首页 > 最新文献

2019 26th Asia-Pacific Software Engineering Conference (APSEC)最新文献

英文 中文
Adaptive Random Testing for XSS Vulnerability XSS漏洞的自适应随机测试
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00018
Chengcheng Lv, Long Zhang, Fanping Zeng, Jian Zhang
XSS is one of the common vulnerabilities in web applications. Many black-box testing tools may collect a large number of payloads and traverse them to find a payload that can be successfully injected, but they are not very efficient. And previous research has paid less attention to how to improve the efficiency of black-box testing to detect XSS vulnerability. To improve the efficiency of testing, we develop an XSS testing tool. It collects 6128 payloads and uses a headless browser to detect XSS vulnerability. The tool can discover XSS vulnerability quickly with the ART(Adaptive Random Testing) method. We conduct an experiment using 3 extensively adopted open source vulnerable benchmarks and 2 actual websites to evaluate the ART method. The experimental results indicate that the ART method can effectively improve the fuzzing method by more than 27.1% in reducing the number of attempts before accomplishing a successful injection.
XSS是web应用程序中常见的漏洞之一。许多黑盒测试工具可能会收集大量的有效载荷,并遍历它们以找到可以成功注入的有效载荷,但它们的效率并不高。而对于如何提高黑盒测试检测跨站攻击漏洞的效率,以往的研究较少关注。为了提高测试效率,我们开发了XSS测试工具。它收集6128个有效负载,并使用无头浏览器检测XSS漏洞。该工具采用ART(Adaptive Random Testing,自适应随机测试)方法快速发现跨站攻击漏洞。我们使用3个广泛采用的开源漏洞基准和2个实际网站进行实验来评估ART方法。实验结果表明,ART方法在减少成功注射前的尝试次数方面,比模糊方法有效地提高了27.1%以上。
{"title":"Adaptive Random Testing for XSS Vulnerability","authors":"Chengcheng Lv, Long Zhang, Fanping Zeng, Jian Zhang","doi":"10.1109/APSEC48747.2019.00018","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00018","url":null,"abstract":"XSS is one of the common vulnerabilities in web applications. Many black-box testing tools may collect a large number of payloads and traverse them to find a payload that can be successfully injected, but they are not very efficient. And previous research has paid less attention to how to improve the efficiency of black-box testing to detect XSS vulnerability. To improve the efficiency of testing, we develop an XSS testing tool. It collects 6128 payloads and uses a headless browser to detect XSS vulnerability. The tool can discover XSS vulnerability quickly with the ART(Adaptive Random Testing) method. We conduct an experiment using 3 extensively adopted open source vulnerable benchmarks and 2 actual websites to evaluate the ART method. The experimental results indicate that the ART method can effectively improve the fuzzing method by more than 27.1% in reducing the number of attempts before accomplishing a successful injection.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117067113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
APSEC 2019 Steering Committee and Emeritus Members APSEC 2019指导委员会和荣誉会员
Pub Date : 2019-12-01 DOI: 10.1109/apsec48747.2019.00008
W. C. Chu
Steering Committee Chair: Sooyong Park, Sogang University, Korea Muhammad Ali Babar, University of Adelaide, Australia Sundeok (Steve) Char, Korea University, Korea William C. Chu, Tung Hai University, Taiwan Jin Song Dong, National University of Singapore, Singapore Jun Han, Swinburne University of Technology, Australia Jackey Keung, City University of Hong Kong, Hong Kong Karl R. P. H. Leung, Hong Kong Institute of Vocational Education, Hong Kong Deron Liang, National Central University, Taiwan Katsuhisa Maruyama, Ritsumeikan University, Japan Pornsiri Muenchaisri, Chulalonghorn University, Thailand Danny Poo, National University of Singapore, Singapore Steve Reeves, The University of Waikato, New Zealand Shamsul Sahibuddin, Universiti Teknologi Malaysia, Malaysia Ashish Sureka, Indraprastha Institute of Information Technology Delhi IIITD, India Hironori Washizaki, Waseda University, Japan He (Jason) Zhang, Nanjing University, China
指导委员会主席:朴秀勇、西江大学、韩国穆罕默德·阿里·巴巴、阿德莱德大学、澳大利亚Sundeok (Steve) Char、高丽大学、韩国William C. Chu、东海大学、台湾董劲松、新加坡国立大学、新加坡韩俊、斯威本科技大学、澳大利亚蒋耀基、香港城市大学、香港Karl r.p. H. Leung、香港专业教育学院、香港梁德隆、中央大学、台湾Maruyama胜久、立命馆大学,日本Pornsiri Muenchaisri,朱拉隆功大学,泰国Danny Poo,新加坡国立大学,新加坡Steve Reeves,怀卡托大学,新西兰Shamsul Sahibuddin,马来西亚理工大学,马来西亚Ashish Sureka, Indraprastha德里信息技术研究所IIITD,印度Hironori Washizaki,早稻田大学,日本He (Jason) Zhang,南京大学,中国
{"title":"APSEC 2019 Steering Committee and Emeritus Members","authors":"W. C. Chu","doi":"10.1109/apsec48747.2019.00008","DOIUrl":"https://doi.org/10.1109/apsec48747.2019.00008","url":null,"abstract":"Steering Committee Chair: Sooyong Park, Sogang University, Korea Muhammad Ali Babar, University of Adelaide, Australia Sundeok (Steve) Char, Korea University, Korea William C. Chu, Tung Hai University, Taiwan Jin Song Dong, National University of Singapore, Singapore Jun Han, Swinburne University of Technology, Australia Jackey Keung, City University of Hong Kong, Hong Kong Karl R. P. H. Leung, Hong Kong Institute of Vocational Education, Hong Kong Deron Liang, National Central University, Taiwan Katsuhisa Maruyama, Ritsumeikan University, Japan Pornsiri Muenchaisri, Chulalonghorn University, Thailand Danny Poo, National University of Singapore, Singapore Steve Reeves, The University of Waikato, New Zealand Shamsul Sahibuddin, Universiti Teknologi Malaysia, Malaysia Ashish Sureka, Indraprastha Institute of Information Technology Delhi IIITD, India Hironori Washizaki, Waseda University, Japan He (Jason) Zhang, Nanjing University, China","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122038374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably 见证:广泛且可验证地检测Android应用程序中的漏洞
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00065
Hongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie
Existing studies on detecting vulnerabilities in apps have two main disadvantages: one is that some studies are limited to detecting a certain vulnerability and lack comprehensive analysis; the other is the lack of valid evidence for vulnerability verification, which leads to high false alarms rate and requires massive manual efforts. We propose the concept of vulnerability pattern to abstract the characteristics of different attacks, e.g., their prerequisites and attack paths, so as to support detecting multiple kinds of vulnerabilities. Also, we present a zero false alarms framework which can find vulnerability instances precisely and generate test cases and triggers to validate the findings, by combing static analysis and dynamic binary instrumentation techniques. We implement our method in a tool named Witness, which currently can detect 8 different types of vulnerabilities and is extensible to support more. Evaluated on 3211 popular apps, Witness successfully detected 243 vulnerability instances, with better precision and more proofs than four existing tools.
现有的应用漏洞检测研究主要存在两大不足:一是部分研究局限于检测某个漏洞,缺乏全面分析;二是缺乏有效的漏洞验证证据,导致虚警率高,需要大量的人工工作。我们提出了漏洞模式的概念,对不同攻击的特征进行抽象,如攻击的前提条件、攻击路径等,从而支持检测多种漏洞。同时,结合静态分析和动态二进制检测技术,提出了一个零虚警框架,该框架可以精确地发现漏洞实例,并生成测试用例和触发器来验证发现的漏洞。我们在一个名为Witness的工具中实现了我们的方法,该工具目前可以检测8种不同类型的漏洞,并且可以扩展以支持更多。在3211个流行的应用程序中,Witness成功检测到243个漏洞实例,比现有的四个工具具有更高的精度和更多的证据。
{"title":"Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably","authors":"Hongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie","doi":"10.1109/APSEC48747.2019.00065","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00065","url":null,"abstract":"Existing studies on detecting vulnerabilities in apps have two main disadvantages: one is that some studies are limited to detecting a certain vulnerability and lack comprehensive analysis; the other is the lack of valid evidence for vulnerability verification, which leads to high false alarms rate and requires massive manual efforts. We propose the concept of vulnerability pattern to abstract the characteristics of different attacks, e.g., their prerequisites and attack paths, so as to support detecting multiple kinds of vulnerabilities. Also, we present a zero false alarms framework which can find vulnerability instances precisely and generate test cases and triggers to validate the findings, by combing static analysis and dynamic binary instrumentation techniques. We implement our method in a tool named Witness, which currently can detect 8 different types of vulnerabilities and is extensible to support more. Evaluated on 3211 popular apps, Witness successfully detected 243 vulnerability instances, with better precision and more proofs than four existing tools.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis 流、语境、场和准路径敏感点的必要性和能力分析
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00044
Yuexing Wang, Min Zhou, M. Gu, Jiaguang Sun
Precise pointer analysis is desired since many program analyses benefit from it both in precision and performance. There are several dimensions of pointer analysis precision, flow sensitivity, context sensitivity, field sensitivity and path sensitivity. The more dimensions a pointer analysis considers, the more accurate its results will be. However, considering all dimensions is difficult because the trade-off between precision and efficiency should be balanced. This paper presents a flow, context, field and quasi path sensitive pointer analysis algorithm for C programs. Our algorithm runs on a control flow automaton, a key structure for our analysis to be flow sensitive. During the analysis process, we use function summaries to get context information. Elements of aggregate structures are handled to improve precision. We collect path conditions to filter unreachable paths and make all points-to relations gated. For efficiency, we propose a multi-entry mechanism. The algorithm is implemented in TsmartGP, which is an extension of CPAchecker. Our algorithm is compared with some state-of-the-art algorithms and TsmartGP is compared with cppcheck and Clang Static Analyzer by detecting uninitialized pointer errors in 13 real-world applications. The experimental results show that our algorithm is more accurate and TsmartGP can find more errors than other tools.
精确的指针分析是需要的,因为许多程序分析在精度和性能上都受益于它。指针分析精度、流程灵敏度、上下文灵敏度、字段灵敏度和路径灵敏度有几个维度。指针分析考虑的维度越多,其结果就越准确。然而,考虑所有维度是困难的,因为必须在精度和效率之间进行权衡。本文提出了一种C程序的流、上下文、域和准路径敏感指针分析算法。我们的算法运行在一个控制流自动机上,这是我们分析流敏感的关键结构。在分析过程中,我们使用函数摘要来获取上下文信息。对集料结构的元素进行处理以提高精度。我们收集路径条件来过滤不可达的路径,并对所有点到关系进行门控。为了提高效率,我们提出了一个多入口机制。该算法在TsmartGP中实现,TsmartGP是CPAchecker的扩展。通过在13个实际应用程序中检测未初始化的指针错误,将我们的算法与一些最先进的算法进行比较,并将TsmartGP与cppcheck和Clang Static Analyzer进行比较。实验结果表明,我们的算法比其他工具更准确,TsmartGP可以发现更多的错误。
{"title":"Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis","authors":"Yuexing Wang, Min Zhou, M. Gu, Jiaguang Sun","doi":"10.1109/APSEC48747.2019.00044","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00044","url":null,"abstract":"Precise pointer analysis is desired since many program analyses benefit from it both in precision and performance. There are several dimensions of pointer analysis precision, flow sensitivity, context sensitivity, field sensitivity and path sensitivity. The more dimensions a pointer analysis considers, the more accurate its results will be. However, considering all dimensions is difficult because the trade-off between precision and efficiency should be balanced. This paper presents a flow, context, field and quasi path sensitive pointer analysis algorithm for C programs. Our algorithm runs on a control flow automaton, a key structure for our analysis to be flow sensitive. During the analysis process, we use function summaries to get context information. Elements of aggregate structures are handled to improve precision. We collect path conditions to filter unreachable paths and make all points-to relations gated. For efficiency, we propose a multi-entry mechanism. The algorithm is implemented in TsmartGP, which is an extension of CPAchecker. Our algorithm is compared with some state-of-the-art algorithms and TsmartGP is compared with cppcheck and Clang Static Analyzer by detecting uninitialized pointer errors in 13 real-world applications. The experimental results show that our algorithm is more accurate and TsmartGP can find more errors than other tools.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131455162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VISION: Evaluating Scenario Suitableness for DNN Models by Mirror Synthesis VISION:通过镜像合成评估DNN模型的场景适用性
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00020
Ziqi Chen, Huiyan Wang, Chang Xu, Xiaoxing Ma, Chun Cao
Software systems assisted with deep neural networks (DNNs) are gaining increasing popularities. However, one outstanding problem is to judge whether a given application scenario suits a DNN model, whose answer highly affects its concerned system's performance. Existing work indirectly addressed this problem by seeking for higher test coverage or generating adversarial inputs. One pioneering work is SynEva, which exactly addressed this problem by synthesizing mirror programs for scenario suitableness evaluation of general machine learning programs, but fell short in supporting DNN models. In this paper, we propose VISION to eValuatIng Scenario suItableness fOr DNN models, specially catered for DNN characteristics. We conducted experiments on a real-world self-driving dataset Udacity, and the results show that VISION was effective in evaluating scenario suitableness for DNN models with an accuracy of 75.6–89.0% as compared to that of SynEva, 50.0–81.8%. We also explored different meta-models in VISION, and found out that the decision tree logic learner meta-model could be the best one for balancing VISION's effectiveness and efficiency.
基于深度神经网络(dnn)的软件系统越来越受欢迎。然而,一个突出的问题是如何判断给定的应用场景是否适合深度神经网络模型,这个问题的答案对所涉及的系统性能有很大的影响。现有的工作通过寻求更高的测试覆盖率或生成对抗性的输入间接地解决了这个问题。SynEva是一个开创性的工作,它通过合成镜像程序来评估通用机器学习程序的场景适用性,从而准确地解决了这个问题,但在支持深度神经网络模型方面做得不够。在本文中,我们提出了VISION来评估深度神经网络模型的场景适用性,专门针对深度神经网络的特点。我们在一个真实的自动驾驶数据集Udacity上进行了实验,结果表明VISION在评估DNN模型的场景适用性方面是有效的,准确率为75.6-89.0%,而SynEva的准确率为50.0-81.8%。我们还探索了VISION中不同的元模型,发现决策树逻辑学习者元模型是平衡VISION有效性和效率的最佳模型。
{"title":"VISION: Evaluating Scenario Suitableness for DNN Models by Mirror Synthesis","authors":"Ziqi Chen, Huiyan Wang, Chang Xu, Xiaoxing Ma, Chun Cao","doi":"10.1109/APSEC48747.2019.00020","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00020","url":null,"abstract":"Software systems assisted with deep neural networks (DNNs) are gaining increasing popularities. However, one outstanding problem is to judge whether a given application scenario suits a DNN model, whose answer highly affects its concerned system's performance. Existing work indirectly addressed this problem by seeking for higher test coverage or generating adversarial inputs. One pioneering work is SynEva, which exactly addressed this problem by synthesizing mirror programs for scenario suitableness evaluation of general machine learning programs, but fell short in supporting DNN models. In this paper, we propose VISION to eValuatIng Scenario suItableness fOr DNN models, specially catered for DNN characteristics. We conducted experiments on a real-world self-driving dataset Udacity, and the results show that VISION was effective in evaluating scenario suitableness for DNN models with an accuracy of 75.6–89.0% as compared to that of SynEva, 50.0–81.8%. We also explored different meta-models in VISION, and found out that the decision tree logic learner meta-model could be the best one for balancing VISION's effectiveness and efficiency.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134358044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware 基于硬件的标记内存缓解面向数据攻击的一种实用方案
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00036
Mengyu Ma, Liwei Chen, Gang Shi
The widespread deployment of unsafe programming languages such as C and C++, leaves many programs vulnerable to memory corruption attacks. With the continuous improvement of control-flow hijacking defense methods, recent works on data-oriented attacks including Data-oriented Exploits (DOE), Data-oriented Programming (DOP), and Block-oriented Programming (BOP) have been showed that these attacks can cause significant threat even in the presence of control-flow defense mechanism. Moreover, DFI (Date Flow Integrity) is a software-only approach for mitigating data-oriented attacks, while it incurs a 104% performance overhead. There are no suitable defense methods for such attacks as yet. In this paper, we propose Dam, a practical scheme to mitigate data-oriented attacks with tagged memory based on hardware. Dam is a novel approach using the idea of tagged memory to break data-flow stitching and gadgets dispatcher of generating data-oriented attacks rather than complete DFI. By enforcing security checking on memory access, Dam eliminates two requirements in constructing a valid data-oriented attack. We have implemented Dam by extending lowRISC, a RISC-V based SoC (System of a Chip) that implements tagged memory. And our evaluation results show that our scheme has an average performance cost of 6.48%, while Dam provides source compatibility and strong security.
不安全编程语言(如C和c++)的广泛部署,使许多程序容易受到内存损坏攻击。随着控制流劫持防御方法的不断完善,近年来对面向数据的攻击,包括面向数据的攻击(DOE)、面向数据的编程(DOP)和面向块的编程(BOP)的研究表明,即使存在控制流防御机制,这些攻击也会造成重大威胁。此外,DFI(日期流完整性)是一种仅用于减轻面向数据攻击的软件方法,但它会导致104%的性能开销。对于这种攻击,目前还没有合适的防御方法。在本文中,我们提出了一种基于硬件的标记内存来缓解面向数据攻击的实用方案Dam。Dam是一种新颖的方法,使用标记内存的思想来中断数据流拼接,并使调度程序产生面向数据的攻击,而不是完全的DFI。通过对内存访问进行安全检查,Dam消除了构造有效的面向数据攻击的两个要求。我们通过扩展lowRISC实现了Dam, lowRISC是一种基于RISC-V的SoC(芯片系统),实现了标记内存。我们的评估结果表明,我们的方案平均性能成本为6.48%,而Dam提供了源代码兼容性和强大的安全性。
{"title":"Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware","authors":"Mengyu Ma, Liwei Chen, Gang Shi","doi":"10.1109/APSEC48747.2019.00036","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00036","url":null,"abstract":"The widespread deployment of unsafe programming languages such as C and C++, leaves many programs vulnerable to memory corruption attacks. With the continuous improvement of control-flow hijacking defense methods, recent works on data-oriented attacks including Data-oriented Exploits (DOE), Data-oriented Programming (DOP), and Block-oriented Programming (BOP) have been showed that these attacks can cause significant threat even in the presence of control-flow defense mechanism. Moreover, DFI (Date Flow Integrity) is a software-only approach for mitigating data-oriented attacks, while it incurs a 104% performance overhead. There are no suitable defense methods for such attacks as yet. In this paper, we propose Dam, a practical scheme to mitigate data-oriented attacks with tagged memory based on hardware. Dam is a novel approach using the idea of tagged memory to break data-flow stitching and gadgets dispatcher of generating data-oriented attacks rather than complete DFI. By enforcing security checking on memory access, Dam eliminates two requirements in constructing a valid data-oriented attack. We have implemented Dam by extending lowRISC, a RISC-V based SoC (System of a Chip) that implements tagged memory. And our evaluation results show that our scheme has an average performance cost of 6.48%, while Dam provides source compatibility and strong security.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115226158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-Objective Configuration Sampling for Performance Ranking in Configurable Systems 面向可配置系统性能排序的多目标配置抽样
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00029
Y. Gu, Yuntianyi Chen, Xiangyang Jia, J. Xuan
The problem of performance ranking in configurable systems is to find the optimal (near-optimal) configurations with the best performance. This problem is challenging due to the large search space of potential configurations and the cost of manually examining configurations. Existing methods, such as the rank-based method, use a progressive strategy to sample configurations to reduce the cost of examining configurations. This sampling strategy is guided by frequent and random trials and may fail in balancing the number of samples and the ranking difference (i.e., the minimum of actual ranks in the predicted ranking). In this paper, we proposed a sampling method, namely MoConfig, which uses multi-objective optimization to minimize the number of samples and the ranking difference. Each solution in MoConfig is a sampling set of configurations and can be directly used as the input of existing methods of performance ranking. We conducted experiments on 20 datasets from real-world configurable systems. Experimental results demonstrate that MoConfig can sample fewer configurations and rank better than the existing rank-based method. We also compared the results by four algorithms of multi-objective optimization and found that NSGA-II performs well. Our proposed method can be used to improve the ranking difference and reduce the number of samples in building predictive models of performance ranking.
在可配置系统中进行性能排序的问题是找到具有最佳性能的最优(接近最优)配置。由于潜在配置的巨大搜索空间和手动检查配置的成本,这个问题具有挑战性。现有的方法,如基于秩的方法,使用渐进式策略对配置进行采样,以减少检查配置的成本。这种抽样策略以频繁和随机的试验为指导,可能无法平衡样本数量和排名差异(即预测排名中实际排名的最小值)。在本文中,我们提出了一种采样方法,即MoConfig,它使用多目标优化来最小化样本数量和排名差异。MoConfig中的每个解决方案都是配置的采样集,可以直接用作现有性能排名方法的输入。我们对来自现实世界可配置系统的20个数据集进行了实验。实验结果表明,与现有的基于秩的方法相比,MoConfig可以采样更少的配置,并且排序更好。我们还比较了4种多目标优化算法的结果,发现NSGA-II具有较好的性能。在构建性能排名预测模型时,我们提出的方法可以改善排名差异,减少样本数量。
{"title":"Multi-Objective Configuration Sampling for Performance Ranking in Configurable Systems","authors":"Y. Gu, Yuntianyi Chen, Xiangyang Jia, J. Xuan","doi":"10.1109/APSEC48747.2019.00029","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00029","url":null,"abstract":"The problem of performance ranking in configurable systems is to find the optimal (near-optimal) configurations with the best performance. This problem is challenging due to the large search space of potential configurations and the cost of manually examining configurations. Existing methods, such as the rank-based method, use a progressive strategy to sample configurations to reduce the cost of examining configurations. This sampling strategy is guided by frequent and random trials and may fail in balancing the number of samples and the ranking difference (i.e., the minimum of actual ranks in the predicted ranking). In this paper, we proposed a sampling method, namely MoConfig, which uses multi-objective optimization to minimize the number of samples and the ranking difference. Each solution in MoConfig is a sampling set of configurations and can be directly used as the input of existing methods of performance ranking. We conducted experiments on 20 datasets from real-world configurable systems. Experimental results demonstrate that MoConfig can sample fewer configurations and rank better than the existing rank-based method. We also compared the results by four algorithms of multi-objective optimization and found that NSGA-II performs well. Our proposed method can be used to improve the ranking difference and reduce the number of samples in building predictive models of performance ranking.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117188063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Message from the APSEC 2019 General Chair APSEC 2019主席致辞
Pub Date : 2019-12-01 DOI: 10.1109/apsec48747.2019.00005
{"title":"Message from the APSEC 2019 General Chair","authors":"","doi":"10.1109/apsec48747.2019.00005","DOIUrl":"https://doi.org/10.1109/apsec48747.2019.00005","url":null,"abstract":"","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prioritization Method for SPL Pairwise Testing Based on User Profiles 基于用户配置文件的SPL成对测试优先级排序方法
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00025
Hirofumi Akimoto, Yuto Isogami, Takashi Kitamura, N. Noda, T. Kishi
In Software Product Line (SPL) development, one of promising techniques for core asset testing is to test a subset of SPL as representative products. SPL pairwise testing is a such technique in which each product corresponds to a possible feature configuration in the feature model (FM) and representative products are selected so as to all possible feature pairs are included. It is also important to prioritize representative products, because it could improve the effectiveness of core asset testing especially when the testing resource is limited. In this paper, we propose a prioritization method for SPL pairwise testing based on user profiles. A user profile is a set of user groups and their occurrence probabilities such as the percentages of user groups in a market that use specific devices, applications or services. These profiles are used as the probabilities of feature choices at decision points such as optional features and alternative features in a FM. Based on that, we calculate the probability for obtaining a feature pairs (PFP for short), and generate representative products with priority. Most researches relate to the probabilities about FM handle the probability for obtaining a single feature (PSF for short). Based on PSF, we could estimate PFP. However, this estimation is not appropriate for the prioritization especially when conditional probabilities appear in user profiles. In our method, we directly calculate PFP and determine the priorities. We evaluate the method to show advantages of prioritizations using PFP over those using PSF, and also analyze the characteristics of the method.
在软件产品线(SPL)开发中,一个很有前途的核心资产测试技术是将SPL的一个子集作为代表性产品进行测试。SPL成对测试是一种将每个产品对应于特征模型(FM)中可能的特征配置,并选择有代表性的产品,从而包括所有可能的特征对的技术。确定代表性产品的优先级也很重要,因为它可以提高核心资产测试的有效性,尤其是在测试资源有限的情况下。在本文中,我们提出了一种基于用户配置文件的SPL成对测试的优先级方法。用户配置文件是一组用户组及其出现概率,例如在市场中使用特定设备、应用程序或服务的用户组的百分比。这些概要文件用作决策点(如FM中的可选特征和可选特征)的特征选择概率。在此基础上,计算获得特征对的概率(简称PFP),生成具有优先级的代表性产品。大多数关于调频概率的研究都是处理获得单个特征的概率(简称PSF)。基于PSF,我们可以估计PFP。然而,这种估计不适用于优先级排序,特别是当条件概率出现在用户配置文件中时。在我们的方法中,我们直接计算PFP并确定优先级。我们对该方法进行了评估,以显示使用PFP的优先级优于使用PSF的优先级,并分析了该方法的特点。
{"title":"A Prioritization Method for SPL Pairwise Testing Based on User Profiles","authors":"Hirofumi Akimoto, Yuto Isogami, Takashi Kitamura, N. Noda, T. Kishi","doi":"10.1109/APSEC48747.2019.00025","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00025","url":null,"abstract":"In Software Product Line (SPL) development, one of promising techniques for core asset testing is to test a subset of SPL as representative products. SPL pairwise testing is a such technique in which each product corresponds to a possible feature configuration in the feature model (FM) and representative products are selected so as to all possible feature pairs are included. It is also important to prioritize representative products, because it could improve the effectiveness of core asset testing especially when the testing resource is limited. In this paper, we propose a prioritization method for SPL pairwise testing based on user profiles. A user profile is a set of user groups and their occurrence probabilities such as the percentages of user groups in a market that use specific devices, applications or services. These profiles are used as the probabilities of feature choices at decision points such as optional features and alternative features in a FM. Based on that, we calculate the probability for obtaining a feature pairs (PFP for short), and generate representative products with priority. Most researches relate to the probabilities about FM handle the probability for obtaining a single feature (PSF for short). Based on PSF, we could estimate PFP. However, this estimation is not appropriate for the prioritization especially when conditional probabilities appear in user profiles. In our method, we directly calculate PFP and determine the priorities. We evaluate the method to show advantages of prioritizations using PFP over those using PSF, and also analyze the characteristics of the method.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128198925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Formalizing Architectural Rules with Ontologies - An Industrial Evaluation 用本体形式化体系结构规则——一种工业评价
Pub Date : 2019-12-01 DOI: 10.1109/APSEC48747.2019.00017
Sandra Schröder, Georg Buchgeher
Architecture conformance checking is an important means for quality control to assess that the system implementation adheres to its defined software architecture. Ideally, this process is automated to support continuous quality control. Many different approaches exist for automated conformance checking. However, these approaches are often limited in terms of supported concepts for describing and analyzing software architectures. We have developed an ontology-based approach that seeks to overcome the limited expressiveness of existing approaches. As a frontend of the formalism, we provide a Controlled Natural Language. In this paper, we present an industrial validation of the approach. For this, we collected architectural rules from three industrial projects. In total, we discovered 56 architectural rules in the projects. We successfully formalized 80% of those architectural rules. Additionally, we discussed the formalization with the corresponding software architect of each project. We found that the original intention of each architectural rule is properly reflected in the formalization. The results of the study show that projects could greatly benefit from applying an ontology-based approach, since it helps to precisely define and preserve concepts throughout the development process.
体系结构一致性检查是质量控制评估系统实现是否符合其定义的软件体系结构的重要手段。理想情况下,这个过程是自动化的,以支持持续的质量控制。存在许多不同的自动化一致性检查方法。然而,这些方法在描述和分析软件架构所支持的概念方面经常受到限制。我们开发了一种基于本体的方法,旨在克服现有方法的有限表达性。作为形式主义的前端,我们提供了一种受控的自然语言。在本文中,我们提出了该方法的工业验证。为此,我们从三个工业项目中收集了建筑规则。总的来说,我们在项目中发现了56条建筑规则。我们成功地形式化了80%的架构规则。此外,我们还与每个项目的相应软件架构师讨论了形式化。我们发现,每条架构规则的初衷都在形式化中得到了恰当的体现。研究结果表明,项目可以从应用基于本体的方法中获益,因为它有助于在整个开发过程中精确地定义和保存概念。
{"title":"Formalizing Architectural Rules with Ontologies - An Industrial Evaluation","authors":"Sandra Schröder, Georg Buchgeher","doi":"10.1109/APSEC48747.2019.00017","DOIUrl":"https://doi.org/10.1109/APSEC48747.2019.00017","url":null,"abstract":"Architecture conformance checking is an important means for quality control to assess that the system implementation adheres to its defined software architecture. Ideally, this process is automated to support continuous quality control. Many different approaches exist for automated conformance checking. However, these approaches are often limited in terms of supported concepts for describing and analyzing software architectures. We have developed an ontology-based approach that seeks to overcome the limited expressiveness of existing approaches. As a frontend of the formalism, we provide a Controlled Natural Language. In this paper, we present an industrial validation of the approach. For this, we collected architectural rules from three industrial projects. In total, we discovered 56 architectural rules in the projects. We successfully formalized 80% of those architectural rules. Additionally, we discussed the formalization with the corresponding software architect of each project. We found that the original intention of each architectural rule is properly reflected in the formalization. The results of the study show that projects could greatly benefit from applying an ontology-based approach, since it helps to precisely define and preserve concepts throughout the development process.","PeriodicalId":325642,"journal":{"name":"2019 26th Asia-Pacific Software Engineering Conference (APSEC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 26th Asia-Pacific Software Engineering Conference (APSEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1