用关系挖掘发现学生的学业状况
Pub Date : 2016-11-01 DOI: 10.1109/ES.2016.31
Haiyang Xia, Jiaxin Han, Jie Kong, Wenjuan Wei, Lei Zhang
While the data mining in education field gained more and more popularity in recent years, there have many research endeavors to find association rules in students' academic situation. The current methods normally apply traditional association rules mining technique to identify those rules. However, traditional association rules mining technique can not identify difference between different types of students' academic situation. To solve this problems, we applied a novel contrast target rules mining method in this paper. Real world data set from Computer Science department of a university of China, the empirical results show the difference characteristics of different types of students in their academic situation.
近年来,随着数据挖掘在教育领域的应用越来越广泛,在学生学习情境中寻找关联规则的研究也越来越多。目前的方法通常采用传统的关联规则挖掘技术来识别这些规则。然而,传统的关联规则挖掘技术无法识别不同类型学生学业状况之间的差异。为了解决这一问题,本文采用了一种新的对比目标规则挖掘方法。来自中国某大学计算机科学系的真实数据集,实证结果显示了不同类型学生在学业状况上的差异特征。
{"title":"Discovering the Academic Situation of Students by Relationship Mining","authors":"Haiyang Xia, Jiaxin Han, Jie Kong, Wenjuan Wei, Lei Zhang","doi":"10.1109/ES.2016.31","DOIUrl":"https://doi.org/10.1109/ES.2016.31","url":null,"abstract":"While the data mining in education field gained more and more popularity in recent years, there have many research endeavors to find association rules in students' academic situation. The current methods normally apply traditional association rules mining technique to identify those rules. However, traditional association rules mining technique can not identify difference between different types of students' academic situation. To solve this problems, we applied a novel contrast target rules mining method in this paper. Real world data set from Computer Science department of a university of China, the empirical results show the difference characteristics of different types of students in their academic situation.","PeriodicalId":184435,"journal":{"name":"2016 4th International Conference on Enterprise Systems (ES)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SEOMAS: An Ontology-Based Multi-Agent System for Capturing Semantics of Software Project Information 基于本体的多智能体软件项目信息语义捕获系统
Pub Date : 2016-11-01 DOI: 10.1109/ES.2016.21
U. Pakdeetrakulwong, P. Wongthongtham, Suksawat Sae-Lim, Hassan Marzooq Naqvi
A software development project produces a large volume of software artefacts. However, these are in syntactic form so their structures are not conducive to an understanding of the semantics, and therefore may create ambiguities (e.g. incorrect or different interpretations). This problem is particularly large in a distributed software development context where project members are geographically dispersed. Furthermore, in this type of setting, information related to the software project is scattered across various, unlinked software repositories. This results in two main challenges. First, this software project information is not readily accessible because of its dispersal. Second, there is a lack of integration among relevant software artefacts. Previous research efforts have attempted to address these issues by capturing software project information and structuring it in conceptualised form. However, most of the proposals are based on a manual or semi-automatic approach, resulting in tasks being more laborious for team members. In this paper, we propose a systematic approach to automatically capture the semantics of software project information (i.e. source code artefacts) by means of the semantic annotation process. The Software Engineering Ontology is utilised to provide domain knowledge and the multi-agent approach is applied to automate the process. Once software project information has been captured and structured according to the ontology, it is in machine understandable and processable form and can be subsequently used by software agents. They can read and process this information in order to provide active support for dispersed team members to clarify any ambiguity resulting from remote communication, to address major software development issues, and to facilitate effective and efficient coordination.
软件开发项目会产生大量的软件工件。然而,这些都是句法形式的,所以它们的结构不利于理解语义,因此可能会产生歧义(例如不正确或不同的解释)。在项目成员地理位置分散的分布式软件开发环境中,这个问题尤其严重。此外,在这种类型的设置中,与软件项目相关的信息分散在各种未链接的软件存储库中。这带来了两个主要挑战。首先,由于软件项目信息的分散,它不容易获得。其次,相关软件工件之间缺乏集成。以前的研究努力试图通过捕获软件项目信息并以概念化的形式将其结构化来解决这些问题。然而,大多数建议都是基于手动或半自动的方法,导致团队成员的任务更加费力。在本文中,我们提出了一种系统的方法,通过语义注释过程自动捕获软件项目信息(即源代码工件)的语义。利用软件工程本体提供领域知识,采用多智能体方法实现过程自动化。一旦软件项目信息被捕获并根据本体进行结构化,它就会以机器可理解和可处理的形式出现,并可随后被软件代理使用。他们可以阅读和处理这些信息,以便为分散的团队成员提供积极的支持,以澄清远程通信产生的任何歧义,解决主要的软件开发问题,并促进有效和高效的协调。
{"title":"SEOMAS: An Ontology-Based Multi-Agent System for Capturing Semantics of Software Project Information","authors":"U. Pakdeetrakulwong, P. Wongthongtham, Suksawat Sae-Lim, Hassan Marzooq Naqvi","doi":"10.1109/ES.2016.21","DOIUrl":"https://doi.org/10.1109/ES.2016.21","url":null,"abstract":"A software development project produces a large volume of software artefacts. However, these are in syntactic form so their structures are not conducive to an understanding of the semantics, and therefore may create ambiguities (e.g. incorrect or different interpretations). This problem is particularly large in a distributed software development context where project members are geographically dispersed. Furthermore, in this type of setting, information related to the software project is scattered across various, unlinked software repositories. This results in two main challenges. First, this software project information is not readily accessible because of its dispersal. Second, there is a lack of integration among relevant software artefacts. Previous research efforts have attempted to address these issues by capturing software project information and structuring it in conceptualised form. However, most of the proposals are based on a manual or semi-automatic approach, resulting in tasks being more laborious for team members. In this paper, we propose a systematic approach to automatically capture the semantics of software project information (i.e. source code artefacts) by means of the semantic annotation process. The Software Engineering Ontology is utilised to provide domain knowledge and the multi-agent approach is applied to automate the process. Once software project information has been captured and structured according to the ontology, it is in machine understandable and processable form and can be subsequently used by software agents. They can read and process this information in order to provide active support for dispersed team members to clarify any ambiguity resulting from remote communication, to address major software development issues, and to facilitate effective and efficient coordination.","PeriodicalId":184435,"journal":{"name":"2016 4th International Conference on Enterprise Systems (ES)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 4th International Conference on Enterprise Systems (ES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1