首页 > 最新文献

2014 Eighth International Conference on Software Security and Reliability最新文献

英文 中文
BinClone: Detecting Code Clones in Malware BinClone:检测恶意软件中的代码克隆
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.21
Mohammad Reza Farhadi, B. Fung, P. Charland, M. Debbabi
To gain an in-depth understanding of the behaviour of a malware, reverse engineers have to disassemble the malware, analyze the resulting assembly code, and then archive the commented assembly code in a malware repository for future reference. In this paper, we have developed an assembly code clone detection system called BinClone to identify the code clone fragments from a collection of malware binaries with the following major contributions. First, we introduce two deterministic clone detection methods with the goals of improving the recall rate and facilitating malware analysis. Second, our methods allow malware analysts to discover both exact and inexact clones at different token normalization levels. Third, we evaluate our proposed clone detection methods on real-life malware binaries. To the best of our knowledge, this is the first work that studies the problem of assembly code clone detection for malware analysis.
为了深入了解恶意软件的行为,逆向工程师必须反汇编恶意软件,分析产生的汇编代码,然后将注释的汇编代码归档到恶意软件存储库中,以备将来参考。在本文中,我们开发了一个名为BinClone的汇编代码克隆检测系统,用于从恶意软件二进制文件中识别代码克隆片段,主要贡献如下:首先,我们引入了两种确定性克隆检测方法,以提高召回率和方便恶意软件分析。其次,我们的方法允许恶意软件分析人员在不同的令牌规范化级别上发现精确和不精确的克隆。第三,我们在真实的恶意软件二进制文件中评估了我们提出的克隆检测方法。据我们所知,这是第一个研究恶意软件分析中汇编代码克隆检测问题的工作。
{"title":"BinClone: Detecting Code Clones in Malware","authors":"Mohammad Reza Farhadi, B. Fung, P. Charland, M. Debbabi","doi":"10.1109/SERE.2014.21","DOIUrl":"https://doi.org/10.1109/SERE.2014.21","url":null,"abstract":"To gain an in-depth understanding of the behaviour of a malware, reverse engineers have to disassemble the malware, analyze the resulting assembly code, and then archive the commented assembly code in a malware repository for future reference. In this paper, we have developed an assembly code clone detection system called BinClone to identify the code clone fragments from a collection of malware binaries with the following major contributions. First, we introduce two deterministic clone detection methods with the goals of improving the recall rate and facilitating malware analysis. Second, our methods allow malware analysts to discover both exact and inexact clones at different token normalization levels. Third, we evaluate our proposed clone detection methods on real-life malware binaries. To the best of our knowledge, this is the first work that studies the problem of assembly code clone detection for malware analysis.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123371772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Effective Regression Testing Using Requirements and Risks 使用需求和风险的有效回归测试
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.29
Charitha Hettiarachchi, Hyunsook Do, Byoungju Choi
The use of system requirements and their risks enables software testers to identify more important test cases that can reveal faults associated with risky components. Having identified those test cases, software testers can manage the testing schedule more effectively by running such test cases earlier so that they can fix faults sooner. Some work in this area has been done, but the previous approaches and studies have some limitations, such as an improper use of requirements risks in prioritization and an inadequate evaluation method. To address the limitations, we implemented a new requirements risk-based prioritization technique and evaluated it considering whether the proposed approach can detect faults earlier overall. It can also detect faults associated with risky components earlier. Our results indicate that the proposed approach is effective for detecting faults early and even better for finding faults associated with risky components of the system earlier than the existing techniques.
系统需求及其风险的使用使软件测试人员能够识别更重要的测试用例,这些测试用例可以揭示与风险组件相关的错误。在确定了那些测试用例之后,软件测试人员可以通过更早地运行这些测试用例来更有效地管理测试计划,这样他们就可以更快地修复错误。这方面的一些工作已经完成,但是以前的方法和研究有一些局限性,例如在优先级中不恰当地使用需求风险和不充分的评估方法。为了解决这些限制,我们实现了一种新的基于需求风险的优先级技术,并考虑所建议的方法是否能够更早地检测到故障,对其进行了评估。它还可以更早地检测与危险组件相关的故障。我们的研究结果表明,该方法可以有效地早期发现故障,甚至比现有技术更早地发现与系统风险组件相关的故障。
{"title":"Effective Regression Testing Using Requirements and Risks","authors":"Charitha Hettiarachchi, Hyunsook Do, Byoungju Choi","doi":"10.1109/SERE.2014.29","DOIUrl":"https://doi.org/10.1109/SERE.2014.29","url":null,"abstract":"The use of system requirements and their risks enables software testers to identify more important test cases that can reveal faults associated with risky components. Having identified those test cases, software testers can manage the testing schedule more effectively by running such test cases earlier so that they can fix faults sooner. Some work in this area has been done, but the previous approaches and studies have some limitations, such as an improper use of requirements risks in prioritization and an inadequate evaluation method. To address the limitations, we implemented a new requirements risk-based prioritization technique and evaluated it considering whether the proposed approach can detect faults earlier overall. It can also detect faults associated with risky components earlier. Our results indicate that the proposed approach is effective for detecting faults early and even better for finding faults associated with risky components of the system earlier than the existing techniques.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122620959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Generating Test Cases for Context-Aware Applications Using Bigraphs 使用图形为上下文感知应用程序生成测试用例
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.27
Lian Yu, W. Tsai, Yanbing Jiang, J. Gao
Context-aware applications often consist of a middleware and a collection of services, which run autonomously adaptive to the changing environments, where a variety of sensors are installed in physical facilities, with end-users moving around. Testing such context-aware applications is challenging due to the complex interactions among the components, especially for the complicated environment modeling. This paper extends a bigraphical sorting predicate logic as constraints to create a meta-model, builds a data model based on the bigraphical meta-model, and proposes to use the sorted bigraphical reaction system (BRS) to model the context-aware environments. Tracing the interactions between the BRS model and the middleware model generates the test cases to verify the interactions between the context-aware environments and the middleware together with the domain services. To decrease the number of test cases, this paper proposes a bigraphical pattern flow testing strategy. An example airport is demonstrated to show fault detection capabilities and reductions of test cases.
上下文感知应用程序通常由中间件和一组服务组成,这些服务自主运行,以适应不断变化的环境,其中各种传感器安装在物理设施中,最终用户四处移动。由于组件之间的复杂交互,特别是对于复杂的环境建模,测试此类上下文感知应用程序具有挑战性。本文扩展了一个排序谓词逻辑作为约束来创建元模型,在此基础上构建了一个数据模型,并提出使用排序排序反应系统(BRS)来建模上下文感知环境。跟踪BRS模型和中间件模型之间的交互会生成测试用例,以验证上下文感知环境和中间件以及域服务之间的交互。为了减少测试用例的数量,本文提出了一种图形模式流测试策略。演示了一个示例机场,以显示故障检测功能和测试用例的减少。
{"title":"Generating Test Cases for Context-Aware Applications Using Bigraphs","authors":"Lian Yu, W. Tsai, Yanbing Jiang, J. Gao","doi":"10.1109/SERE.2014.27","DOIUrl":"https://doi.org/10.1109/SERE.2014.27","url":null,"abstract":"Context-aware applications often consist of a middleware and a collection of services, which run autonomously adaptive to the changing environments, where a variety of sensors are installed in physical facilities, with end-users moving around. Testing such context-aware applications is challenging due to the complex interactions among the components, especially for the complicated environment modeling. This paper extends a bigraphical sorting predicate logic as constraints to create a meta-model, builds a data model based on the bigraphical meta-model, and proposes to use the sorted bigraphical reaction system (BRS) to model the context-aware environments. Tracing the interactions between the BRS model and the middleware model generates the test cases to verify the interactions between the context-aware environments and the middleware together with the domain services. To decrease the number of test cases, this paper proposes a bigraphical pattern flow testing strategy. An example airport is demonstrated to show fault detection capabilities and reductions of test cases.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124812639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
SeTGaM: Generalized Technique for Regression Testing Based on UML/OCL Models SeTGaM:基于UML/OCL模型的广义回归测试技术
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.28
Elizabeta Fourneret, J. Cantenot, F. Bouquet, B. Legeard, Julien Botella
In this paper we introduce SeTGaM, a Model-Based Regression Testing (MBRT) approach based on UML/OCL behavioral models. SeTGaM is a test selection and classification approach that also generates new tests to cover new functionalities of a new version of a system. We extract the behavior of the system from guards/transitions of state charts or pre/post conditions in operations of class diagrams to which we apply impact analysis. This makes it possible to apply our approach to models that use state charts and class diagrams or models without state charts (that only consist of class diagrams). This makes the technique applicable to a larger number of industrial systems. We also propose to reduce the number of false positive dependencies by using a constraint solver. We implemented our approach as plug in for IBM Rational Software Architect and evaluated the tool on two case study systems including an industrial system from the smart card domain. The evaluation confirms that the approach is effective in identifying changes and reducing the effort needed to test a new version of the system. The results also show that the approach is efficient with execution times between 2-3 minutes for most cases. SeTGaM was also able to precisely identify all modification revealing tests.
本文介绍了基于UML/OCL行为模型的基于模型的回归测试(MBRT)方法SeTGaM。SeTGaM是一种测试选择和分类方法,它还生成新的测试,以覆盖系统新版本的新功能。我们从状态图的守卫/转换或类图操作的前后条件中提取系统的行为,并对其应用影响分析。这使得将我们的方法应用于使用状态图和类图的模型或没有状态图的模型(仅由类图组成)成为可能。这使得该技术适用于更多的工业系统。我们还建议使用约束求解器来减少假阳性依赖的数量。我们将我们的方法作为IBM Rational Software Architect的插件来实现,并在两个案例研究系统(包括来自智能卡领域的工业系统)上评估了该工具。评估确认该方法在识别变更和减少测试系统新版本所需的工作量方面是有效的。结果还表明,该方法在大多数情况下执行时间在2-3分钟之间是有效的。SeTGaM还能够精确地识别所有显示修改的测试。
{"title":"SeTGaM: Generalized Technique for Regression Testing Based on UML/OCL Models","authors":"Elizabeta Fourneret, J. Cantenot, F. Bouquet, B. Legeard, Julien Botella","doi":"10.1109/SERE.2014.28","DOIUrl":"https://doi.org/10.1109/SERE.2014.28","url":null,"abstract":"In this paper we introduce SeTGaM, a Model-Based Regression Testing (MBRT) approach based on UML/OCL behavioral models. SeTGaM is a test selection and classification approach that also generates new tests to cover new functionalities of a new version of a system. We extract the behavior of the system from guards/transitions of state charts or pre/post conditions in operations of class diagrams to which we apply impact analysis. This makes it possible to apply our approach to models that use state charts and class diagrams or models without state charts (that only consist of class diagrams). This makes the technique applicable to a larger number of industrial systems. We also propose to reduce the number of false positive dependencies by using a constraint solver. We implemented our approach as plug in for IBM Rational Software Architect and evaluated the tool on two case study systems including an industrial system from the smart card domain. The evaluation confirms that the approach is effective in identifying changes and reducing the effort needed to test a new version of the system. The results also show that the approach is efficient with execution times between 2-3 minutes for most cases. SeTGaM was also able to precisely identify all modification revealing tests.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Rule-Based Test Input Generation from Bytecode 从字节码生成基于规则的测试输入
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.24
Weifeng Xu, Tao Ding, Dianxiang Xu
Search-based test generators, such as those using genetic algorithms and alternative variable methods, can automatically generate test inputs. They typically rely on fitness functions to calculate fitness scores for guiding the search process. This paper presents a novel rule-based testing (RBT) approach to automated generation of test inputs from Java byte code without using fitness functions. It extracts tagged paths from the control flow graph of given byte code, analyzes and monitors the predicates in the tagged paths at runtime, and generates test inputs using predefined rules. Our case studies show that RBT has outperformed the test input generators using genetic algorithms and alternative variable methods.
基于搜索的测试生成器,例如那些使用遗传算法和可选变量方法的测试生成器,可以自动生成测试输入。它们通常依靠适应度函数来计算适应度分数来指导搜索过程。本文提出了一种新的基于规则的测试(RBT)方法,在不使用适应度函数的情况下,从Java字节码自动生成测试输入。它从给定字节码的控制流图中提取标记路径,在运行时分析和监视标记路径中的谓词,并使用预定义的规则生成测试输入。我们的案例研究表明,RBT优于使用遗传算法和替代变量方法的测试输入生成器。
{"title":"Rule-Based Test Input Generation from Bytecode","authors":"Weifeng Xu, Tao Ding, Dianxiang Xu","doi":"10.1109/SERE.2014.24","DOIUrl":"https://doi.org/10.1109/SERE.2014.24","url":null,"abstract":"Search-based test generators, such as those using genetic algorithms and alternative variable methods, can automatically generate test inputs. They typically rely on fitness functions to calculate fitness scores for guiding the search process. This paper presents a novel rule-based testing (RBT) approach to automated generation of test inputs from Java byte code without using fitness functions. It extracts tagged paths from the control flow graph of given byte code, analyzes and monitors the predicates in the tagged paths at runtime, and generates test inputs using predefined rules. Our case studies show that RBT has outperformed the test input generators using genetic algorithms and alternative variable methods.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124146953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust 震网网络物理系统攻击的模态模型:信任问题
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.36
Gerry Howser, B. McMillin
Multiple Security Domains Nondeducibility, MSDND, yields results even when the attack hides important information from electronic monitors and human operators. Because MSDND is based upon modal frames, it is able to analyze the event system as it progresses rather than relying on traces of the system. Not only does it provide results as the system evolves, MSDND can point out attacks designed to be missed in other security models. This work examines information flow disruption attacks such as Stuxnet and formally explains the role that implicit trust in the cyber security of a cyber physical system (CPS) plays in the success of the attack. The fact that the attack hides behind MSDND can be used to help secure the system by modifications to break MSDND and leave the attack nowhere to hide. Modal operators are defined to allow the manipulation of belief and trust states within the model. We show how the attack hides and uses the operator's trust to remain undetected. In fact, trust in the CPS is key to the success of the attack.
即使攻击对电子监视器和人工操作人员隐藏了重要信息,不可演绎性(msdn)也能产生结果。因为msnd是基于模态框架的,所以它能够在事件系统进展时分析事件系统,而不是依赖于系统的轨迹。MSDND不仅可以在系统发展的过程中提供结果,还可以指出在其他安全模型中被设计错过的攻击。这项工作研究了信息流中断攻击,如震网病毒,并正式解释了对网络物理系统(CPS)网络安全的隐性信任在攻击成功中所起的作用。攻击隐藏在MSDND背后的事实可以用来帮助保护系统,通过修改来打破MSDND,使攻击无处可藏。定义模态操作符是为了允许在模型内操纵信念和信任状态。我们展示了攻击是如何隐藏的,并利用运营商的信任来保持不被发现。事实上,对CPS的信任是攻击成功的关键。
{"title":"A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust","authors":"Gerry Howser, B. McMillin","doi":"10.1109/SERE.2014.36","DOIUrl":"https://doi.org/10.1109/SERE.2014.36","url":null,"abstract":"Multiple Security Domains Nondeducibility, MSDND, yields results even when the attack hides important information from electronic monitors and human operators. Because MSDND is based upon modal frames, it is able to analyze the event system as it progresses rather than relying on traces of the system. Not only does it provide results as the system evolves, MSDND can point out attacks designed to be missed in other security models. This work examines information flow disruption attacks such as Stuxnet and formally explains the role that implicit trust in the cyber security of a cyber physical system (CPS) plays in the success of the attack. The fact that the attack hides behind MSDND can be used to help secure the system by modifications to break MSDND and leave the attack nowhere to hide. Modal operators are defined to allow the manipulation of belief and trust states within the model. We show how the attack hides and uses the operator's trust to remain undetected. In fact, trust in the CPS is key to the success of the attack.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"332 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132968602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Providing Hardware Redundancy for Highly Available Services in Virtualized Environments 为虚拟化环境下的高可用性业务提供硬件冗余
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.17
Azadeh Jahanbanifar, F. Khendek, M. Toeroe
High-Availability requires hardware and software redundancy. Virtualization is a technique - among others - for improving the utilization of hardware resources by making virtual (rather than actual) versions of hardware, operating system, etc. and collocating them on the same hardware. In virtualized environments virtual machines (VMs) are used for the deployment of the software entities. When VMs hosting redundant software entities providing and protecting some service are collocated on the same physical node, the hardware redundancy is lost and the failure of this physical node certainly leads to service outage. To achieve high availability, we need to avoid such single points of failure even in the presence of VM migration. This paper tackles this issue in the context of a standardized middleware for service high-availability.
高可用性需要硬件和软件冗余。虚拟化是一种技术,通过创建硬件、操作系统等的虚拟(而不是实际)版本,并将它们配置在相同的硬件上,从而提高硬件资源的利用率。在虚拟化环境中,虚拟机用于部署软件实体。当提供和保护某些服务的冗余软件实体的虚拟机部署在同一个物理节点上时,硬件冗余将丢失,该物理节点故障必然导致业务中断。为了实现高可用性,即使存在VM迁移,我们也需要避免这种单点故障。本文在服务高可用性的标准化中间件上下文中解决了这个问题。
{"title":"Providing Hardware Redundancy for Highly Available Services in Virtualized Environments","authors":"Azadeh Jahanbanifar, F. Khendek, M. Toeroe","doi":"10.1109/SERE.2014.17","DOIUrl":"https://doi.org/10.1109/SERE.2014.17","url":null,"abstract":"High-Availability requires hardware and software redundancy. Virtualization is a technique - among others - for improving the utilization of hardware resources by making virtual (rather than actual) versions of hardware, operating system, etc. and collocating them on the same hardware. In virtualized environments virtual machines (VMs) are used for the deployment of the software entities. When VMs hosting redundant software entities providing and protecting some service are collocated on the same physical node, the hardware redundancy is lost and the failure of this physical node certainly leads to service outage. To achieve high availability, we need to avoid such single points of failure even in the presence of VM migration. This paper tackles this issue in the context of a standardized middleware for service high-availability.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"123 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132399183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Security Test Generation by Answer Set Programming 基于答案集编程的安全测试生成
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.22
Philipp Zech, M. Felderer, Basel Katt, R. Breu
Security testing still is a hard task, especially if focusing on non-functional security testing. The two main reasons behind this are, first, at the most a lack of the necessary knowledge required for security testing, second, managing the almost infinite amount of negative test cases, which result from potential security risks. To the best of our knowledge, the issue of the automatic incorporation of security expert knowledge, e.g., known vulnerabilities, exploits and attacks, in the process of security testing is not well considered in the literature. Furthermore, well-known "de facto" security testing approaches, like fuzzing or penetration testing, lack systematic procedures regarding the order of execution of test cases, which renders security testing a cumbersome task. Hence, in this paper we propose a new method for generating negative security tests by logic programming, which applies a risk analysis to establish a set of negative requirements for later test generation.
安全性测试仍然是一项艰巨的任务,特别是关注非功能安全性测试时。这背后的两个主要原因是,第一,最多缺乏安全测试所需的必要知识,第二,管理几乎无限数量的负面测试用例,这是由潜在的安全风险造成的。据我们所知,在安全测试过程中自动纳入安全专家知识(例如,已知的漏洞、利用和攻击)的问题在文献中没有得到很好的考虑。此外,众所周知的“事实”安全性测试方法,如模糊测试或渗透测试,缺乏关于测试用例执行顺序的系统过程,这使得安全性测试成为一项繁琐的任务。因此,本文提出了一种通过逻辑编程生成负性安全测试的新方法,该方法利用风险分析来建立一组负性需求,供以后的测试生成使用。
{"title":"Security Test Generation by Answer Set Programming","authors":"Philipp Zech, M. Felderer, Basel Katt, R. Breu","doi":"10.1109/SERE.2014.22","DOIUrl":"https://doi.org/10.1109/SERE.2014.22","url":null,"abstract":"Security testing still is a hard task, especially if focusing on non-functional security testing. The two main reasons behind this are, first, at the most a lack of the necessary knowledge required for security testing, second, managing the almost infinite amount of negative test cases, which result from potential security risks. To the best of our knowledge, the issue of the automatic incorporation of security expert knowledge, e.g., known vulnerabilities, exploits and attacks, in the process of security testing is not well considered in the literature. Furthermore, well-known \"de facto\" security testing approaches, like fuzzing or penetration testing, lack systematic procedures regarding the order of execution of test cases, which renders security testing a cumbersome task. Hence, in this paper we propose a new method for generating negative security tests by logic programming, which applies a risk analysis to establish a set of negative requirements for later test generation.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133079393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems 云存储系统数据可靠性管理的博弈论策略分析
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.32
Chung-Yi Lin, Wen-Guey Tzeng
Replication is the simplest way to achieve data reliability in cloud storage systems. Nevertheless, replication incurs storage overhead to the cloud storage provider (CSP). To verify CSPs' reliability, users can audit CSPs with remote data integrity checking. However, the auditing incurs cost to users. Thus, CSPs and users involve a conflict situation, where users prefer less auditing and CSPs prefer less replication. In this paper, we provide a game-theoretic analysis to get optimal strategies for users and CSP. We use the pricing strategy adopted by Amazon S3 to explain our analysis. Our results show that a user should audit if CSP's reduced data copies are less than 1:81. If CSP believes lower user's staying probability, it should provide more discount or copies. According to this study, a user has the criterion for paying less auditing cost and CSP makes the reliability and pricing policy to keep users in business.
复制是云存储系统实现数据可靠性最简单的方式。然而,复制会给云存储提供商(CSP)带来存储开销。为了验证云服务提供商的可靠性,用户可以通过远程数据完整性校验对云服务提供商进行审计。但是,审计会给用户带来成本。因此,csp和用户会产生冲突,用户更喜欢少审计,而csp更喜欢少复制。本文采用博弈论的方法对用户和CSP进行了优化。我们使用Amazon S3采用的定价策略来解释我们的分析。我们的结果表明,如果CSP减少的数据副本小于1:81,用户应该进行审计。如果CSP认为用户的留存率较低,它应该提供更多的折扣或副本。根据本研究,用户具有支付较少审计成本的准则,CSP制定可靠性和定价策略以保持用户的业务。
{"title":"Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems","authors":"Chung-Yi Lin, Wen-Guey Tzeng","doi":"10.1109/SERE.2014.32","DOIUrl":"https://doi.org/10.1109/SERE.2014.32","url":null,"abstract":"Replication is the simplest way to achieve data reliability in cloud storage systems. Nevertheless, replication incurs storage overhead to the cloud storage provider (CSP). To verify CSPs' reliability, users can audit CSPs with remote data integrity checking. However, the auditing incurs cost to users. Thus, CSPs and users involve a conflict situation, where users prefer less auditing and CSPs prefer less replication. In this paper, we provide a game-theoretic analysis to get optimal strategies for users and CSP. We use the pricing strategy adopted by Amazon S3 to explain our analysis. Our results show that a user should audit if CSP's reduced data copies are less than 1:81. If CSP believes lower user's staying probability, it should provide more discount or copies. According to this study, a user has the criterion for paying less auditing cost and CSP makes the reliability and pricing policy to keep users in business.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems 基于代码的分布式存储系统低连接成本的可靠修复机制
Pub Date : 2014-06-30 DOI: 10.1109/SERE.2014.37
Hsiao-Ying Lin, Li-Ping Tung, B. Lin
Erasure codes are applied in distributed storage systems for fault-tolerance with lower storage overhead than replications. Later, decentralized erasure codes are proposed for decentralized or loosely-organized storage systems. Repair mechanisms aim at maintaining redundancy over time such that stored data are still retrievable. Two recent repair mechanisms, Noop and Coop, are designed for decentralized erasure code based distributed storage system to minimize connection cost in theoretical manner. We propose a generalized repair framework, which includes Noop and Coop as two extreme cases. We then investigate trade-off between connection cost and data retrievability from an experimental aspect in our repair framework. Our results show that a reasonable data retrievability is achievable with constant connection cost, which is less than previously analytical values. These results are valuable references for a system manager to build a reliable storage system with low connection cost.
Erasure code应用于分布式存储系统中,具有较低的存储开销和容错性。后来,分散的擦除码被提出用于分散或松散组织的存储系统。修复机制的目的是随着时间的推移保持冗余,这样存储的数据仍然是可检索的。Noop和Coop两种最新的修复机制是针对基于去中心化纠删码的分布式存储系统设计的,从理论上最小化了连接成本。我们提出了一个广义的修复框架,其中Noop和Coop是两个极端情况。然后,我们从修复框架的实验方面研究连接成本和数据可检索性之间的权衡。我们的研究结果表明,在保持连接成本不变的情况下,可以实现合理的数据可检索性,这比以前的分析值要小。这些结果为系统管理员构建可靠、低连接成本的存储系统提供了有价值的参考。
{"title":"Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage Systems","authors":"Hsiao-Ying Lin, Li-Ping Tung, B. Lin","doi":"10.1109/SERE.2014.37","DOIUrl":"https://doi.org/10.1109/SERE.2014.37","url":null,"abstract":"Erasure codes are applied in distributed storage systems for fault-tolerance with lower storage overhead than replications. Later, decentralized erasure codes are proposed for decentralized or loosely-organized storage systems. Repair mechanisms aim at maintaining redundancy over time such that stored data are still retrievable. Two recent repair mechanisms, Noop and Coop, are designed for decentralized erasure code based distributed storage system to minimize connection cost in theoretical manner. We propose a generalized repair framework, which includes Noop and Coop as two extreme cases. We then investigate trade-off between connection cost and data retrievability from an experimental aspect in our repair framework. Our results show that a reasonable data retrievability is achievable with constant connection cost, which is less than previously analytical values. These results are valuable references for a system manager to build a reliable storage system with low connection cost.","PeriodicalId":248957,"journal":{"name":"2014 Eighth International Conference on Software Security and Reliability","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 Eighth International Conference on Software Security and Reliability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1