首页 > 最新文献

2011 Fifth International Conference on Secure Software Integration and Reliability Improvement最新文献

英文 中文
ReLACK: A Reliable VoIP Steganography Approach ReLACK:一个可靠的VoIP隐写方法
Mohammad Hamdaqa, L. Tahvildari
VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, and proposes a new VoIP steganography approach. Current VoIP steganography techniques lack mechanisms to provide reliability without weakening the steganography system. Accordingly, this paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and then applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity. The cost of reliability is a loss in bandwidth, therefore, the proposed approach also provides mechanisms to maximize packets utilization to mitigate the effect of adding redundancy.
VoIP隐写是一种实时网络隐写技术,它利用VoIP协议和流量作为隐蔽通道来隐藏秘密消息。最近,由于产生的VoIP流量的数量,对VoIP隐写术的兴趣明显增加,这被证明是经济上可行的。本文讨论了VoIP隐写所面临的挑战,比较了现有的隐写机制,提出了一种新的VoIP隐写方法。目前的VoIP隐写技术缺乏在不削弱隐写系统的前提下提供可靠性的机制。因此,本文对基于拉格朗日插值的(k, n)阈值秘密共享方案进行了改进,并在LACK隐写机制上采用两阶段方法,提高了隐写的可靠性和容错性,提高了隐写的复杂度。可靠性的代价是带宽的损失,因此,所提出的方法还提供了最大化数据包利用率的机制,以减轻增加冗余的影响。
{"title":"ReLACK: A Reliable VoIP Steganography Approach","authors":"Mohammad Hamdaqa, L. Tahvildari","doi":"10.1109/SSIRI.2011.24","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.24","url":null,"abstract":"VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, and proposes a new VoIP steganography approach. Current VoIP steganography techniques lack mechanisms to provide reliability without weakening the steganography system. Accordingly, this paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and then applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity. The cost of reliability is a loss in bandwidth, therefore, the proposed approach also provides mechanisms to maximize packets utilization to mitigate the effect of adding redundancy.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"312-315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Validation of SDL-Based Architectural Design Models: New Coverage Criteria 基于sdl的架构设计模型的验证:新的覆盖标准
Andy Restrepo, W. Eric Wong
As the capability to automatically generate code from different models becomes more sophisticated, it is critical that these models be adequately tested for quality assurance prior to code generation. Although simulation-based blackbox testing strategies exist for these models, it is important that we also employ white-box testing strategies similar to those used to test implementation code. More precisely, we apply coverage testing to architectural design models represented by SDL (Specification and Description Language). Our previous study [30] defined a methodology for automatic test generation with respect to structural-based criteria such as all-node and all-edge. Now, we propose new coverage criteria such as n-step message transfer and sender-receiver round-trip, aiming at the communication between SDL processes.
随着从不同模型自动生成代码的能力变得更加复杂,在代码生成之前对这些模型进行充分的质量保证测试是至关重要的。尽管针对这些模型存在基于仿真的黑盒测试策略,但重要的是我们也使用类似于用于测试实现代码的白盒测试策略。更准确地说,我们将覆盖测试应用于由SDL(规范和描述语言)表示的架构设计模型。我们之前的研究[30]定义了一种基于结构标准(如全节点和全边缘)的自动测试生成方法。现在,针对SDL进程之间的通信,我们提出了新的覆盖标准,如n步消息传输和发送-接收往返。
{"title":"Validation of SDL-Based Architectural Design Models: New Coverage Criteria","authors":"Andy Restrepo, W. Eric Wong","doi":"10.1109/SSIRI.2011.29","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.29","url":null,"abstract":"As the capability to automatically generate code from different models becomes more sophisticated, it is critical that these models be adequately tested for quality assurance prior to code generation. Although simulation-based blackbox testing strategies exist for these models, it is important that we also employ white-box testing strategies similar to those used to test implementation code. More precisely, we apply coverage testing to architectural design models represented by SDL (Specification and Description Language). Our previous study [30] defined a methodology for automatic test generation with respect to structural-based criteria such as all-node and all-edge. Now, we propose new coverage criteria such as n-step message transfer and sender-receiver round-trip, aiming at the communication between SDL processes.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts 增强设计级安全性:将攻击树与状态图集成
O. Ariss, Jianfei Wu, Dianxiang Xu
Software security has become more and more critical as we are increasingly depending on the Internet, an untrustworthy computing environment. Software functionality and security are tightly related to each other, vulnerabilities due to design errors, inconsistencies, incompleteness, and missing constraints in system specifications can be wrongly exploited by security attacks. These two concerns, however, are often handled separately. In this paper we present a threat driven approach that improves on the quality of software through the realization of a more secure functional model. The approach introduces systematic transformation rules and integration steps for mapping attack tree representations into lower level dynamic behavior, then integrates this behavior into state chart-based functional models. Through the focus on both the functional and threat behavior, software engineers can introduce, clearly define and understand security concerns as software is designed. To identify vulnerabilities, our approach then applies security analysis and threat identification to the integrated model.
随着我们越来越依赖互联网这个不可靠的计算环境,软件安全变得越来越重要。软件功能和安全性紧密相关,由于系统规范中的设计错误、不一致、不完整和缺少约束而导致的漏洞可能被安全攻击错误地利用。然而,这两个关注点通常是分开处理的。在本文中,我们提出了一种威胁驱动的方法,通过实现更安全的功能模型来提高软件质量。该方法引入了系统的转换规则和集成步骤,将攻击树表示映射为较低级的动态行为,然后将该行为集成到基于状态图的功能模型中。通过对功能行为和威胁行为的关注,软件工程师可以在设计软件时引入、清楚地定义和理解安全问题。为了识别漏洞,我们的方法随后将安全分析和威胁识别应用于集成模型。
{"title":"Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts","authors":"O. Ariss, Jianfei Wu, Dianxiang Xu","doi":"10.1109/SSIRI.2011.11","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.11","url":null,"abstract":"Software security has become more and more critical as we are increasingly depending on the Internet, an untrustworthy computing environment. Software functionality and security are tightly related to each other, vulnerabilities due to design errors, inconsistencies, incompleteness, and missing constraints in system specifications can be wrongly exploited by security attacks. These two concerns, however, are often handled separately. In this paper we present a threat driven approach that improves on the quality of software through the realization of a more secure functional model. The approach introduces systematic transformation rules and integration steps for mapping attack tree representations into lower level dynamic behavior, then integrates this behavior into state chart-based functional models. Through the focus on both the functional and threat behavior, software engineers can introduce, clearly define and understand security concerns as software is designed. To identify vulnerabilities, our approach then applies security analysis and threat identification to the integrated model.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dynamic Service Replacement to Improve Composite Service Reliability 动态业务替换,提高组合业务可靠性
Jong-Phil Kim, Jang-Eui Hong
Service-oriented architecture (SOA) provides an ability to satisfy the increasing demand of the customer for complicated services in business environments via the composition of service components scattered on the Internet. Service composition is a mechanism to create a new service by the integration of several services to meet complex business goals. Web services are frequently exposed to unexpected service faults in network environments, because most SOA has been recently realized in the area of web services. Thus, services participating in the service composition cannot always be free of service faults, thereby decreasing the reliability of service composition. It is necessary to improve the reliability of the service composition to provide a reliable service. In this paper, we focus on the availability of a web service and propose a technique to improve service composition reliability using the web service-business process execution language (WS-BPEL) to support successful service composition. The proposed technique performs dynamic service replacement with the WS-BPEL extension. This is combined as the concept of the aspect-oriented programming when a web service fault is detected. We can prevent the failures of composite web service from unexpected service faults using our technique.
面向服务的体系结构(SOA)提供了一种能力,可以通过组合分散在Internet上的服务组件来满足客户对业务环境中复杂服务日益增长的需求。服务组合是一种通过集成多个服务来创建新服务的机制,以满足复杂的业务目标。Web服务在网络环境中经常暴露于意想不到的服务故障,因为大多数SOA最近都是在Web服务领域实现的。因此,参与服务组合的服务不可能总是没有服务故障,从而降低了服务组合的可靠性。为了提供可靠的服务,有必要提高服务组合的可靠性。在本文中,我们将重点关注web服务的可用性,并提出一种技术来提高服务组合的可靠性,该技术使用web服务-业务流程执行语言(WS-BPEL)来支持成功的服务组合。所建议的技术使用WS-BPEL扩展执行动态服务替换。当检测到web服务故障时,这将结合为面向方面编程的概念。我们可以使用我们的技术来防止由于意外的服务故障而导致的组合web服务故障。
{"title":"Dynamic Service Replacement to Improve Composite Service Reliability","authors":"Jong-Phil Kim, Jang-Eui Hong","doi":"10.1109/SSIRI.2011.23","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.23","url":null,"abstract":"Service-oriented architecture (SOA) provides an ability to satisfy the increasing demand of the customer for complicated services in business environments via the composition of service components scattered on the Internet. Service composition is a mechanism to create a new service by the integration of several services to meet complex business goals. Web services are frequently exposed to unexpected service faults in network environments, because most SOA has been recently realized in the area of web services. Thus, services participating in the service composition cannot always be free of service faults, thereby decreasing the reliability of service composition. It is necessary to improve the reliability of the service composition to provide a reliable service. In this paper, we focus on the availability of a web service and propose a technique to improve service composition reliability using the web service-business process execution language (WS-BPEL) to support successful service composition. The proposed technique performs dynamic service replacement with the WS-BPEL extension. This is combined as the concept of the aspect-oriented programming when a web service fault is detected. We can prevent the failures of composite web service from unexpected service faults using our technique.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1