Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00081
Md Jobair Hossain Faruk, Mohammad Masum, H. Shahriar, K. Qian, D. Lo
The primary goal of the authentic learning provides students with an engaging and motivating learning environment for students with hands-on experiences in solving real-world security problems. Each learning topic consists of pre-lab, lab, and post-lab (Pre/Lab/Post) activities. With an authentic learning approach, we design and develop portable labware on Google CoLab for ML for ransomware detection and prevention so that students can access and practice these hands-on labs anywhere and anytime without time tedious installation and configuration which will help students more focus on learning of concepts and getting more experience for hands-on problem-solving skills.
{"title":"Authentic Learning of Machine Learning to Ransomware Detection and Prevention","authors":"Md Jobair Hossain Faruk, Mohammad Masum, H. Shahriar, K. Qian, D. Lo","doi":"10.1109/COMPSAC54236.2022.00081","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00081","url":null,"abstract":"The primary goal of the authentic learning provides students with an engaging and motivating learning environment for students with hands-on experiences in solving real-world security problems. Each learning topic consists of pre-lab, lab, and post-lab (Pre/Lab/Post) activities. With an authentic learning approach, we design and develop portable labware on Google CoLab for ML for ransomware detection and prevention so that students can access and practice these hands-on labs anywhere and anytime without time tedious installation and configuration which will help students more focus on learning of concepts and getting more experience for hands-on problem-solving skills.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00107
Natsumi Matsui, Ayumi Ohnishi, T. Terada, M. Tsukamoto
Curling irons can create curled hair by heating it. However, because the operation of the curling iron involves six degrees of freedom (6DoF) movements, such as translation and rotation, it is difficult to understand and reproduce by simply watching instructional videos. In this study, we proposed Color-Path, a smart mirror-shaped system that allows users to easily understand how to move a curling iron. The proposed system acquires the moving paths of the curling iron using a camera on a smart mirror and an accelerometer on the curling iron. The system displays the curling iron paths of the target hairstyle on a smart mirror in Augmented Reality (AR). From the evaluation experiments, we confirmed that the system contributed to the reproduction of the moving paths of the curling iron through quantitative evaluation. However, a subjective evaluation showed that our system could not reproduce the appearance of the target hairstyle. The results indicate that the time to heat the hair should be considered.
{"title":"Color-Path: Hair Arrangement Reproduction Support System by Displaying Target Motion in AR","authors":"Natsumi Matsui, Ayumi Ohnishi, T. Terada, M. Tsukamoto","doi":"10.1109/COMPSAC54236.2022.00107","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00107","url":null,"abstract":"Curling irons can create curled hair by heating it. However, because the operation of the curling iron involves six degrees of freedom (6DoF) movements, such as translation and rotation, it is difficult to understand and reproduce by simply watching instructional videos. In this study, we proposed Color-Path, a smart mirror-shaped system that allows users to easily understand how to move a curling iron. The proposed system acquires the moving paths of the curling iron using a camera on a smart mirror and an accelerometer on the curling iron. The system displays the curling iron paths of the target hairstyle on a smart mirror in Augmented Reality (AR). From the evaluation experiments, we confirmed that the system contributed to the reproduction of the moving paths of the curling iron through quantitative evaluation. However, a subjective evaluation showed that our system could not reproduce the appearance of the target hairstyle. The results indicate that the time to heat the hair should be considered.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"538 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00190
Yoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, T. Yoshihisa, Y. Teranishi
Recent technological advances in Virtual Reality (VR) and Augmented Reality (AR) enable users to experience a high-quality virtual world. In VR applications, the user's physical movement is generally restricted because the situation around the real world cannot be seen. AR allows users to experience virtual worlds without restrictions on physical movement, but the extent to which they are replaced as virtual worlds is limited. In this research, assuming the use of smartphones and tablet devices, a partial virtual world system is implemented by removing only the background part from the real-time real-world image taken by the camera and replacing it with a virtual background.
{"title":"A Real-Time Background Replacement Method Based on Estimated Depth for AR Applications","authors":"Yoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, T. Yoshihisa, Y. Teranishi","doi":"10.1109/COMPSAC54236.2022.00190","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00190","url":null,"abstract":"Recent technological advances in Virtual Reality (VR) and Augmented Reality (AR) enable users to experience a high-quality virtual world. In VR applications, the user's physical movement is generally restricted because the situation around the real world cannot be seen. AR allows users to experience virtual worlds without restrictions on physical movement, but the extent to which they are replaced as virtual worlds is limited. In this research, assuming the use of smartphones and tablet devices, a partial virtual world system is implemented by removing only the background part from the real-time real-world image taken by the camera and replacing it with a virtual background.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00134
Nasos Grigoropoulos, S. Lalis
Next-generation drone applications will be distributed, including tasks that need to run at the edge or in the cloud and interact with the drone in a smooth way. In this paper, we propose Fractus, an orchestration framework for the automated deployment of such applications in the drone-edge-cloud continuum. Fractus provides users with abstractions for describing the application's placement and communication requirements, allocates resources in a mission-aware fashion by considering the drone operation area, establishes and maintains connectivity between components by transparently leveraging different networking capabilities, and tackles safety and privacy issues via policy-based access to mobility and sensor resources. We present the design of Fractus and discuss an implementation based on mature software deployment technology. Further, we evaluate the resource requirements of our implementation, showing that it introduces an acceptable overhead, and illustrate its functionality via real field tests and a simulation setup.
{"title":"Fractus: Orchestration of Distributed Applications in the Drone-Edge-Cloud Continuum","authors":"Nasos Grigoropoulos, S. Lalis","doi":"10.1109/COMPSAC54236.2022.00134","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00134","url":null,"abstract":"Next-generation drone applications will be distributed, including tasks that need to run at the edge or in the cloud and interact with the drone in a smooth way. In this paper, we propose Fractus, an orchestration framework for the automated deployment of such applications in the drone-edge-cloud continuum. Fractus provides users with abstractions for describing the application's placement and communication requirements, allocates resources in a mission-aware fashion by considering the drone operation area, establishes and maintains connectivity between components by transparently leveraging different networking capabilities, and tackles safety and privacy issues via policy-based access to mobility and sensor resources. We present the design of Fractus and discuss an implementation based on mature software deployment technology. Further, we evaluate the resource requirements of our implementation, showing that it introduces an acceptable overhead, and illustrate its functionality via real field tests and a simulation setup.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123731803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00171
A. Rahman, Farzana Ahamed Bhuiyan, M. M. Hassan, H. Shahriar, Fan Wu
Machine learning (ML) operations or MLOps advo-cates for integration of DevOps- related practices into the ML development and deployment process. Adoption of MLOps can be hampered due to a lack of knowledge related to how development tasks can be automated. A characterization of bot usage in ML projects can help practitioners on the types of tasks that can be automated with bots, and apply that knowledge into their ML development and deployment process. To that end, we conduct a preliminary empirical study with 135 issues reported mined from 3 libraries related to deep learning: Keras, PyTorch, and Tensorflow. From our empirical study we observe 9 categories of tasks that are automated with bots. We conclude our work-in-progress paper by providing a list of lessons that we learned from our empirical study.
{"title":"Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries","authors":"A. Rahman, Farzana Ahamed Bhuiyan, M. M. Hassan, H. Shahriar, Fan Wu","doi":"10.1109/COMPSAC54236.2022.00171","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00171","url":null,"abstract":"Machine learning (ML) operations or MLOps advo-cates for integration of DevOps- related practices into the ML development and deployment process. Adoption of MLOps can be hampered due to a lack of knowledge related to how development tasks can be automated. A characterization of bot usage in ML projects can help practitioners on the types of tasks that can be automated with bots, and apply that knowledge into their ML development and deployment process. To that end, we conduct a preliminary empirical study with 135 issues reported mined from 3 libraries related to deep learning: Keras, PyTorch, and Tensorflow. From our empirical study we observe 9 categories of tasks that are automated with bots. We conclude our work-in-progress paper by providing a list of lessons that we learned from our empirical study.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
EOSIO smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. As EOSIO smart contracts manage valuable assets, they become high-value targets and are subjected to more and more attacks. Tools for protecting EOSIO smart contracts are imperative. This paper proposes EOSIOAnalyzer, an effective static secu-rity analysis framework for EOSIO smart contracts to counter the three most common attacks. The framework consists of three components, the control flow graph builder, the static analyzer and the vulnerability detector. This paper implements an approach to transforming low-level Wasm bytecode into a high-level intermediate representation (Register Transfer Language). Besides, this paper also implements vulnerability detection speci-fications for three popular EOSIO smart contracts vulnerabilities, including Fake EOS Transfer, Forged Transfer Notification and Block Information Dependency. As a proof of concept, this paper conducts experiments to evaluate the effectiveness and efficiency of the EOSIOAnalyzer. The experiment results show that the detection accuracy of the three vulnerabilities is 100 %, 98.8 % and 100%, respectively.
EOSIO智能合约是可以由相互不信任的节点组成的网络共同执行的程序。由于EOSIO智能合约管理着有价值的资产,它们成为高价值目标,并受到越来越多的攻击。保护EOSIO智能合约的工具是必不可少的。本文提出EOSIOAnalyzer,这是一个有效的静态安全分析框架,用于EOSIO智能合约,以对抗三种最常见的攻击。该框架由控制流图构建器、静态分析器和漏洞检测器三个部分组成。本文实现了一种将低级Wasm字节码转换为高级中间表示(寄存器传输语言)的方法。此外,本文还对Fake EOS Transfer、Forged Transfer Notification和Block Information Dependency三种流行的EOSIO智能合约漏洞实现了漏洞检测规范。作为概念验证,本文通过实验来评估EOSIOAnalyzer的有效性和效率。实验结果表明,三个漏洞的检测准确率分别为100%、98.8%和100%。
{"title":"EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts","authors":"Wenyuan Li, Jiahao He, Gansen Zhao, Jinji Yang, Shuangyin Li, Ruilin Lai, P. Li, Hua Tang, Haoyu Luo, Ziheng Zhou","doi":"10.1109/COMPSAC54236.2022.00124","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00124","url":null,"abstract":"EOSIO smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. As EOSIO smart contracts manage valuable assets, they become high-value targets and are subjected to more and more attacks. Tools for protecting EOSIO smart contracts are imperative. This paper proposes EOSIOAnalyzer, an effective static secu-rity analysis framework for EOSIO smart contracts to counter the three most common attacks. The framework consists of three components, the control flow graph builder, the static analyzer and the vulnerability detector. This paper implements an approach to transforming low-level Wasm bytecode into a high-level intermediate representation (Register Transfer Language). Besides, this paper also implements vulnerability detection speci-fications for three popular EOSIO smart contracts vulnerabilities, including Fake EOS Transfer, Forged Transfer Notification and Block Information Dependency. As a proof of concept, this paper conducts experiments to evaluate the effectiveness and efficiency of the EOSIOAnalyzer. The experiment results show that the detection accuracy of the three vulnerabilities is 100 %, 98.8 % and 100%, respectively.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130573015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00232
Emna Souidi, Lamia Zouhaier, Y. Hlaoui
With the evolution of mobile devices such as laptops, tablets, smartphones, etc., the number of users has also increased, but it is difficult for some people due to their limited abilities. The Internet of Things (IoT) can make people's lives more convenient, and especially important for people with disabilities. This paper presents an approach to semantic representation using ontology. This approach is based on IoT to facilitate the real-time populating of the ontology in the context of adapting User Interfaces (UI) to people with disabilities such as sensory impairments (hearing and vision). IoT technology offers a great service to gain more autonomy and independence for people with disabilities.
{"title":"IoT for Real-time Accessibility Ontology Population to Context-awareness Adapt User Interfaces","authors":"Emna Souidi, Lamia Zouhaier, Y. Hlaoui","doi":"10.1109/COMPSAC54236.2022.00232","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00232","url":null,"abstract":"With the evolution of mobile devices such as laptops, tablets, smartphones, etc., the number of users has also increased, but it is difficult for some people due to their limited abilities. The Internet of Things (IoT) can make people's lives more convenient, and especially important for people with disabilities. This paper presents an approach to semantic representation using ontology. This approach is based on IoT to facilitate the real-time populating of the ontology in the context of adapting User Interfaces (UI) to people with disabilities such as sensory impairments (hearing and vision). IoT technology offers a great service to gain more autonomy and independence for people with disabilities.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130309740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00035
Xin Xu, Nan Wang, Huijie Jin, Yang Liu, Kun Li
The rapid development of neural networks has con-tributed to the increasing maturity of recommendation systems. However, deep neural networks have poor interpretability for models and do not show strong advantages for sparse data and noisy data. Recently, Hawkes process has become more and more focused for its good interpretability with probabilistic models. Based on this, we proposes A Neural Efficient Recommendation Model Based on Neighborhood Key Information Aggregation of Modified Hawkes(NKMH). The model utilizes a neural network and designs three modules to jointly fit the modified Hawkes process. It not only inherits the high interpretability of Hawkes, but also effectively solves the problem of poor prediction ability of the Hawkes process. Besides, we present a novel key information search strategy(KISS), which can effectively remove the noise in a session and alleviate the sparsity of the data to some extent. Extensive experiments on two datasets show that the NKMH model outperforms many current popular models.
{"title":"NKMH: A Neural Efficient Recommendation Based on Neighborhood Key Information Aggregation of Modified Hawkes","authors":"Xin Xu, Nan Wang, Huijie Jin, Yang Liu, Kun Li","doi":"10.1109/COMPSAC54236.2022.00035","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00035","url":null,"abstract":"The rapid development of neural networks has con-tributed to the increasing maturity of recommendation systems. However, deep neural networks have poor interpretability for models and do not show strong advantages for sparse data and noisy data. Recently, Hawkes process has become more and more focused for its good interpretability with probabilistic models. Based on this, we proposes A Neural Efficient Recommendation Model Based on Neighborhood Key Information Aggregation of Modified Hawkes(NKMH). The model utilizes a neural network and designs three modules to jointly fit the modified Hawkes process. It not only inherits the high interpretability of Hawkes, but also effectively solves the problem of poor prediction ability of the Hawkes process. Besides, we present a novel key information search strategy(KISS), which can effectively remove the noise in a session and alleviate the sparsity of the data to some extent. Extensive experiments on two datasets show that the NKMH model outperforms many current popular models.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"45 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00121
Ruilin Lai, Gansen Zhao
Crowdsourcing as a computing paradigm, has been widely used in industries and services. Accountability in crowdsourcing services enables participants to work honestly and improves the quality of services. The realization of accountability requires trusted evidence, multiparty verification, and fair reward or punishment. Blockchain technology, which is inherently tamper-resistant, traceable, and decentralized, puts forward a direction for realizing the requirements. However, in the process of data management and decentralized verification, it is hard to achieve a better trade-off between efficiency and security. This paper proposes a blockchain-based verification scheme integrated by trust management, ‘validatorRep’, that is suitable to enhance accountability in the crowdsourcing system. In detail, a decoupled blockchain model is proposed for the differentiated storage of business transactions and log transactions during data interaction. Additionally, a fine-grained trust model is proposed, including both the rep-utation of participants and the trust relationship between participants. Based on fine-grained trust, the decentralized verification scheme is designed to guarantee secure data access, trusted verification, and fair reward or punishment. Finally, the proposed framework is deployed on the Ethereum platform to observe its effectiveness and overall performance. Simulation results also reveal that the proposed fine-grained trust model can provide efficient accountability for crowdsourcing.
{"title":"ValidatorRep: Blockchain-based Trust Management for Ensuring Accountability in Crowdsourcing","authors":"Ruilin Lai, Gansen Zhao","doi":"10.1109/COMPSAC54236.2022.00121","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00121","url":null,"abstract":"Crowdsourcing as a computing paradigm, has been widely used in industries and services. Accountability in crowdsourcing services enables participants to work honestly and improves the quality of services. The realization of accountability requires trusted evidence, multiparty verification, and fair reward or punishment. Blockchain technology, which is inherently tamper-resistant, traceable, and decentralized, puts forward a direction for realizing the requirements. However, in the process of data management and decentralized verification, it is hard to achieve a better trade-off between efficiency and security. This paper proposes a blockchain-based verification scheme integrated by trust management, ‘validatorRep’, that is suitable to enhance accountability in the crowdsourcing system. In detail, a decoupled blockchain model is proposed for the differentiated storage of business transactions and log transactions during data interaction. Additionally, a fine-grained trust model is proposed, including both the rep-utation of participants and the trust relationship between participants. Based on fine-grained trust, the decentralized verification scheme is designed to guarantee secure data access, trusted verification, and fair reward or punishment. Finally, the proposed framework is deployed on the Ethereum platform to observe its effectiveness and overall performance. Simulation results also reveal that the proposed fine-grained trust model can provide efficient accountability for crowdsourcing.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1109/COMPSAC54236.2022.00030
João Almeida, Vasco Amaral
Current document version control systems (VCS) are prone to impersonation in changes to the artefacts and their update history, risking its credibility. This is particularly problematic in specific application domains such as in Education, where teachers have to have the means to prevent and detect students' unethical behaviour or fraud, as grading is one of the essential pillars of trust in the correction and fairness in the conduct of the educational system. Therefore, there is a need for a completely secure, trustworthy and easy-to-use version management of digital artefacts, which can be used to introduce students to the world of version control. We thus propose a blockchain-based solution for version control of engineering artefacts. The goal is to facilitate collaboration in a multi-user area, like the education field, and track changes in a trusted and secure manner. As a proof of concept, we designed and implemented a solution using the Hyperledger Fabric Network to govern and regulate file version control functions among students and teachers. Our prototype is hosted on the cloud and uses Git and GitHub to hash and store the different artefact versions and the blockchain network to keep all the changes in a perpetual and immutable way tracing to their respective authors non-prone to forgery. Besides constructing the proof of concept tool prototype, we conducted a usability experiment. The results of the usability tests were positive, with users with limited experience in version control systems starting to use and comprehend the solution in little time. The next step will be to generalize and evolve this tool to other application scenarios where trustworthy tracing is essential.
{"title":"Towards trustworthy tracing responsibility of collaborative software engineering artefacts of student's software projects","authors":"João Almeida, Vasco Amaral","doi":"10.1109/COMPSAC54236.2022.00030","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00030","url":null,"abstract":"Current document version control systems (VCS) are prone to impersonation in changes to the artefacts and their update history, risking its credibility. This is particularly problematic in specific application domains such as in Education, where teachers have to have the means to prevent and detect students' unethical behaviour or fraud, as grading is one of the essential pillars of trust in the correction and fairness in the conduct of the educational system. Therefore, there is a need for a completely secure, trustworthy and easy-to-use version management of digital artefacts, which can be used to introduce students to the world of version control. We thus propose a blockchain-based solution for version control of engineering artefacts. The goal is to facilitate collaboration in a multi-user area, like the education field, and track changes in a trusted and secure manner. As a proof of concept, we designed and implemented a solution using the Hyperledger Fabric Network to govern and regulate file version control functions among students and teachers. Our prototype is hosted on the cloud and uses Git and GitHub to hash and store the different artefact versions and the blockchain network to keep all the changes in a perpetual and immutable way tracing to their respective authors non-prone to forgery. Besides constructing the proof of concept tool prototype, we conducted a usability experiment. The results of the usability tests were positive, with users with limited experience in version control systems starting to use and comprehend the solution in little time. The next step will be to generalize and evolve this tool to other application scenarios where trustworthy tracing is essential.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}