首页 > 最新文献

2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
Safety contract based design of software components 基于安全契约的软件组件设计
Andreas Söderberg, Rolf Johansson
In this paper we discuss how to use a modified design methodology for contract based design (CBD) intended for development of software and component based systems by use of so called safety contracts. The primary purpose is to make a proposal on how to integrate safety contracts in a, for a tool, implementable way for automatic safety contract verification. This development technique is called safety contract based design (SCBD) in this paper. Focus is to discuss the similarities and differences between the actual contents in conventional CBD-contracts and safety contracts, and rules for how to verify agreements of safety contracts and how to ensure safety contract validity.
在本文中,我们讨论了如何使用一种改进的设计方法,用于基于合同的设计(CBD),旨在通过使用所谓的安全合同开发软件和基于组件的系统。主要目的是就如何以一种工具可实现的方式集成安全契约以实现自动安全契约验证提出建议。本文将这种开发技术称为基于安全契约的设计(SCBD)。重点讨论了传统cbd合同与安全合同实际内容的异同,以及安全合同协议的核查规则和安全合同的有效性。
{"title":"Safety contract based design of software components","authors":"Andreas Söderberg, Rolf Johansson","doi":"10.1109/ISSREW.2013.6688922","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688922","url":null,"abstract":"In this paper we discuss how to use a modified design methodology for contract based design (CBD) intended for development of software and component based systems by use of so called safety contracts. The primary purpose is to make a proposal on how to integrate safety contracts in a, for a tool, implementable way for automatic safety contract verification. This development technique is called safety contract based design (SCBD) in this paper. Focus is to discuss the similarities and differences between the actual contents in conventional CBD-contracts and safety contracts, and rules for how to verify agreements of safety contracts and how to ensure safety contract validity.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126660603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A chain of accountabilities in open systems based on assured entrustments 基于有保证的委托的开放系统中的责任链
M. Hirai, Y. Yuasa, Y. Kinoshita
Accountability achievement is indispensable to dependability. When the acquirer entrusts the provider with a task, the provider owes not only the accomplishment of the task itself but also the accountability with respect to the accomplishment. We claim that there should be an explicitly described agreement with the scope of accountability and the procedure of the accounts for emergencies, in the same way as there should be an explicitly described agreement on system requirements as is widely accepted nowadays. This paper proposes a consensus building process for entrustments of tasks in system life cycles, and formalism for explicit description of accountability. Our consensus building process ensures that the acquirer of the system can obtain the required information from the provider whenever necessary. An entrustment of a task between the acquirer and the provider may occur recursively in various levels in system life cycles. We also discuss the accountability in the supply chain of entrustment. Our consensus building process and form for description of explicit accountability leads to a consistent system of accountability in the "DEOS Process," which has been proposed as an instance of system life cycle with the consideration of long term operation of open systems. As an example, a file server system is given which has been developed and is operating in practice according to our proposal.
问责制成就是可靠性的必要条件。当获取方将一项任务委托给提供方时,提供方不仅要完成任务本身,还要承担完成任务的责任。我们主张,就责任制的范围和紧急情况帐户的程序应该有一项明确说明的协议,就像现在广泛接受的关于系统要求的明确说明的协议一样。本文提出了系统生命周期任务委托的共识构建过程,以及明确描述问责制的形式主义。我们的共识构建过程确保系统的获取方可以在必要时从提供方获得所需的信息。在系统生命周期的不同层次上,获取者和提供者之间的任务委托可能递归地发生。我们还讨论了委托供应链中的问责问题。我们对明确问责制描述的共识构建过程和形式导致了“DEOS过程”中一致的问责制,该过程已被提议作为考虑开放系统长期运行的系统生命周期的实例。并给出了一个文件服务器系统的开发实例,该系统已根据本文提出的方案在实际中运行。
{"title":"A chain of accountabilities in open systems based on assured entrustments","authors":"M. Hirai, Y. Yuasa, Y. Kinoshita","doi":"10.1109/ISSREW.2013.6688911","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688911","url":null,"abstract":"Accountability achievement is indispensable to dependability. When the acquirer entrusts the provider with a task, the provider owes not only the accomplishment of the task itself but also the accountability with respect to the accomplishment. We claim that there should be an explicitly described agreement with the scope of accountability and the procedure of the accounts for emergencies, in the same way as there should be an explicitly described agreement on system requirements as is widely accepted nowadays. This paper proposes a consensus building process for entrustments of tasks in system life cycles, and formalism for explicit description of accountability. Our consensus building process ensures that the acquirer of the system can obtain the required information from the provider whenever necessary. An entrustment of a task between the acquirer and the provider may occur recursively in various levels in system life cycles. We also discuss the accountability in the supply chain of entrustment. Our consensus building process and form for description of explicit accountability leads to a consistent system of accountability in the \"DEOS Process,\" which has been proposed as an instance of system life cycle with the consideration of long term operation of open systems. As an example, a file server system is given which has been developed and is operating in practice according to our proposal.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114736176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computational modeling to detect software sabotage: A discussion of technical challenges and a demonstration of innovative technology 检测软件破坏的计算建模:技术挑战的讨论和创新技术的演示
S. Kothari
Stealing secrets from a smartphone, damaging a nuclear reactor and bringing down a power grid are disasters easily within the reach of today's cyber attackers. A mobile phone, a car, a nuclear reactor, a missile, a power grid, in fact anything that contains sophisticated software can be a target for these attacks. Catastrophe is all but inevitable if cyber security measures fail to match the sophistication of saboteurs.
从智能手机中窃取机密、破坏核反应堆、瘫痪电网,这些都是当今网络攻击者可以轻易做到的灾难。手机、汽车、核反应堆、导弹、电网,实际上任何包含复杂软件的东西都可能成为这些攻击的目标。如果网络安全措施无法与老练的破坏者相匹配,灾难几乎是不可避免的。
{"title":"Computational modeling to detect software sabotage: A discussion of technical challenges and a demonstration of innovative technology","authors":"S. Kothari","doi":"10.1109/ISSREW.2013.6688876","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688876","url":null,"abstract":"Stealing secrets from a smartphone, damaging a nuclear reactor and bringing down a power grid are disasters easily within the reach of today's cyber attackers. A mobile phone, a car, a nuclear reactor, a missile, a power grid, in fact anything that contains sophisticated software can be a target for these attacks. Catastrophe is all but inevitable if cyber security measures fail to match the sophistication of saboteurs.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certification of embedded systems: Quantitative analysis and irrefutable evidences 嵌入式系统认证:定量分析和无可辩驳的证据
N. Silva, M. Vieira
Electronic/embedded systems are more and more dependent and relying on software flexibility and properties. They can be found in all spheres of our lives at a macro and global scale, ranging from personal and entertainment devices, household appliances, all types of transportation systems, global communication systems, civilian and military systems, energy and banking systems, and so on. Given the importance of all these systems and the safety and security requirements that become associated, national and international regulators require appropriate certification of each characteristic of the referred ubiquitous systems. This abstract presents the initial ideas concerning a quantitative analysis and evaluation of the evidence set forward in safety cases that support and eventually lead to certification of embedded systems with large parts of software. A discussion about the current industrial practices, limitations and state of the art related to certification evidences is drafted, and ideas concerning how can evidences be improved in terms of completeness, coherency, correctness, coverage, etc, as well as how can a quantitative analysis of the certification process be derived, are introduced for discussion and feedback. Current practices are not perfect, not properly applied, or applied in very different ways, presenting limitations, flaws and simplifications that put jeopardize systems safety, this is why we intend to initiate this research work.
电子/嵌入式系统越来越依赖于软件的灵活性和性能。在宏观和全球范围内,它们可以在我们生活的各个领域找到,从个人和娱乐设备,家用电器,所有类型的运输系统,全球通信系统,民用和军事系统,能源和银行系统等等。鉴于所有这些系统的重要性以及相关的安全和安保要求,国家和国际监管机构要求对所提到的无处不在的系统的每个特性进行适当的认证。本摘要提出了有关安全案例中证据的定量分析和评估的初步想法,这些证据支持并最终导致具有大部分软件的嵌入式系统的认证。讨论了与认证证据相关的当前行业实践、限制和技术状况,并介绍了如何在完整性、一致性、正确性、覆盖范围等方面改进证据的想法,以及如何对认证过程进行定量分析,以供讨论和反馈。目前的实践并不完美,没有正确应用,或者以非常不同的方式应用,呈现出限制,缺陷和简化,危及系统安全,这就是我们打算启动这项研究工作的原因。
{"title":"Certification of embedded systems: Quantitative analysis and irrefutable evidences","authors":"N. Silva, M. Vieira","doi":"10.1109/ISSREW.2013.6688854","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688854","url":null,"abstract":"Electronic/embedded systems are more and more dependent and relying on software flexibility and properties. They can be found in all spheres of our lives at a macro and global scale, ranging from personal and entertainment devices, household appliances, all types of transportation systems, global communication systems, civilian and military systems, energy and banking systems, and so on. Given the importance of all these systems and the safety and security requirements that become associated, national and international regulators require appropriate certification of each characteristic of the referred ubiquitous systems. This abstract presents the initial ideas concerning a quantitative analysis and evaluation of the evidence set forward in safety cases that support and eventually lead to certification of embedded systems with large parts of software. A discussion about the current industrial practices, limitations and state of the art related to certification evidences is drafted, and ideas concerning how can evidences be improved in terms of completeness, coherency, correctness, coverage, etc, as well as how can a quantitative analysis of the certification process be derived, are introduced for discussion and feedback. Current practices are not perfect, not properly applied, or applied in very different ways, presenting limitations, flaws and simplifications that put jeopardize systems safety, this is why we intend to initiate this research work.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of missing requirements using base requirements pairs 使用基本需求对检测缺失的需求
Arbi Ghazarian
A collection of slides from the author's conference presentation is given. The following topics are discussed: functional requirement; software defect; software specification; and software requirement.
本文给出了作者在会议上演讲的幻灯片集。讨论了以下主题:功能需求;软件缺陷;软件规范;以及软件需求。
{"title":"Detection of missing requirements using base requirements pairs","authors":"Arbi Ghazarian","doi":"10.1109/ISSREW.2013.6688875","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688875","url":null,"abstract":"A collection of slides from the author's conference presentation is given. The following topics are discussed: functional requirement; software defect; software specification; and software requirement.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115817045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Persistence of relevance: A missing issue in imperfect coverage models 相关性的持久性:在不完善的覆盖模型中缺失的一个问题
Jianwen Xiang, F. Machida, Kumiko Tadano, Y. Maeno
In traditional imperfect fault coverage models, simply coverage models (CMs), the coverage (including identification and isolation) is typically limited to the faulty components regardless of their relevance. The relevance is typically defined in the context of perfect fault coverage, and a component is called irrelevant if its (covered) failure does not affect the system state, otherwise it is relevant. Although it is generally assumed that all components are initially relevant in these models, such an assumption does not consider the fact that an initially relevant component could become irrelevant afterwards due to the failures of other components, and we call it a non-persistent component. A system with only persistent components is called persistent, otherwise it is called non-persistent. For a non-persistent system, it is important to cover (identify and isolate) the non-persistent components in time whenever they become irrelevant, such that their future uncovered failures will not affect the system anymore. This paper formalizes the concept of persistence and analyzes its impact on reliability of the systems subjected to imperfect fault coverage. It is demonstrated that with the coverage of irrelevant components (in addition to the faulty components), the reliability of a non-persistent system can be (significantly) improved without increasing redundancy.
在传统的不完全故障覆盖模型中,即简单的覆盖模型(CMs),覆盖(包括识别和隔离)通常局限于有故障的组件,而不考虑它们的相关性。相关性通常是在完全故障覆盖的上下文中定义的,如果组件的(覆盖的)故障不影响系统状态,则称为无关组件,否则它是相关的。尽管通常假设所有组件在这些模型中最初都是相关的,但这种假设没有考虑到这样一个事实,即最初相关的组件可能会由于其他组件的故障而变得无关紧要,我们称之为非持久性组件。只有持久组件的系统称为持久组件,否则称为非持久组件。对于非持久化系统,重要的是在非持久化组件变得无关紧要时及时覆盖(识别和隔离)它们,这样它们未来未发现的故障就不会再影响系统了。本文形式化了持久性的概念,并分析了不完全故障覆盖下持久性对系统可靠性的影响。通过对不相关组件(除了故障组件)的覆盖,可以在不增加冗余的情况下(显着)提高非持久性系统的可靠性。
{"title":"Persistence of relevance: A missing issue in imperfect coverage models","authors":"Jianwen Xiang, F. Machida, Kumiko Tadano, Y. Maeno","doi":"10.1109/ISSREW.2013.6688848","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688848","url":null,"abstract":"In traditional imperfect fault coverage models, simply coverage models (CMs), the coverage (including identification and isolation) is typically limited to the faulty components regardless of their relevance. The relevance is typically defined in the context of perfect fault coverage, and a component is called irrelevant if its (covered) failure does not affect the system state, otherwise it is relevant. Although it is generally assumed that all components are initially relevant in these models, such an assumption does not consider the fact that an initially relevant component could become irrelevant afterwards due to the failures of other components, and we call it a non-persistent component. A system with only persistent components is called persistent, otherwise it is called non-persistent. For a non-persistent system, it is important to cover (identify and isolate) the non-persistent components in time whenever they become irrelevant, such that their future uncovered failures will not affect the system anymore. This paper formalizes the concept of persistence and analyzes its impact on reliability of the systems subjected to imperfect fault coverage. It is demonstrated that with the coverage of irrelevant components (in addition to the faulty components), the reliability of a non-persistent system can be (significantly) improved without increasing redundancy.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated diagnosis of software misconfigurations based on static analysis 基于静态分析的软件错误配置自动诊断
Zhen Dong, M. Ghanavati, A. Andrzejak
Software configuration settings are an effective way to customize applications. However, inconsistencies or mistakes in option values can result in a system crash and need huge time and effort to diagnose. We present a technique to identify the root causes of configuration errors. It uses static program analysis to link the misconfiguration of an application to a specific configuration option. Our technique has two prominent characteristics compared to existing approaches: it relies only on static analysis, and it does not need profiles of the application with correct configuration. Based on the proposed techniques, we developed a tool called ConfDebugger. We evaluated its effectiveness on 8 configuration errors in the Java program JChord. ConfDebugger successfully diagnosed 7 out of 8 errors. For 5 of them, root cause was exactly pinpointed without a false positive, and in total, the average number of false positives was only 0.5. This is better than two state-of-the-art methods, with average numbers of false positives of 1.7 and 5.7, respectively.
软件配置设置是定制应用程序的有效方法。但是,选项值的不一致或错误可能导致系统崩溃,需要花费大量时间和精力进行诊断。我们提出了一种技术来识别配置错误的根本原因。它使用静态程序分析将应用程序的错误配置链接到特定的配置选项。与现有的方法相比,我们的技术有两个突出的特点:它只依赖于静态分析,并且不需要具有正确配置的应用程序概要文件。基于提出的技术,我们开发了一个名为ConfDebugger的工具。我们在Java程序JChord中的8个配置错误上评估了它的有效性。ConfDebugger成功诊断了8个错误中的7个。其中5个准确定位了根本原因,没有出现假阳性,总的来说,平均假阳性数仅为0.5。这比两种最先进的方法要好,这两种方法的平均误报次数分别为1.7和5.7。
{"title":"Automated diagnosis of software misconfigurations based on static analysis","authors":"Zhen Dong, M. Ghanavati, A. Andrzejak","doi":"10.1109/ISSREW.2013.6688897","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688897","url":null,"abstract":"Software configuration settings are an effective way to customize applications. However, inconsistencies or mistakes in option values can result in a system crash and need huge time and effort to diagnose. We present a technique to identify the root causes of configuration errors. It uses static program analysis to link the misconfiguration of an application to a specific configuration option. Our technique has two prominent characteristics compared to existing approaches: it relies only on static analysis, and it does not need profiles of the application with correct configuration. Based on the proposed techniques, we developed a tool called ConfDebugger. We evaluated its effectiveness on 8 configuration errors in the Java program JChord. ConfDebugger successfully diagnosed 7 out of 8 errors. For 5 of them, root cause was exactly pinpointed without a false positive, and in total, the average number of false positives was only 0.5. This is better than two state-of-the-art methods, with average numbers of false positives of 1.7 and 5.7, respectively.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133720241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A monitoring and testing framework for critical off-the-shelf applications and services 用于关键的现成应用程序和服务的监视和测试框架
Nuno Antunes, F. Brancati, A. Ceccarelli, A. Bondavalli, M. Vieira
One of the biggest verification and validation challenges is the definition of approaches and tools to support system assessment while minimizing costs and delivery time. This includes the integration of OTS software components in critical systems that must undergo proper certification or approval processes. In the particular case of testing, due to the differences and peculiarities of components, developers often build ad-hoc and poorly-reusable testing tools, which results in increased time and costs. This paper introduces a framework for testing and monitoring of critical OTS applications and services. The framework includes i) a box that is instrumented for monitoring OS and application level variables, ii) an adaptable toolset for testing the target components, and iii) tools for data storing, retrieval and analyzes. A prototype of the framework is under development, and future testing scenarios are designed to show the applicability and effectiveness of the framework.
最大的验证和确认挑战之一是定义支持系统评估的方法和工具,同时最小化成本和交付时间。这包括在关键系统中集成OTS软件组件,这些组件必须经过适当的认证或批准过程。在测试的特殊情况下,由于组件的差异和特性,开发人员经常构建特别的和可重用性差的测试工具,这导致时间和成本的增加。本文介绍了一个测试和监控关键OTS应用和服务的框架。该框架包括i)用于监控操作系统和应用程序级别变量的盒子,ii)用于测试目标组件的适应性工具集,以及iii)用于数据存储、检索和分析的工具。框架的原型正在开发中,未来的测试场景被设计用来显示框架的适用性和有效性。
{"title":"A monitoring and testing framework for critical off-the-shelf applications and services","authors":"Nuno Antunes, F. Brancati, A. Ceccarelli, A. Bondavalli, M. Vieira","doi":"10.1109/ISSREW.2013.6688923","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688923","url":null,"abstract":"One of the biggest verification and validation challenges is the definition of approaches and tools to support system assessment while minimizing costs and delivery time. This includes the integration of OTS software components in critical systems that must undergo proper certification or approval processes. In the particular case of testing, due to the differences and peculiarities of components, developers often build ad-hoc and poorly-reusable testing tools, which results in increased time and costs. This paper introduces a framework for testing and monitoring of critical OTS applications and services. The framework includes i) a box that is instrumented for monitoring OS and application level variables, ii) an adaptable toolset for testing the target components, and iii) tools for data storing, retrieval and analyzes. A prototype of the framework is under development, and future testing scenarios are designed to show the applicability and effectiveness of the framework.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130270144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding related events for specification mining 为规范挖掘查找相关事件
Ziying Dai, Xiaoguang Mao, Liqian Chen, Yan Lei, Yi Zhang
In contemporary software development practice, programmers reuse components by invoking their APIs to construct large systems. These APIs often involve constraints on the temporal order of method calls. For the example of the file usage, a programmer should first open a file, then read and/or write its content, and at last close it. Trying to read a closed file will cause exceptions to be thrown. Such constraints are often represented as a finite state machine (FSM) with a set of related events (typically method calls) as its alphabet. A set of events are related if interactions among them possibly obey some meaningful temporal specifications. In recent years, various specification mining techniques have been developed to automatically mine API specifications from API client programs [1]. A typical API specification miner conceptually has three steps. First, it decide which events are related. Second, different interactions among related events (which are sub-traces and sample strings of the specification FSM) are extracted either from source code of client programs or from their execution traces. Third, extracted interactions are passed to customized or off-the-shelf FSM learners which generalize these sample sub-traces to recover the specification FSM.
在当代软件开发实践中,程序员通过调用组件的api来构建大型系统,从而重用组件。这些api通常涉及对方法调用的时间顺序的约束。对于文件使用的例子,程序员应该首先打开一个文件,然后读取和/或写入其内容,最后关闭它。试图读取已关闭的文件将导致抛出异常。这些约束通常表示为有限状态机(FSM),其字母表中包含一组相关事件(通常是方法调用)。如果一组事件之间的相互作用可能遵守一些有意义的时间规范,那么它们就是相关的。近年来,人们开发了各种规范挖掘技术,从API客户端程序b[1]中自动挖掘API规范。从概念上讲,典型的API规范挖掘有三个步骤。首先,它决定哪些事件是相关的。其次,相关事件(即规范FSM的子跟踪和示例字符串)之间的不同交互可以从客户机程序的源代码或执行跟踪中提取。第三,提取的交互传递给定制的或现成的FSM学习器,这些学习器泛化这些样本子轨迹以恢复规范的FSM。
{"title":"Finding related events for specification mining","authors":"Ziying Dai, Xiaoguang Mao, Liqian Chen, Yan Lei, Yi Zhang","doi":"10.1109/ISSREW.2013.6688847","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688847","url":null,"abstract":"In contemporary software development practice, programmers reuse components by invoking their APIs to construct large systems. These APIs often involve constraints on the temporal order of method calls. For the example of the file usage, a programmer should first open a file, then read and/or write its content, and at last close it. Trying to read a closed file will cause exceptions to be thrown. Such constraints are often represented as a finite state machine (FSM) with a set of related events (typically method calls) as its alphabet. A set of events are related if interactions among them possibly obey some meaningful temporal specifications. In recent years, various specification mining techniques have been developed to automatically mine API specifications from API client programs [1]. A typical API specification miner conceptually has three steps. First, it decide which events are related. Second, different interactions among related events (which are sub-traces and sample strings of the specification FSM) are extracted either from source code of client programs or from their execution traces. Third, extracted interactions are passed to customized or off-the-shelf FSM learners which generalize these sample sub-traces to recover the specification FSM.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127789875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of Bayesian and classical approaches for software reliability measurement 软件可靠性测量中贝叶斯方法与经典方法的比较分析
T. Wandji, S. Sarkani, T. Eveleigh, T. Holzer, P. Keiller
Software failure remains an important cause of reported system outage. Yet, developing reliable software is still not well understood by the programmer, the Software Engineer and the Program manager. Software reliability growth models (SRGMs) provide a framework to analyze software failures by using past failure data to predict the reliability of the software. Most models that have been used have limitations in predicting accurately. There is a need to conduct research aimed at improving the performance of these models. To accurately predict reliability, the model's parameters should be estimated in such a way that the mathematical function of the model fits with the failure data. While the majority of previous software reliability studies have used classical methods to estimate model's parameters, a few other studies have used a Bayesian approach. Bayesian approaches allow the incorporation of prior information into models and they have been claimed to be more successful than classical approaches in certain situations. Our research goal is to investigate if the use of Bayesian methods improves the predictability of SRGMs by conducting a direct comparative analysis of Bayesian and classical approaches for software reliability assessment.
软件故障仍然是报告的系统中断的重要原因。然而,开发可靠的软件仍然没有被程序员、软件工程师和程序经理很好地理解。软件可靠性增长模型(SRGMs)通过使用过去的故障数据来预测软件的可靠性,为分析软件故障提供了一个框架。大多数已经使用的模型在准确预测方面都有局限性。有必要开展旨在提高这些模型性能的研究。为了准确地预测可靠性,需要对模型参数进行估计,使模型的数学函数与故障数据拟合。虽然以前的软件可靠性研究大多使用经典方法来估计模型参数,但其他一些研究使用贝叶斯方法。贝叶斯方法允许将先验信息合并到模型中,并且在某些情况下,它们被认为比经典方法更成功。我们的研究目标是通过对软件可靠性评估的贝叶斯方法和经典方法进行直接比较分析,调查贝叶斯方法的使用是否提高了srgm的可预测性。
{"title":"Comparative analysis of Bayesian and classical approaches for software reliability measurement","authors":"T. Wandji, S. Sarkani, T. Eveleigh, T. Holzer, P. Keiller","doi":"10.1109/ISSREW.2013.6688851","DOIUrl":"https://doi.org/10.1109/ISSREW.2013.6688851","url":null,"abstract":"Software failure remains an important cause of reported system outage. Yet, developing reliable software is still not well understood by the programmer, the Software Engineer and the Program manager. Software reliability growth models (SRGMs) provide a framework to analyze software failures by using past failure data to predict the reliability of the software. Most models that have been used have limitations in predicting accurately. There is a need to conduct research aimed at improving the performance of these models. To accurately predict reliability, the model's parameters should be estimated in such a way that the mathematical function of the model fits with the failure data. While the majority of previous software reliability studies have used classical methods to estimate model's parameters, a few other studies have used a Bayesian approach. Bayesian approaches allow the incorporation of prior information into models and they have been claimed to be more successful than classical approaches in certain situations. Our research goal is to investigate if the use of Bayesian methods improves the predictability of SRGMs by conducting a direct comparative analysis of Bayesian and classical approaches for software reliability assessment.","PeriodicalId":332420,"journal":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116976056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1