Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00252
Cong Tian, Yu Deng, Yu Jiang
{"title":"Preface to the Topic of Formal Methods and Their Applications","authors":"Cong Tian, Yu Deng, Yu Jiang","doi":"10.21655/ijsi.1673-7288.00252","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00252","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"6 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00277
Xu Zhou, Tongfeng Weng, Zhibang Yang, Boren Li, Ji Zhang, Kenli Li
{"title":"Distributed Tip Decomposition on Large Bipartite Graphs","authors":"Xu Zhou, Tongfeng Weng, Zhibang Yang, Boren Li, Ji Zhang, Kenli Li","doi":"10.21655/ijsi.1673-7288.00277","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00277","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00254
Zongyin Hao, Faming Lu
{"title":"Reverse Unfolding of Petri Nets and its Application in Program Data Race Detection","authors":"Zongyin Hao, Faming Lu","doi":"10.21655/ijsi.1673-7288.00254","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00254","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00273
Shuyuan Li, Yudian Ji, D. Shi, Wangdong Liao, Lipeng Zhang, Yongxin Tong, Ke Xu
{"title":"A Secure Multi-party Data Federation System","authors":"Shuyuan Li, Yudian Ji, D. Shi, Wangdong Liao, Lipeng Zhang, Yongxin Tong, Ke Xu","doi":"10.21655/ijsi.1673-7288.00273","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00273","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131387887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00260
Han Bian, Xiaohong Chen, Zhi Jin, M. Zhang
{"title":"Approach to Generating TAP Rules in IoT Systems Based on Enviro nment Modeling","authors":"Han Bian, Xiaohong Chen, Zhi Jin, M. Zhang","doi":"10.21655/ijsi.1673-7288.00260","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00260","url":null,"abstract":"","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114390594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21655/ijsi.1673-7288.00261
Fengjuan Gao, Yu Wang, Lingyun Situ, Linzhang Wang
With the rapid development of software techniques, domain-driven software raises new challenges in software security and robustness. Symbolic execution and fuzzing have been rapidly developed in recent decades, demonstrating their ability in detecting software bugs. Enormous detected and fixed bugs demonstrate their feasibility. However, it is still a challenging task to combine the two methods due to their corresponding weakness. State-of-the-art techniques focus on incorporating the two methods such as using symbolic execution to solve paths when fuzzing gets stuck in complex paths. Unfortunately, such methods are inefficient because they have to 基金项目: 国家自然科学基金(62032010); 江苏省研究生科研与实践创新计划 Foundation item: National Natural Science Foundation of China (62032010); Postgraduate Research & Practice Innovation Program of Jiangsu Province 本文由“面向领域的软件系统构造与质量保障”专题特约编辑潘敏学教授、魏峻研究员、崔展齐教授推荐. 收稿时间: 2020-09-13; 修改时间: 2020-10-26; 采用时间: 2020-12-19; jos 在线出版时间: 2021-01-22 or Rearch O ly 高凤娟 等:基于深度学习的混合模糊测试方法 989 switch to fuzzing (resp. symbolic execution) when conducting symbolic execution (resp. fuzzing). This paper presents a new deep learning-based hybrid testing method using symbolic execution and fuzzing. This method tries to predict paths that are suitable for fuzzing (resp. symbolic execution) and guide the fuzzing (resp. symbolic execution) to reach the paths. To further enhance the effectiveness, a hybrid mechanism is proposed to make them interact with each other. The proposed approach is evaluated on the programs in LAVA-M, and the results are compared with that using symbolic execution or fuzzing independently. The proposed method achieves more than 20% increase of branch coverage, 1 to 13 times increase of the path number, and uncover 929 more bugs.
{"title":"Deep Learning-Based Hybrid Fuzz Testing","authors":"Fengjuan Gao, Yu Wang, Lingyun Situ, Linzhang Wang","doi":"10.21655/ijsi.1673-7288.00261","DOIUrl":"https://doi.org/10.21655/ijsi.1673-7288.00261","url":null,"abstract":"With the rapid development of software techniques, domain-driven software raises new challenges in software security and robustness. Symbolic execution and fuzzing have been rapidly developed in recent decades, demonstrating their ability in detecting software bugs. Enormous detected and fixed bugs demonstrate their feasibility. However, it is still a challenging task to combine the two methods due to their corresponding weakness. State-of-the-art techniques focus on incorporating the two methods such as using symbolic execution to solve paths when fuzzing gets stuck in complex paths. Unfortunately, such methods are inefficient because they have to 基金项目: 国家自然科学基金(62032010); 江苏省研究生科研与实践创新计划 Foundation item: National Natural Science Foundation of China (62032010); Postgraduate Research & Practice Innovation Program of Jiangsu Province 本文由“面向领域的软件系统构造与质量保障”专题特约编辑潘敏学教授、魏峻研究员、崔展齐教授推荐. 收稿时间: 2020-09-13; 修改时间: 2020-10-26; 采用时间: 2020-12-19; jos 在线出版时间: 2021-01-22 or Rearch O ly 高凤娟 等:基于深度学习的混合模糊测试方法 989 switch to fuzzing (resp. symbolic execution) when conducting symbolic execution (resp. fuzzing). This paper presents a new deep learning-based hybrid testing method using symbolic execution and fuzzing. This method tries to predict paths that are suitable for fuzzing (resp. symbolic execution) and guide the fuzzing (resp. symbolic execution) to reach the paths. To further enhance the effectiveness, a hybrid mechanism is proposed to make them interact with each other. The proposed approach is evaluated on the programs in LAVA-M, and the results are compared with that using symbolic execution or fuzzing independently. The proposed method achieves more than 20% increase of branch coverage, 1 to 13 times increase of the path number, and uncover 929 more bugs.","PeriodicalId":218849,"journal":{"name":"Int. J. Softw. Informatics","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129944102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}