首页 > 最新文献

2014 Eighth International Conference on Software Security and Reliability最新文献

英文 中文
Traceability-Based Formal Specification Inspection 基于可追溯性的正式规范检查
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.30
Mo Li, Shaoying Liu
Transforming informal specifications to formal specifications is an effective approach to clarifying user's requirements. However, how to keep the consistency between the informal specification and the formal specification is a major challenge. In this paper, we propose an inspection method for verifying whether all requirements described in an informal specification are formalized in the corresponding formal specification. Inspection is a static analysis technique based upon a checklist containing questions that should be answered. Our proposed inspection method advocates the principle that the checklist is created based on the trace ability of specifications and animation is used as a reading technique for checking through the formal specification. The trace ability reflects connections between informal and formal specifications, which can facilitate the inspector to check whether all requirements have been realized. The animation provides an intuitive way to guide the inspector in reading the formal specification. We use a case study to demonstrate how an inspection is performed.
将非正式规范转化为正式规范是明确用户需求的有效途径。然而,如何保持非正式规范和正式规范之间的一致性是一个主要的挑战。在本文中,我们提出了一种检查方法,用于验证在非正式规范中描述的所有需求是否在相应的正式规范中被形式化。检查是一种静态分析技术,它基于包含应该回答的问题的清单。我们提出的检查方法提倡基于规范的可追溯性创建检查表的原则,并使用动画作为阅读技术来检查正式的规范。追溯能力反映了非正式规范和正式规范之间的联系,这可以方便检验员检查是否所有的需求都已实现。动画提供了一种直观的方式来指导检查员阅读正式的规范。我们使用一个案例研究来演示如何执行检查。
{"title":"Traceability-Based Formal Specification Inspection","authors":"Mo Li, Shaoying Liu","doi":"10.1109/SERE.2014.30","DOIUrl":"https://doi.org/10.1109/SERE.2014.30","url":null,"abstract":"Transforming informal specifications to formal specifications is an effective approach to clarifying user's requirements. However, how to keep the consistency between the informal specification and the formal specification is a major challenge. In this paper, we propose an inspection method for verifying whether all requirements described in an informal specification are formalized in the corresponding formal specification. Inspection is a static analysis technique based upon a checklist containing questions that should be answered. Our proposed inspection method advocates the principle that the checklist is created based on the trace ability of specifications and animation is used as a reading technique for checking through the formal specification. The trace ability reflects connections between informal and formal specifications, which can facilitate the inspector to check whether all requirements have been realized. The animation provides an intuitive way to guide the inspector in reading the formal specification. We use a case study to demonstrate how an inspection is performed.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115504786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution 使用动态符号执行自动生成覆盖驱动的测试数据
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.23
Ting Su, G. Pu, Bin Fang, Jifeng He, Jun Yan, Siyuan Jiang, Jianjun Zhao
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative impacts on underlying search strategies or local maximum exist. So we propose a dynamic symbolic execution (DSE) based framework combined with a path filtering algorithm and a new heuristic path search strategy, i.e., predictive path search, to achieve faster coverage-driven testing with lower testing cost. The empirical experiments (three open source projects and two industrial projects) show that our approach is effective and efficient. For the open source projects w.r.t branch coverage, our approach in average reduces 25.5% generated test cases and 36.3% solved constraints than the traditional DSE-based approach without path filtering. And the presented heuristic strategy, on the same testing budget, improves the branch coverage by 26.4% and 35.4% than some novel search strategies adopted in KLEE and CREST.
最近,采用代码转换或定制的适应度函数来实现覆盖(结构或逻辑标准)驱动的测试,以确保软件的可靠性。然而,存在一些内部威胁,如对底层搜索策略的负面影响或局部最大值。因此,我们提出了一种基于动态符号执行(DSE)的框架,结合路径过滤算法和一种新的启发式路径搜索策略,即预测路径搜索,以实现更快的覆盖驱动测试和更低的测试成本。实证实验(三个开源项目和两个工业项目)表明我们的方法是有效和高效的。对于开放源码项目的w.r.t分支覆盖,我们的方法平均减少了25.5%生成的测试用例和36.3%解决的约束,而不是传统的没有路径过滤的基于sse的方法。在相同的测试预算下,所提出的启发式策略比KLEE和CREST中采用的新搜索策略分别提高了26.4%和35.4%的分支覆盖率。
{"title":"Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution","authors":"Ting Su, G. Pu, Bin Fang, Jifeng He, Jun Yan, Siyuan Jiang, Jianjun Zhao","doi":"10.1109/SERE.2014.23","DOIUrl":"https://doi.org/10.1109/SERE.2014.23","url":null,"abstract":"Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative impacts on underlying search strategies or local maximum exist. So we propose a dynamic symbolic execution (DSE) based framework combined with a path filtering algorithm and a new heuristic path search strategy, i.e., predictive path search, to achieve faster coverage-driven testing with lower testing cost. The empirical experiments (three open source projects and two industrial projects) show that our approach is effective and efficient. For the open source projects w.r.t branch coverage, our approach in average reduces 25.5% generated test cases and 36.3% solved constraints than the traditional DSE-based approach without path filtering. And the presented heuristic strategy, on the same testing budget, improves the branch coverage by 26.4% and 35.4% than some novel search strategies adopted in KLEE and CREST.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128766009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
High Performance Java Card Operating System 高性能Java卡操作系统
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.16
Mohammad R. Eletriby, Mohammed A. Sobh, A. Eldin, H. Fahmy
Due to the fast evolving of trusted computing environments and internet-of-things an eager need has been established for open platforms which support interchangeable technologies to co-exist without threatening system's security. Certainly, future embedded applications will need high performance operating systems to support the intensive-computing algorithms required for satisfying acceptable response and secure the application inside the vulnerable open environment, hence, new inevitable requirements for embedded operating systems have arisen including hard real-time response, support for native applications, system openness and system scalability. This paper introduces a new design for secure and open smart card operating system, called ESCOS (Egypt Smart Card Operating System), based on the prevalent Java Card technology. The new design provides competitive characteristics in the main three factors of judging smart card platforms, namely, system security, supported technology and system response. In addition, ESCOS is designed to have high degree of modularity and re-configurability to meet fast-changing business needs and diverse hardware platforms.
随着可信计算环境和物联网的快速发展,人们迫切需要支持可互换技术的开放平台在不威胁系统安全的情况下共存。当然,未来的嵌入式应用将需要高性能的操作系统来支持密集计算算法,以满足可接受的响应,并在易受攻击的开放环境中保护应用程序,因此,对嵌入式操作系统提出了新的不可避免的要求,包括硬实时响应、对本地应用程序的支持、系统开放性和系统可扩展性。本文介绍了一种基于流行的Java卡技术设计的安全开放的智能卡操作系统,称为ESCOS(埃及智能卡操作系统)。新设计在判断智能卡平台的三个主要因素,即系统安全性、支持技术和系统响应方面提供了具有竞争力的特点。此外,ESCOS的设计具有高度的模块化和可重构性,以满足快速变化的业务需求和不同的硬件平台。
{"title":"High Performance Java Card Operating System","authors":"Mohammad R. Eletriby, Mohammed A. Sobh, A. Eldin, H. Fahmy","doi":"10.1109/SERE.2014.16","DOIUrl":"https://doi.org/10.1109/SERE.2014.16","url":null,"abstract":"Due to the fast evolving of trusted computing environments and internet-of-things an eager need has been established for open platforms which support interchangeable technologies to co-exist without threatening system's security. Certainly, future embedded applications will need high performance operating systems to support the intensive-computing algorithms required for satisfying acceptable response and secure the application inside the vulnerable open environment, hence, new inevitable requirements for embedded operating systems have arisen including hard real-time response, support for native applications, system openness and system scalability. This paper introduces a new design for secure and open smart card operating system, called ESCOS (Egypt Smart Card Operating System), based on the prevalent Java Card technology. The new design provides competitive characteristics in the main three factors of judging smart card platforms, namely, system security, supported technology and system response. In addition, ESCOS is designed to have high degree of modularity and re-configurability to meet fast-changing business needs and diverse hardware platforms.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114365852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AppMark: A Picture-Based Watermark for Android Apps AppMark:一个基于图片的Android应用水印
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.19
Yingjun Zhang, Kai Chen
Smartphones have become common tools in people's daily life. Lots of popular applications (e.g., social network applications) have immigrated from traditional computers to smartphones. With the growth of the apps, attacks on these apps are also increasing. One serious attack adds malicious payloads or advertisements to legitimate apps. These modified apps, called repackaged apps, share similar functionalities with the original apps, which makes them easily spread. To mitigate this attack, we embed watermarks into Android apps. Specially, to make the watermarks robust, we embed a new kind of watermarks called picture-based watermarks into Android apps. By making the inherent characteristics of pictures, it is resilient to obfuscation. We implemented a prototype call AppMark. We evaluated its effectiveness and performance overhead. According to the results, the picture-based watermark is both effective and efficient.
智能手机已经成为人们日常生活中常见的工具。许多流行的应用程序(例如,社交网络应用程序)已经从传统计算机迁移到智能手机。随着应用程序的增长,针对这些应用程序的攻击也在增加。一种严重的攻击会在合法应用程序中添加恶意负载或广告。这些经过修改的应用程序被称为重新打包的应用程序,它们与原始应用程序共享相似的功能,这使得它们很容易传播。为了减轻这种攻击,我们在Android应用中嵌入了水印。为了增强水印的鲁棒性,我们在Android应用中嵌入了一种新的基于图片的水印。通过制造图像的固有特征,它具有抗混淆的能力。我们实现了一个名为AppMark的原型。我们评估了它的有效性和性能开销。实验结果表明,基于图像的水印是有效的、高效的。
{"title":"AppMark: A Picture-Based Watermark for Android Apps","authors":"Yingjun Zhang, Kai Chen","doi":"10.1109/SERE.2014.19","DOIUrl":"https://doi.org/10.1109/SERE.2014.19","url":null,"abstract":"Smartphones have become common tools in people's daily life. Lots of popular applications (e.g., social network applications) have immigrated from traditional computers to smartphones. With the growth of the apps, attacks on these apps are also increasing. One serious attack adds malicious payloads or advertisements to legitimate apps. These modified apps, called repackaged apps, share similar functionalities with the original apps, which makes them easily spread. To mitigate this attack, we embed watermarks into Android apps. Specially, to make the watermarks robust, we embed a new kind of watermarks called picture-based watermarks into Android apps. By making the inherent characteristics of pictures, it is resilient to obfuscation. We implemented a prototype call AppMark. We evaluated its effectiveness and performance overhead. According to the results, the picture-based watermark is both effective and efficient.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128710015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Influence of Developer Quality on Software Fault-Proneness Prediction 开发人员素质对软件故障倾向预测的影响
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.14
Yangsong Wu, Yibiao Yang, Yangyang Zhao, Hongmin Lu, Yuming Zhou, Baowen Xu
Previous studies have shown that process metrics are useful for building fault-proneness prediction models. In particular, it has been found that those process metrics incorporating developer experience (defined as the percentage of the code a developer contributes) exhibit a good ability to predict fault-proneness. However, developer quality, which we strongly believe should have a great influence on software quality, is surprisingly ignored. In this paper, we first quantify the quality of a developer via the percentage of history bug-introduce commits over all his/her commits during the development process. Then, we leverage developer quality information to develop eight file quality metrics. Finally, we empirically study the usefulness of these eight file quality metrics for fault-proneness prediction. Based on eight open source software systems, our experiment results show that: 1) these proposed file quality metrics capture additional information compared with existing process metrics, 2) almost all the proposed file quality metrics have a significant association with fault-proneness in an expected direction, and 3) the proposed file quality metrics can in general improve the effectiveness of fault-proneness prediction models when together used with existing process metrics. These results suggest that developer quality has a strong influence on software quality and should be taken into account when predicting software fault-proneness.
先前的研究表明,过程度量对于建立故障倾向预测模型是有用的。特别是,已经发现那些包含开发人员经验(定义为开发人员贡献的代码的百分比)的过程度量显示出预测错误倾向的良好能力。然而,我们强烈认为对软件质量有很大影响的开发人员素质却令人惊讶地被忽视了。在本文中,我们首先通过历史bug引入的提交占他/她在开发过程中所有提交的百分比来量化开发人员的质量。然后,我们利用开发人员质量信息来开发8个文件质量度量标准。最后,我们实证研究了这8个文件质量指标对故障倾向预测的有用性。基于8个开源软件系统,我们的实验结果表明:1)与现有的过程度量相比,这些提出的文件质量度量捕获了额外的信息;2)几乎所有提出的文件质量度量都在预期的方向上与错误倾向有显著的关联;3)当与现有的过程度量一起使用时,所提出的文件质量度量总体上提高了错误倾向预测模型的有效性。这些结果表明,开发人员的素质对软件质量有很大的影响,在预测软件的故障倾向时应该考虑到这一点。
{"title":"The Influence of Developer Quality on Software Fault-Proneness Prediction","authors":"Yangsong Wu, Yibiao Yang, Yangyang Zhao, Hongmin Lu, Yuming Zhou, Baowen Xu","doi":"10.1109/SERE.2014.14","DOIUrl":"https://doi.org/10.1109/SERE.2014.14","url":null,"abstract":"Previous studies have shown that process metrics are useful for building fault-proneness prediction models. In particular, it has been found that those process metrics incorporating developer experience (defined as the percentage of the code a developer contributes) exhibit a good ability to predict fault-proneness. However, developer quality, which we strongly believe should have a great influence on software quality, is surprisingly ignored. In this paper, we first quantify the quality of a developer via the percentage of history bug-introduce commits over all his/her commits during the development process. Then, we leverage developer quality information to develop eight file quality metrics. Finally, we empirically study the usefulness of these eight file quality metrics for fault-proneness prediction. Based on eight open source software systems, our experiment results show that: 1) these proposed file quality metrics capture additional information compared with existing process metrics, 2) almost all the proposed file quality metrics have a significant association with fault-proneness in an expected direction, and 3) the proposed file quality metrics can in general improve the effectiveness of fault-proneness prediction models when together used with existing process metrics. These results suggest that developer quality has a strong influence on software quality and should be taken into account when predicting software fault-proneness.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133006054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Two-Stage Data Preprocessing Approach for Software Fault Prediction 软件故障预测的两阶段数据预处理方法
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.15
Jiaqiang Chen, Shulong Liu, Wangshu Liu, Xiang Chen, Qing Gu, Daoxu Chen
Software fault prediction is valuable in predicting fault proneness of software modules and then limited test resources can be effectively allocated for software quality assurance. Researchers have proved that either feature selection or instance reduction can improve the performance of classification models used for fault prediction. However, to the best of our knowledge, few researchers have combined them to study the effects on classification models. Therefore we propose a novel two-stage data preprocessing approach, which incorporates both feature selection and instance reduction. In particular, in the feature selection stage, we propose a new algorithm using both feature selection and threshold-based clustering which contains both relevance analysis and redundancy control. Then in the instance reduction stage, we apply random sampling to keep the balance between the faulty and non-faulty classes. In empirical studies, we implemented five different data preprocessing schemes based on our proposed approach, and performed a comparative study on the prediction performance of the commonly used classification models. The final results demonstrate the effectiveness of our approach and further provide a guideline for achieving cost-effective data preprocessing when using our approach.
软件故障预测在预测软件模块的故障倾向方面具有重要的价值,从而有效地分配有限的测试资源,保证软件的质量。研究人员已经证明,无论是特征选择还是实例约简都可以提高用于故障预测的分类模型的性能。然而,据我们所知,很少有研究人员将它们结合起来研究对分类模型的影响。因此,我们提出了一种新的两阶段数据预处理方法,该方法结合了特征选择和实例约简。特别是在特征选择阶段,我们提出了一种结合特征选择和基于阈值的聚类的新算法,该算法同时包含相关性分析和冗余控制。然后在实例缩减阶段,我们采用随机抽样来保持故障类和非故障类之间的平衡。在实证研究中,我们基于本文提出的方法实现了五种不同的数据预处理方案,并对常用分类模型的预测性能进行了比较研究。最后的结果证明了我们方法的有效性,并进一步为使用我们的方法实现具有成本效益的数据预处理提供了指导。
{"title":"A Two-Stage Data Preprocessing Approach for Software Fault Prediction","authors":"Jiaqiang Chen, Shulong Liu, Wangshu Liu, Xiang Chen, Qing Gu, Daoxu Chen","doi":"10.1109/SERE.2014.15","DOIUrl":"https://doi.org/10.1109/SERE.2014.15","url":null,"abstract":"Software fault prediction is valuable in predicting fault proneness of software modules and then limited test resources can be effectively allocated for software quality assurance. Researchers have proved that either feature selection or instance reduction can improve the performance of classification models used for fault prediction. However, to the best of our knowledge, few researchers have combined them to study the effects on classification models. Therefore we propose a novel two-stage data preprocessing approach, which incorporates both feature selection and instance reduction. In particular, in the feature selection stage, we propose a new algorithm using both feature selection and threshold-based clustering which contains both relevance analysis and redundancy control. Then in the instance reduction stage, we apply random sampling to keep the balance between the faulty and non-faulty classes. In empirical studies, we implemented five different data preprocessing schemes based on our proposed approach, and performed a comparative study on the prediction performance of the commonly used classification models. The final results demonstrate the effectiveness of our approach and further provide a guideline for achieving cost-effective data preprocessing when using our approach.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125266327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison 基于基本块比较的vm敏感发散点快速发现
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.33
Yen Ju Liu, Chong Kuan Chen, Michael Cheng Yi Cho, S. Shieh
To evade VM-based malware analysis systems, VM-aware malware equipped with the ability to detect the presence of virtual machine has appeared. To cope with the problem, detecting VM-aware malware and locating VM-sensitive divergence points of VM-aware malware is in urgent need. In this paper, we propose a novel block-based divergence locator. In contrast to the conventional instruction-based schemes, the block-based divergence locator divides malware program into basic blocks, instead of binary instructions, and uses them as the analysis unit. The block-based divergence locator significantly decrease the cost of behavior logging and trace comparison, as well as the size of behavior traces. As the evaluation showed, behavior logging is 23.87-39.49 times faster than the conventional schemes. The total number of analysis unit, which is highly related to the cost of trace comparisons, is 11.95%-16.00% of the conventional schemes. Consequently, VM-sensitive divergence points can be discovered more efficiently. The correctness of our divergence point discovery algorithm is also proved formally in this paper.
为了规避基于虚拟机的恶意软件分析系统,虚拟机感知恶意软件配备了检测虚拟机存在的能力。为了解决这一问题,迫切需要检测感知虚拟机的恶意软件,并找到感知虚拟机的恶意软件对虚拟机敏感的发散点。本文提出了一种新的基于分块的发散定位器。与传统的基于指令的方案相比,基于块的发散定位器将恶意程序划分为基本块,而不是二进制指令,并将其作为分析单元。基于块的发散定位器显著降低了行为记录和跟踪比较的成本,以及行为跟踪的大小。评价结果表明,行为记录的速度是常规方案的23.87 ~ 39.49倍。分析单元总数为常规方案的11.95% ~ 16.00%,与痕量比较费用密切相关。因此,可以更有效地发现vm敏感的发散点。本文还正式证明了发散点发现算法的正确性。
{"title":"Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison","authors":"Yen Ju Liu, Chong Kuan Chen, Michael Cheng Yi Cho, S. Shieh","doi":"10.1109/SERE.2014.33","DOIUrl":"https://doi.org/10.1109/SERE.2014.33","url":null,"abstract":"To evade VM-based malware analysis systems, VM-aware malware equipped with the ability to detect the presence of virtual machine has appeared. To cope with the problem, detecting VM-aware malware and locating VM-sensitive divergence points of VM-aware malware is in urgent need. In this paper, we propose a novel block-based divergence locator. In contrast to the conventional instruction-based schemes, the block-based divergence locator divides malware program into basic blocks, instead of binary instructions, and uses them as the analysis unit. The block-based divergence locator significantly decrease the cost of behavior logging and trace comparison, as well as the size of behavior traces. As the evaluation showed, behavior logging is 23.87-39.49 times faster than the conventional schemes. The total number of analysis unit, which is highly related to the cost of trace comparisons, is 11.95%-16.00% of the conventional schemes. Consequently, VM-sensitive divergence points can be discovered more efficiently. The correctness of our divergence point discovery algorithm is also proved formally in this paper.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114535100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADAutomation: An Activity Diagram Based Automated GUI Testing Framework for Smartphone Applications ADAutomation:基于活动图的智能手机应用程序自动GUI测试框架
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.20
Ang Li, Zishan Qin, Mingsong Chen, Jing Liu
Under the increasing complexity and time-to-market pressures, functional validation is becoming a major bottleneck of smartphone applications running on mobile platforms (e.g., Android, iOS). Due to the GUI (Graphical User Interface) intensive nature, the execution of smartphone applications heavily relies on the interactions with users. Manual GUI testing is extremely slow and unacceptably expensive in practice. However, the lack of formal models of user behaviors in the design phase hinders the automation of GUI testing (i.e., test case generation and test evaluation). While thorough test efforts are required to ensure the consistency between user behavior specifications and GUI implementations, few of existing testing approaches can automatically utilize the design phase information to test complex smartphone applications. Based on UML activity diagrams, this paper proposes an automated GUI testing framework called AD Automation, which supports user behavior modeling, GUI test case generation, and post-test analysis and debugging. The experiments using two industrial smartphone applications demonstrate that our approach can not only drastically reduce overall testing time, but also improve the quality of designs.
在日益增加的复杂性和上市时间压力下,功能验证正成为运行在移动平台(如Android、iOS)上的智能手机应用程序的主要瓶颈。由于GUI(图形用户界面)密集的性质,智能手机应用程序的执行严重依赖于与用户的交互。在实践中,手动GUI测试是极其缓慢和昂贵的。然而,在设计阶段缺乏正式的用户行为模型阻碍了GUI测试的自动化(例如,测试用例生成和测试评估)。虽然需要彻底的测试工作来确保用户行为规范和GUI实现之间的一致性,但很少有现有的测试方法可以自动利用设计阶段信息来测试复杂的智能手机应用程序。基于UML活动图,本文提出了一个自动化的GUI测试框架AD Automation,该框架支持用户行为建模、GUI测试用例生成以及测试后分析和调试。使用两个工业智能手机应用程序的实验表明,我们的方法不仅可以大大缩短整体测试时间,还可以提高设计质量。
{"title":"ADAutomation: An Activity Diagram Based Automated GUI Testing Framework for Smartphone Applications","authors":"Ang Li, Zishan Qin, Mingsong Chen, Jing Liu","doi":"10.1109/SERE.2014.20","DOIUrl":"https://doi.org/10.1109/SERE.2014.20","url":null,"abstract":"Under the increasing complexity and time-to-market pressures, functional validation is becoming a major bottleneck of smartphone applications running on mobile platforms (e.g., Android, iOS). Due to the GUI (Graphical User Interface) intensive nature, the execution of smartphone applications heavily relies on the interactions with users. Manual GUI testing is extremely slow and unacceptably expensive in practice. However, the lack of formal models of user behaviors in the design phase hinders the automation of GUI testing (i.e., test case generation and test evaluation). While thorough test efforts are required to ensure the consistency between user behavior specifications and GUI implementations, few of existing testing approaches can automatically utilize the design phase information to test complex smartphone applications. Based on UML activity diagrams, this paper proposes an automated GUI testing framework called AD Automation, which supports user behavior modeling, GUI test case generation, and post-test analysis and debugging. The experiments using two industrial smartphone applications demonstrate that our approach can not only drastically reduce overall testing time, but also improve the quality of designs.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123395186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Specification of Dynamic Fault Tree Concepts with Stochastic Petri Nets 用随机Petri网描述动态故障树概念
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.31
Lena Feinbube, Peter Tröger
Dependability modeling describes a set of approaches for analyzing the reliability of software and hardware systems. The most prominent approach are fault trees, which hierarchically express the causal dependencies between basic faults and an undesired failure event. Dynamic fault trees allow to express sequence-dependent error propagation, which is commonly found in software systems. In this paper, we present a complete behavioral specification of well-known dynamic fault tree concepts. We provide a novel connection rule definition for all commonly accepted node types, in combination with a description of their behavioral semantics in generalized stochastic petri nets. Both specifications together are not available in literature so far. The application of these specifications in fault tree generation and modeling tools can help to prevent syntactical and semantical ambiguity in the generated output.
可靠性建模描述了一组分析软件和硬件系统可靠性的方法。最突出的方法是故障树,它分层地表示基本故障和不期望的故障事件之间的因果关系。动态故障树允许表达序列相关的错误传播,这在软件系统中很常见。在本文中,我们给出了一个完整的动态故障树概念的行为规范。我们为所有普遍接受的节点类型提供了一种新的连接规则定义,并结合了它们在广义随机petri网中的行为语义描述。到目前为止,文献中还没有这两个规范。在故障树生成和建模工具中应用这些规范可以帮助防止生成的输出中的语法和语义歧义。
{"title":"Specification of Dynamic Fault Tree Concepts with Stochastic Petri Nets","authors":"Lena Feinbube, Peter Tröger","doi":"10.1109/SERE.2014.31","DOIUrl":"https://doi.org/10.1109/SERE.2014.31","url":null,"abstract":"Dependability modeling describes a set of approaches for analyzing the reliability of software and hardware systems. The most prominent approach are fault trees, which hierarchically express the causal dependencies between basic faults and an undesired failure event. Dynamic fault trees allow to express sequence-dependent error propagation, which is commonly found in software systems. In this paper, we present a complete behavioral specification of well-known dynamic fault tree concepts. We provide a novel connection rule definition for all commonly accepted node types, in combination with a description of their behavioral semantics in generalized stochastic petri nets. Both specifications together are not available in literature so far. The application of these specifications in fault tree generation and modeling tools can help to prevent syntactical and semantical ambiguity in the generated output.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132320291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical Systems 安全关键系统中预防危险的安全装置碰撞分析
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.38
Jang Jin Kwon, Doohwan Kim, J. Park, Jang-Eui Hong
The importance of safety-critical systems is increasing, as seen with the terrible accidents recently occurring in nuclear power plants and with airplanes. To ensure the safety of those systems, system engineers should consider how to prevent system hazards during the design phase of system development. Although existing techniques such as event tree analysis and cause-consequence analysis provide various ways of hazard prevention for safety-critical systems, previous studies did not provide a solution for the situation where any two actions of hazard prevention collide. This paper suggests a collision analysis technique of safety device using fault prevention tree and resource map as a method to identify and analyze colliding actions. The proposed technique would help design robust systems to prevent hazards, and also fulfill the software requirement of safety in practical system development.
安全关键系统的重要性正在增加,正如最近发生在核电站和飞机上的可怕事故所看到的那样。为了保证这些系统的安全,系统工程师应该在系统开发的设计阶段就考虑如何预防系统危害。虽然现有的事件树分析、因果分析等技术为安全关键型系统提供了多种危害预防方法,但以往的研究并没有提供任何两种危害预防行为发生冲突的解决方案。提出了一种基于故障预防树和资源映射的安全装置碰撞分析技术,对碰撞行为进行识别和分析。所提出的技术将有助于设计健壮的系统来预防危险,并满足实际系统开发中对安全的软件需求。
{"title":"Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical Systems","authors":"Jang Jin Kwon, Doohwan Kim, J. Park, Jang-Eui Hong","doi":"10.1109/SERE.2014.38","DOIUrl":"https://doi.org/10.1109/SERE.2014.38","url":null,"abstract":"The importance of safety-critical systems is increasing, as seen with the terrible accidents recently occurring in nuclear power plants and with airplanes. To ensure the safety of those systems, system engineers should consider how to prevent system hazards during the design phase of system development. Although existing techniques such as event tree analysis and cause-consequence analysis provide various ways of hazard prevention for safety-critical systems, previous studies did not provide a solution for the situation where any two actions of hazard prevention collide. This paper suggests a collision analysis technique of safety device using fault prevention tree and resource map as a method to identify and analyze colliding actions. The proposed technique would help design robust systems to prevent hazards, and also fulfill the software requirement of safety in practical system development.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122874025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2014 Eighth International Conference on Software Security and Reliability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1