首页 > 最新文献

Acta Cybern.最新文献

英文 中文
Rootkit Detection on Embedded IoT Devices 嵌入式物联网设备的Rootkit检测
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.288834
R. Nagy, K. Németh, Dorottya Papp, L. Buttyán
IoT systems are subject to cyber attacks, including infecting embedded IoT devices with rootkits. Rootkits are malicious software that typically run with elevated privileges, which makes their detection challenging. In this paper, we address this challenge: we propose a rootkit detection approach for embedded IoT devices that takes advantage of a trusted execution environment (TEE), which is often supported on popular IoT platforms, such as ARM based embedded boards. The TEE provides an isolated environment for our rootkit detection algorithms, and prevents the rootkit from interfering with their execution even if the rootkit has root privileges on the untrusted part of the IoT device. Our rootkit detection algorithms identify modifications made by the rootkit to the code of the operating system kernel, to system programs, and to data influencing the control flow (e.g., hooking system calls), as well as inconsistencies created by the rootkit in certain kernel data structures (e.g., those responsible to handle process related information). We also propose algorithms to detect rootkit components in the persistent storage of the device. Besides describing our approach and algorithms in details, we also report on a prototype implementation and on the evaluation of our design and implementation, which is based on testing our prototype with rootkits that we developed for this purpose.
物联网系统容易受到网络攻击,包括用rootkit感染嵌入式物联网设备。rootkit是恶意软件,通常以更高的权限运行,这使得它们的检测具有挑战性。在本文中,我们解决了这一挑战:我们提出了一种针对嵌入式物联网设备的rootkit检测方法,该方法利用可信执行环境(TEE),该环境通常支持流行的物联网平台,如基于ARM的嵌入式板。TEE为我们的rootkit检测算法提供了一个隔离的环境,并防止rootkit干扰其执行,即使rootkit在物联网设备的不受信任部分具有root权限。我们的rootkit检测算法识别由rootkit对操作系统内核代码、系统程序和影响控制流的数据(例如,钩子系统调用)所做的修改,以及由rootkit在某些内核数据结构中创建的不一致(例如,负责处理进程相关信息的那些)。我们还提出了检测设备持久存储中的rootkit组件的算法。除了详细描述我们的方法和算法之外,我们还报告了一个原型实现以及对我们的设计和实现的评估,这是基于我们为此目的开发的rootkit测试我们的原型。
{"title":"Rootkit Detection on Embedded IoT Devices","authors":"R. Nagy, K. Németh, Dorottya Papp, L. Buttyán","doi":"10.14232/actacyb.288834","DOIUrl":"https://doi.org/10.14232/actacyb.288834","url":null,"abstract":"IoT systems are subject to cyber attacks, including infecting embedded IoT devices with rootkits. Rootkits are malicious software that typically run with elevated privileges, which makes their detection challenging. In this paper, we address this challenge: we propose a rootkit detection approach for embedded IoT devices that takes advantage of a trusted execution environment (TEE), which is often supported on popular IoT platforms, such as ARM based embedded boards. The TEE provides an isolated environment for our rootkit detection algorithms, and prevents the rootkit from interfering with their execution even if the rootkit has root privileges on the untrusted part of the IoT device. Our rootkit detection algorithms identify modifications made by the rootkit to the code of the operating system kernel, to system programs, and to data influencing the control flow (e.g., hooking system calls), as well as inconsistencies created by the rootkit in certain kernel data structures (e.g., those responsible to handle process related information). We also propose algorithms to detect rootkit components in the persistent storage of the device. Besides describing our approach and algorithms in details, we also report on a prototype implementation and on the evaluation of our design and implementation, which is based on testing our prototype with rootkits that we developed for this purpose.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130051656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Version Controlling in RefactorErl 迈向RefactorErl中的版本控制
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.289386
Jenifer Tabita Ciuciu-Kiss, M. Tóth, István Bozó
Static source code analyser tools are operating on an intermediate representation of the source code that is usually a tree or a graph. Those representations need to be updated according to the different versions of the source code. However, the developers might be interested in the changes or might need information about previous versions, therefore, keeping different versions of the source code analysed by the tools are required. RefactorErl is an open-source static analysis and transformation tool for Erlang that uses a graph representation to store and manipulate the source code. The aim of our research was to create an extension of the Semantic Program Graph of RefactorErl that is able to store different versions of the source code in a single graph. The new method resulted in 30% memory footprint decrease compared to the available workaround solutions.
静态源代码分析工具对源代码的中间表示形式(通常是树或图)进行操作。这些表示需要根据源代码的不同版本进行更新。然而,开发人员可能对更改感兴趣,或者可能需要有关以前版本的信息,因此,需要保留由工具分析的源代码的不同版本。RefactorErl是Erlang的开源静态分析和转换工具,它使用图形表示来存储和操作源代码。我们研究的目的是创建RefactorErl的语义程序图的扩展,使其能够在单个图中存储不同版本的源代码。与可用的解决方案相比,新方法的内存占用减少了30%。
{"title":"Towards Version Controlling in RefactorErl","authors":"Jenifer Tabita Ciuciu-Kiss, M. Tóth, István Bozó","doi":"10.14232/actacyb.289386","DOIUrl":"https://doi.org/10.14232/actacyb.289386","url":null,"abstract":"Static source code analyser tools are operating on an intermediate representation of the source code that is usually a tree or a graph. Those representations need to be updated according to the different versions of the source code. However, the developers might be interested in the changes or might need information about previous versions, therefore, keeping different versions of the source code analysed by the tools are required. RefactorErl is an open-source static analysis and transformation tool for Erlang that uses a graph representation to store and manipulate the source code. The aim of our research was to create an extension of the Semantic Program Graph of RefactorErl that is able to store different versions of the source code in a single graph. The new method resulted in 30% memory footprint decrease compared to the available workaround solutions.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122471288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distance-Based Skeletonization on the BCC Grid BCC网格上基于距离的骨架化
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.290076
Gábor Karai, P. Kardos
Strand proposed a distance-based thinning algorithm for computing surface skeletons on the body-centered cubic (BCC) grid. In this paper, we present two modified versions of this algorithm that are faster than the original one, and less sensitive to the visiting order of points in the sequential thinning phase. In addition, a novel algorithm capable of producing curve skeletons is also reported.
Strand提出了一种基于距离的体心立方(BCC)网格表面骨架细化算法。本文提出了该算法的两个改进版本,它们比原算法更快,并且对序列细化阶段点的访问顺序不那么敏感。此外,本文还提出了一种新的曲线骨架生成算法。
{"title":"Distance-Based Skeletonization on the BCC Grid","authors":"Gábor Karai, P. Kardos","doi":"10.14232/actacyb.290076","DOIUrl":"https://doi.org/10.14232/actacyb.290076","url":null,"abstract":"Strand proposed a distance-based thinning algorithm for computing surface skeletons on the body-centered cubic (BCC) grid. In this paper, we present two modified versions of this algorithm that are faster than the original one, and less sensitive to the visiting order of points in the sequential thinning phase. In addition, a novel algorithm capable of producing curve skeletons is also reported.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126799637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbolic Regression for Approximating Graph Geodetic Number 近似图大地数的符号回归
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.289041
Ahmad T. Anaqreh, B. G.-Tóth, T. Vinkó
Graph properties are certain attributes that could make the structure of the graph understandable. Occasionally, standard methods cannot work properly for calculating exact values of graph properties due to their huge computational complexity, especially for real-world graphs. In contrast, heuristics and metaheuristics are alternatives proved their ability to provide sufficient solutions in a reasonable time. Although in some cases, even heuristics are not efficient enough, where they need some not easily obtainable global information of the graph. The problem thus should be dealt in completely different way by trying to find features that related to the property and based on these data build a formula which can approximate the graph property. In this work, symbolic regression with an evolutionary algorithm called Cartesian Genetic Programming has been used to derive formulas capable to approximate the graph geodetic number which measures the minimal-cardinality set of vertices, such that all shortest paths between its elements cover every vertex of the graph. Finding the exact value of the geodetic number is known to be NP-hard for general graphs. The obtained formulas are tested on random and real-world graphs. It is demonstrated how various graph properties as training data can lead to diverse formulas with different accuracy. It is also investigated which training data are really related to each property.
图属性是可以使图的结构易于理解的某些属性。有时,标准方法由于其巨大的计算复杂性而不能正确地计算图属性的精确值,特别是对于现实世界的图。相比之下,启发式和元启发式被证明能够在合理的时间内提供足够的解决方案。尽管在某些情况下,即使是启发式也不够有效,因为它们需要一些不容易获得的图的全局信息。因此,这个问题应该以完全不同的方式处理,即试图找到与属性相关的特征,并基于这些数据构建一个可以近似图属性的公式。在这项工作中,符号回归与一种称为笛卡尔遗传规划的进化算法已被用于推导能够近似图测地数的公式,该公式测量顶点的最小基数集,使其元素之间的所有最短路径覆盖图的每个顶点。对于一般图来说,精确地求测地线数是np困难的。所得公式在随机图和实际图上进行了检验。演示了不同的图属性作为训练数据如何导致不同精度的不同公式。还研究了哪些训练数据与每个属性真正相关。
{"title":"Symbolic Regression for Approximating Graph Geodetic Number","authors":"Ahmad T. Anaqreh, B. G.-Tóth, T. Vinkó","doi":"10.14232/actacyb.289041","DOIUrl":"https://doi.org/10.14232/actacyb.289041","url":null,"abstract":"Graph properties are certain attributes that could make the structure of the graph understandable. Occasionally, standard methods cannot work properly for calculating exact values of graph properties due to their huge computational complexity, especially for real-world graphs. In contrast, heuristics and metaheuristics are alternatives proved their ability to provide sufficient solutions in a reasonable time. Although in some cases, even heuristics are not efficient enough, where they need some not easily obtainable global information of the graph. The problem thus should be dealt in completely different way by trying to find features that related to the property and based on these data build a formula which can approximate the graph property. In this work, symbolic regression with an evolutionary algorithm called Cartesian Genetic Programming has been used to derive formulas capable to approximate the graph geodetic number which measures the minimal-cardinality set of vertices, such that all shortest paths between its elements cover every vertex of the graph. Finding the exact value of the geodetic number is known to be NP-hard for general graphs. The obtained formulas are tested on random and real-world graphs. It is demonstrated how various graph properties as training data can lead to diverse formulas with different accuracy. It is also investigated which training data are really related to each property.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133813803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Performance of Novel JWT Revocation Strategy 新型JWT撤销策略的性能评价
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.289455
László Viktor Jánoky, P. Ekler, J. Levendovszky
JSON Web Tokens (JWT) provide a scalable, distributed way of user access control for modern web-based systems. The main advantage of the scheme is that the tokens are valid by themselves – through the use of digital signing – also imply its greatest weakness. Once issued, there is no trivial way to revoke a JWT token. In our work, we present a novel approach for this revocation problem, overcoming some of the problems of currently used solutions. To compare our solution to the established solutions, we also introduce the mathematical framework of comparison, which we ultimately test using real-world measurements.
JSON Web令牌(JWT)为现代基于Web的系统提供了一种可扩展的、分布式的用户访问控制方式。该方案的主要优点是令牌本身是有效的——通过使用数字签名——这也意味着它的最大弱点。一旦发出JWT令牌,就没有简单的方法可以撤销它。在我们的工作中,我们提出了一种新的方法来解决这个撤销问题,克服了目前使用的解决方案的一些问题。为了将我们的解决方案与已建立的解决方案进行比较,我们还引入了比较的数学框架,我们最终使用实际测量对其进行测试。
{"title":"Evaluating the Performance of Novel JWT Revocation Strategy","authors":"László Viktor Jánoky, P. Ekler, J. Levendovszky","doi":"10.14232/actacyb.289455","DOIUrl":"https://doi.org/10.14232/actacyb.289455","url":null,"abstract":"JSON Web Tokens (JWT) provide a scalable, distributed way of user access control for modern web-based systems. The main advantage of the scheme is that the tokens are valid by themselves – through the use of digital signing – also imply its greatest weakness. Once issued, there is no trivial way to revoke a JWT token. In our work, we present a novel approach for this revocation problem, overcoming some of the problems of currently used solutions. To compare our solution to the established solutions, we also introduce the mathematical framework of comparison, which we ultimately test using real-world measurements.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Execution Time Reduction in Function Oriented Scientific Workflows 面向功能的科学工作流的执行时间缩短
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.288489
Ali S. A. Al-Haboobi, G. Kecskeméti
Scientific workflows have been an increasingly important research area of distributed systems (such as cloud computing). Researchers have shown an increased interest in the automated processing scientific applications such as workflows. Recently, Function as a Service (FaaS) has emerged as a novel distributed systems platform for processing non-interactive applications. FaaS has limitations in resource use (e.g., CPU and RAM) as well as state management. In spite of these, initial studies have already demonstrated using FaaS for processing scientific workflows. DEWE v3 executes workflows in this fashion, but it often suffers from duplicate data transfers while using FaaS. This behaviour is due to the handling of intermediate data dependencies after and before each function invocation. These data dependencies could fill the temporary storage of the function environment. Our approach alters the job dispatch algorithm of DEWE v3 to reduce data dependency transfers. The proposed algorithm schedules jobs with precedence requirements to primarily run in the same function invocation. We evaluate our proposed algorithm and the original algorithm with small- and large-scale Montage workflows. Our results show that the improved system can reduce the total workflow execution time of scientific workflows over DEWE v3 by about 10% when using AWS Lambda.
科学工作流已经成为分布式系统(如云计算)中一个日益重要的研究领域。研究人员对工作流等自动化处理科学应用表现出越来越大的兴趣。最近,功能即服务(FaaS)作为一种新的分布式系统平台出现,用于处理非交互式应用程序。FaaS在资源使用(例如,CPU和RAM)以及状态管理方面有限制。尽管如此,初步研究已经证明使用FaaS处理科学工作流程。DEWE v3以这种方式执行工作流,但在使用FaaS时,它经常遭受重复数据传输的困扰。这种行为是由于在每个函数调用之后和之前处理中间数据依赖关系。这些数据依赖关系可能会填满函数环境的临时存储。我们的方法改变了DEWE v3的作业调度算法,以减少数据依赖传输。提出的算法调度具有优先级要求的作业,主要在相同的函数调用中运行。我们在小型和大型蒙太奇工作流中评估了我们提出的算法和原始算法。我们的结果表明,当使用AWS Lambda时,改进的系统可以将DEWE v3上的科学工作流的总工作流执行时间减少约10%。
{"title":"Execution Time Reduction in Function Oriented Scientific Workflows","authors":"Ali S. A. Al-Haboobi, G. Kecskeméti","doi":"10.14232/actacyb.288489","DOIUrl":"https://doi.org/10.14232/actacyb.288489","url":null,"abstract":"Scientific workflows have been an increasingly important research area of distributed systems (such as cloud computing). Researchers have shown an increased interest in the automated processing scientific applications such as workflows. Recently, Function as a Service (FaaS) has emerged as a novel distributed systems platform for processing non-interactive applications. FaaS has limitations in resource use (e.g., CPU and RAM) as well as state management. In spite of these, initial studies have already demonstrated using FaaS for processing scientific workflows. DEWE v3 executes workflows in this fashion, but it often suffers from duplicate data transfers while using FaaS. This behaviour is due to the handling of intermediate data dependencies after and before each function invocation. These data dependencies could fill the temporary storage of the function environment. Our approach alters the job dispatch algorithm of DEWE v3 to reduce data dependency transfers. The proposed algorithm schedules jobs with precedence requirements to primarily run in the same function invocation. We evaluate our proposed algorithm and the original algorithm with small- and large-scale Montage workflows. Our results show that the improved system can reduce the total workflow execution time of scientific workflows over DEWE v3 by about 10% when using AWS Lambda.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Parallel Event System for Large-Scale Cloud Simulations in DISSECT-CF 大型云模拟的并行事件系统
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.287937
D. Sallo, G. Kecskeméti
Discrete Event Simulation (DES) frameworks gained significant popularity to support and evaluate cloud computing environments. They support decision-making for complex scenarios, saving time and effort. The majority of these frameworks lack parallel execution. In spite being a sequential framework, DISSECT-CF introduced significant performance improvements when simulating Infrastructure as a Service (IaaS) clouds. Even with these improvements over the state of the art sequential simulators, there are several scenarios (e.g., large scale Internet of Things or serverless computing systems) which DISSECT-CF would not simulate in a timely fashion. To remedy such scenarios this paper introduces parallel execution to its most abstract subsystem: the event system. The new event subsystem detects when multiple events occur at a specific time instance of the simulation and decides to execute them either on a parallel or a sequential fashion. This decision is mainly based on the number of independent events and the expected workload of a particular event. In our evaluation, we focused exclusively on time management scenarios. While we did so, we ensured the behaviour of the events should be equivalent to realistic, larger-scale simulation scenarios. This allowed us to understand the effects of parallelism on the whole framework, while we also shown the gains of the new system compared to the old sequential one. With regards to scaling, we observed it to be proportional to the number of cores in the utilised SMP host.
离散事件模拟(DES)框架在支持和评估云计算环境方面获得了极大的普及。它们支持复杂场景的决策,节省时间和精力。这些框架中的大多数缺乏并行执行。尽管是一个顺序框架,但在模拟基础设施即服务(IaaS)云时,DISSECT-CF带来了显著的性能改进。即使对最先进的顺序模拟器进行了这些改进,也有一些场景(例如,大规模的物联网或无服务器计算系统)是DISSECT-CF无法及时模拟的。为了纠正这种情况,本文将并行执行引入其最抽象的子系统:事件系统。新的事件子系统检测在模拟的特定时间实例中何时发生多个事件,并决定以并行或顺序方式执行它们。该决策主要基于独立事件的数量和特定事件的预期工作负载。在我们的评估中,我们只关注时间管理场景。当我们这样做时,我们确保事件的行为应该等同于现实的,更大规模的模拟场景。这使我们能够理解并行性对整个框架的影响,同时我们还展示了新系统与旧顺序系统相比的增益。关于可伸缩性,我们观察到它与所使用的SMP主机中的内核数量成正比。
{"title":"A Parallel Event System for Large-Scale Cloud Simulations in DISSECT-CF","authors":"D. Sallo, G. Kecskeméti","doi":"10.14232/actacyb.287937","DOIUrl":"https://doi.org/10.14232/actacyb.287937","url":null,"abstract":"Discrete Event Simulation (DES) frameworks gained significant popularity to support and evaluate cloud computing environments. They support decision-making for complex scenarios, saving time and effort. The majority of these frameworks lack parallel execution. In spite being a sequential framework, DISSECT-CF introduced significant performance improvements when simulating Infrastructure as a Service (IaaS) clouds. Even with these improvements over the state of the art sequential simulators, there are several scenarios (e.g., large scale Internet of Things or serverless computing systems) which DISSECT-CF would not simulate in a timely fashion. To remedy such scenarios this paper introduces parallel execution to its most abstract subsystem: the event system. The new event subsystem detects when multiple events occur at a specific time instance of the simulation and decides to execute them either on a parallel or a sequential fashion. This decision is mainly based on the number of independent events and the expected workload of a particular event. In our evaluation, we focused exclusively on time management scenarios. While we did so, we ensured the behaviour of the events should be equivalent to realistic, larger-scale simulation scenarios. This allowed us to understand the effects of parallelism on the whole framework, while we also shown the gains of the new system compared to the old sequential one. With regards to scaling, we observed it to be proportional to the number of cores in the utilised SMP host.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134079968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Component-based Error Detection of P4 programs 基于组件的P4程序错误检测
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.289731
Gabriella Tóth, M. Tejfel
P4 is a domain-specific language to develop the packet processing of network devices. These programs can easily hide errors, therefore we give a solution to analyze them and detect predefined errors in them. This paper shows the idea, which works with the P4 code as a set of components and processes them one by one, while calculating their pre- and postconditions. This method does not only detect errors between the components and their connections, but it is capable to reveal errors, which are hidden in the middle of a component. The paper introduces the method and shows its calculation in an example.
P4是一种用于开发网络设备包处理的领域特定语言。这些程序容易隐藏错误,因此我们给出了一种分析和检测程序中预定义错误的解决方案。本文展示了这种思想,它将P4代码作为一组组件,并逐一处理它们,同时计算它们的前置和后置条件。该方法不仅检测组件及其连接之间的错误,而且能够显示隐藏在组件中间的错误。本文介绍了该方法,并给出了算例。
{"title":"Component-based Error Detection of P4 programs","authors":"Gabriella Tóth, M. Tejfel","doi":"10.14232/actacyb.289731","DOIUrl":"https://doi.org/10.14232/actacyb.289731","url":null,"abstract":"P4 is a domain-specific language to develop the packet processing of network devices. These programs can easily hide errors, therefore we give a solution to analyze them and detect predefined errors in them. This paper shows the idea, which works with the P4 code as a set of components and processes them one by one, while calculating their pre- and postconditions. This method does not only detect errors between the components and their connections, but it is capable to reveal errors, which are hidden in the middle of a component. The paper introduces the method and shows its calculation in an example.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121238049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protocol State Machine Reverse Engineering with a Teaching-Learning Approach 基于教学方法的协议状态机逆向工程
Pub Date : 2021-08-04 DOI: 10.14232/actacyb.288213
G. Székely, Gergő Ládi, T. Holczer, L. Buttyán
In this work, we propose a novel solution to the problem of inferring the state machine of an unknown protocol. We extend and improve prior results on inferring Mealy machines, and present a new algorithm that accesses and interacts with a networked system that runs the unknown protocol in order to infer the Mealy machine representing the protocol's state machine. To demonstrate the viability of our approach, we provide an implementation and illustrate the operation of our algorithm on a simple example protocol, as well as on two real-world protocols, Modbus and MQTT.
在这项工作中,我们提出了一种新的解决方案来推断未知协议的状态机问题。我们扩展和改进了先前在推断粉机上的结果,并提出了一种新的算法,该算法访问运行未知协议的网络系统并与之交互,以推断代表协议状态机的粉机。为了证明我们的方法的可行性,我们提供了一个实现,并说明了我们的算法在一个简单的示例协议以及两个现实世界的协议Modbus和MQTT上的操作。
{"title":"Protocol State Machine Reverse Engineering with a Teaching-Learning Approach","authors":"G. Székely, Gergő Ládi, T. Holczer, L. Buttyán","doi":"10.14232/actacyb.288213","DOIUrl":"https://doi.org/10.14232/actacyb.288213","url":null,"abstract":"In this work, we propose a novel solution to the problem of inferring the state machine of an unknown protocol. We extend and improve prior results on inferring Mealy machines, and present a new algorithm that accesses and interacts with a networked system that runs the unknown protocol in order to infer the Mealy machine representing the protocol's state machine. To demonstrate the viability of our approach, we provide an implementation and illustrate the operation of our algorithm on a simple example protocol, as well as on two real-world protocols, Modbus and MQTT.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptation of a Refactoring DSL for the Object-Oriented Paradigm 面向对象范式的重构DSL改编
Pub Date : 2021-03-18 DOI: 10.14232/ACTACYB.284280
D. J. Németh, Dániel Horpácsi, M. Tejfel
Many development environments offer refactorings aimed at improving non-functional properties of software, but we have no guarantees that these transformations indeed preserve the observable behavior of the source code they are applied on. An existing domain-specific language makes it possible to formalize automatically verifiable refactorings via instantiating predefined transformation schemes with conditional term rewrite rules. We present a proposal for adapting this language from the functional to the object-oriented programming paradigm, using Java instead of Erlang as a representative. The behavior-preserving property of discussed refactorings is characterized with a multilayered definition of equivalence for Java programs, including the conformity relation of class hierarchies. Based on the decomposition of a complex refactoring rule, we show how new transformation schemes can be identified, along with modifications and extensions of the description language required to accommodate them. Finally, we formally define the chosen base refactoring as a composition of scheme instances.
许多开发环境提供旨在改进软件非功能属性的重构,但是我们不能保证这些转换确实保留了应用它们的源代码的可观察行为。现有的特定于领域的语言可以通过实例化带有条件项重写规则的预定义转换模式来形式化自动可验证的重构。我们提出了一个将这种语言从函数式编程范式调整为面向对象编程范式的建议,使用Java代替Erlang作为代表。所讨论的重构的行为保持特性用Java程序等价的多层定义来描述,包括类层次的一致性关系。基于复杂重构规则的分解,我们展示了如何识别新的转换方案,以及适应它们所需的描述语言的修改和扩展。最后,我们将选择的基本重构正式定义为方案实例的组合。
{"title":"Adaptation of a Refactoring DSL for the Object-Oriented Paradigm","authors":"D. J. Németh, Dániel Horpácsi, M. Tejfel","doi":"10.14232/ACTACYB.284280","DOIUrl":"https://doi.org/10.14232/ACTACYB.284280","url":null,"abstract":"Many development environments offer refactorings aimed at improving non-functional properties of software, but we have no guarantees that these transformations indeed preserve the observable behavior of the source code they are applied on. An existing domain-specific language makes it possible to formalize automatically verifiable refactorings via instantiating predefined transformation schemes with conditional term rewrite rules. \u0000 We present a proposal for adapting this language from the functional to the object-oriented programming paradigm, using Java instead of Erlang as a representative. The behavior-preserving property of discussed refactorings is characterized with a multilayered definition of equivalence for Java programs, including the conformity relation of class hierarchies. Based on the decomposition of a complex refactoring rule, we show how new transformation schemes can be identified, along with modifications and extensions of the description language required to accommodate them. Finally, we formally define the chosen base refactoring as a composition of scheme instances.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Cybern.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1