首页 > 最新文献

2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)最新文献

英文 中文
A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacks 一种轻量级决策树算法检测DDoS flood攻击
Godswill Lucky, F. Jjunju, A. Marshall
The development of an accurate, efficient and lightweight distributed solution for the detection and prevention of DDoS attacks provides network designers with new options to monitor and secure networks according to their strategic needs. Here we present, a lightweight architecture that distinguishes attack network flows from normal traffic flows with a detection accuracy of over 99.9%. The architecture presented is optimised for deployment in low-cost environments for efficient, rapid detection and prevention of DDoS attacks. To achieve a computationally efficiency architecture, the system was trained with a minimal number of features using a robust features selection approach and validated against the CIC 2017 and 2019 datasets. Analysis of the design is presented and results shows that the new architecture uses just 7% processing power of the detection system and provides no additional overhead to the monitored network.
为检测和预防DDoS攻击而开发的准确,高效和轻量级分布式解决方案为网络设计人员提供了根据其战略需求监控和保护网络的新选项。在这里,我们提出了一种轻量级架构,可以区分攻击网络流和正常流量流,检测准确率超过99.9%。该架构针对低成本环境的部署进行了优化,以实现高效、快速的DDoS攻击检测和预防。为了实现计算效率架构,使用鲁棒特征选择方法对系统进行了最少数量的特征训练,并针对CIC 2017和2019数据集进行了验证。对设计进行了分析,结果表明,新架构只使用了检测系统7%的处理能力,并且没有给被监测网络带来额外的开销。
{"title":"A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacks","authors":"Godswill Lucky, F. Jjunju, A. Marshall","doi":"10.1109/QRS-C51114.2020.00072","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00072","url":null,"abstract":"The development of an accurate, efficient and lightweight distributed solution for the detection and prevention of DDoS attacks provides network designers with new options to monitor and secure networks according to their strategic needs. Here we present, a lightweight architecture that distinguishes attack network flows from normal traffic flows with a detection accuracy of over 99.9%. The architecture presented is optimised for deployment in low-cost environments for efficient, rapid detection and prevention of DDoS attacks. To achieve a computationally efficiency architecture, the system was trained with a minimal number of features using a robust features selection approach and validated against the CIC 2017 and 2019 datasets. Analysis of the design is presented and results shows that the new architecture uses just 7% processing power of the detection system and provides no additional overhead to the monitored network.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Organizing Committee QRS 2020 组委会QRS 2020
{"title":"Organizing Committee QRS 2020","authors":"","doi":"10.1109/qrs-c51114.2020.00007","DOIUrl":"https://doi.org/10.1109/qrs-c51114.2020.00007","url":null,"abstract":"","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based Vulnerability Detection via Extracting Features from Sliced Code 从切片代码中提取特征的基于图的漏洞检测
Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong
With the development of open source software and open source community, there are more available codes on the Internet. And the open vulnerability information can be found on the Internet. In fact, using known vulnerabilities to calculate the similarity with the source code has been demonstrated a useful method to detect vulnerabilities. But the vulnerabilities often have many irrelevant codes, which may cause false positives and reduce the accuracy of vulnerability detection. Besides, the program code may have been patched. This also leads to false positives. We use code property graphs to extract source code and calculate the similarity between the vulnerable code and the source code to judge whether the software has vulnerabilities. By using the patched code, we can reduce the false positive. We use our approach on LibTIFF and Linux kernel. The experimental results show that the approach can effectively find vulnerabilities and reduce the false positive.
随着开源软件和开源社区的发展,互联网上有了更多的可用代码。开放的漏洞信息可以在互联网上找到。事实上,使用已知漏洞来计算与源代码的相似度已被证明是检测漏洞的一种有用方法。但是这些漏洞往往包含许多不相关的代码,容易造成误报,降低漏洞检测的准确性。此外,程序代码可能已经打过补丁。这也会导致误报。我们利用代码属性图提取源代码,并通过计算漏洞代码与源代码的相似度来判断软件是否存在漏洞。通过使用补丁码,我们可以减少误报。我们在LibTIFF和Linux内核上使用我们的方法。实验结果表明,该方法能有效地发现漏洞,减少误报。
{"title":"Graph-based Vulnerability Detection via Extracting Features from Sliced Code","authors":"Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong","doi":"10.1109/QRS-C51114.2020.00018","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00018","url":null,"abstract":"With the development of open source software and open source community, there are more available codes on the Internet. And the open vulnerability information can be found on the Internet. In fact, using known vulnerabilities to calculate the similarity with the source code has been demonstrated a useful method to detect vulnerabilities. But the vulnerabilities often have many irrelevant codes, which may cause false positives and reduce the accuracy of vulnerability detection. Besides, the program code may have been patched. This also leads to false positives. We use code property graphs to extract source code and calculate the similarity between the vulnerable code and the source code to judge whether the software has vulnerabilities. By using the patched code, we can reduce the false positive. We use our approach on LibTIFF and Linux kernel. The experimental results show that the approach can effectively find vulnerabilities and reduce the false positive.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Result Diversification in Clinical Case Reports Retrieval based on Main Finding 基于主要发现的临床病例报告检索的多样化
Mengqi Luo, Fengchang Yu, Haihua Chen
Clinical case reports are the ‘eyewitness’ in biomedical literature and provide a valuable, unique, albeit noisy and underutilized type of evidence. Main finding is the reason for writing up the reports. Main finding based case reports retrieval provides way for user to conveniently access information of eyewitness evidence. However, user retrieval requirements are often ambiguous and diverse, traditional similarity based retrieval mechanism cannot meet different needs of users. Here, we conduct research of result diversification in case reports retrieval based on main finding. First, four similarity measurements for comparing main finding contents are used for initial result ranking; second, two implicit reranking algorithms and two explicit reranking algorithms are applied for result diversification. Experimental result showed that the methods we used had improved sub-topics coverage rate (CR@ X%) in re-ranking result, which proved the effectiveness of our research work for improving result diversification degree.
临床病例报告是生物医学文献中的“目击者”,提供了一种有价值的、独特的、尽管嘈杂且未充分利用的证据。主要发现是撰写这些报告的原因。基于主查找的案件报告检索为用户方便地获取目击证据信息提供了途径。然而,用户的检索需求往往是模糊和多样的,传统的基于相似度的检索机制不能满足用户的不同需求。本文对基于主要发现的病例报告检索结果多样化进行了研究。首先,采用比较主要查找内容的四种相似度度量进行初步结果排序;其次,采用两种隐式重排序算法和两种显式重排序算法实现结果多样化。实验结果表明,我们使用的方法在重新排序结果中提高了子主题覆盖率(CR@ X%),证明了我们的研究工作在提高结果多样化程度方面的有效性。
{"title":"Result Diversification in Clinical Case Reports Retrieval based on Main Finding","authors":"Mengqi Luo, Fengchang Yu, Haihua Chen","doi":"10.1109/QRS-C51114.2020.00044","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00044","url":null,"abstract":"Clinical case reports are the ‘eyewitness’ in biomedical literature and provide a valuable, unique, albeit noisy and underutilized type of evidence. Main finding is the reason for writing up the reports. Main finding based case reports retrieval provides way for user to conveniently access information of eyewitness evidence. However, user retrieval requirements are often ambiguous and diverse, traditional similarity based retrieval mechanism cannot meet different needs of users. Here, we conduct research of result diversification in case reports retrieval based on main finding. First, four similarity measurements for comparing main finding contents are used for initial result ranking; second, two implicit reranking algorithms and two explicit reranking algorithms are applied for result diversification. Experimental result showed that the methods we used had improved sub-topics coverage rate (CR@ X%) in re-ranking result, which proved the effectiveness of our research work for improving result diversification degree.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File System 联盟区块链和星际文件系统上任务调度方案的安全存储和访问
Dongcheng Li, W. E. Wong, Man Zhao, Qiang Hou
Computerized systems and software, which allow optimizing and planning the processes of production, storage, transportation, sale, and distribution of goods, have emerged in the industry. Scheduling systems, in particular, are designed to control and optimize the manufacturing process. This tool can have a significant effect on the productivity of the industry because it reduces the time and cost through well-defined optimization algorithms. Recently, the applicability of blockchain technology has been demonstrated in scheduling systems to add decentralization, traceability, au-ditability, and verifiability of the immutable information that this technology provides. This is a novel contribution that provides scheduling systems with an additional layer of security. With the latest version of Hyperledger Fabric, the appropriate levels of permission and policies for access to information can be established with significant levels of privacy and security, which prevent malicious actors from trying to cheat or abuse the system. Different alternatives exist to manage all processes associated with the operation of a blockchain network, and among them, providers of blockchain as a service have emerged. Chainstack stands out for its simplicity and scalability features to deploy and operate a blockchain network. Our goal in this work is to create a solution for secure storage of and access to task-scheduling scheme on the consortium blockchain and inter-planetary file system as a proof of concept to demonstrate its potential and usability.
计算机化的系统和软件可以优化和规划货物的生产、储存、运输、销售和分配过程,已经在工业中出现。特别是调度系统,是用来控制和优化制造过程的。该工具可以对行业的生产力产生重大影响,因为它通过定义良好的优化算法减少了时间和成本。最近,区块链技术的适用性已经在调度系统中得到证明,以增加该技术提供的不可变信息的去中心化、可追溯性、可编辑性和可验证性。这是一个新颖的贡献,为调度系统提供了额外的安全层。使用最新版本的Hyperledger Fabric,可以建立适当级别的权限和访问信息的策略,并具有显著的隐私和安全级别,从而防止恶意行为者试图欺骗或滥用系统。存在不同的替代方案来管理与区块链网络操作相关的所有过程,其中出现了区块链作为服务的提供者。Chainstack以其部署和操作区块链网络的简单性和可扩展性而脱颖而出。我们的目标是在财团区块链和星际文件系统上创建一个安全存储和访问任务调度方案的解决方案,作为概念验证,以展示其潜力和可用性。
{"title":"Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File System","authors":"Dongcheng Li, W. E. Wong, Man Zhao, Qiang Hou","doi":"10.1109/QRS-C51114.2020.00035","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00035","url":null,"abstract":"Computerized systems and software, which allow optimizing and planning the processes of production, storage, transportation, sale, and distribution of goods, have emerged in the industry. Scheduling systems, in particular, are designed to control and optimize the manufacturing process. This tool can have a significant effect on the productivity of the industry because it reduces the time and cost through well-defined optimization algorithms. Recently, the applicability of blockchain technology has been demonstrated in scheduling systems to add decentralization, traceability, au-ditability, and verifiability of the immutable information that this technology provides. This is a novel contribution that provides scheduling systems with an additional layer of security. With the latest version of Hyperledger Fabric, the appropriate levels of permission and policies for access to information can be established with significant levels of privacy and security, which prevent malicious actors from trying to cheat or abuse the system. Different alternatives exist to manage all processes associated with the operation of a blockchain network, and among them, providers of blockchain as a service have emerged. Chainstack stands out for its simplicity and scalability features to deploy and operate a blockchain network. Our goal in this work is to create a solution for secure storage of and access to task-scheduling scheme on the consortium blockchain and inter-planetary file system as a proof of concept to demonstrate its potential and usability.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Driver's Perception Model in Driving Assist 驾驶辅助中的驾驶员感知模型
Renzhi Tang, Zhihao Jiang
Vision is the primary way to perceive the environment during driving. However, due to its low spatial and temporal resolution, a driver may fail to perceive agents on the road, which may lead to collisions. Modern vehicles are equipped with sensors that can better perceive the driving environment, as well as ADAS to provide driving assist. However, ADAS does not consider the driver's perception, which may result in unnecessary warnings or actions against the driver's will. These false-positives may cause distractions and confusions in complex driving scenarios, which pose safety threat. In this project, we proposed a driving assist system which can reduce the number of unnecessary warnings by taking into account the driver's perception of the driving environment. The driver's perception model combines estimation of driving environment update and driver's observation. The driver's observation is obtained from gaze tracking and the driving environment update is estimated based on the last observation. In this paper, we formulated inference problem on the driver's perception, and developed a virtual driving simulator to evaluate the feasibility of the system.
视觉是驾驶过程中感知环境的主要方式。然而,由于其空间和时间分辨率较低,驾驶员可能无法感知道路上的智能体,从而可能导致碰撞。现代车辆配备了可以更好地感知驾驶环境的传感器,以及提供驾驶辅助的ADAS。然而,ADAS并不考虑驾驶员的感知,这可能会导致不必要的警告或违背驾驶员意愿的行为。这些误报可能会在复杂的驾驶场景中造成分心和混淆,从而对安全构成威胁。在这个项目中,我们提出了一个驾驶辅助系统,该系统可以通过考虑驾驶员对驾驶环境的感知来减少不必要的警告次数。驾驶员感知模型将对驾驶环境更新的估计与驾驶员的观察相结合。通过注视跟踪获得驾驶员的观察值,并根据最后的观察值估计驾驶环境的更新。在本文中,我们提出了关于驾驶员感知的推理问题,并开发了一个虚拟驾驶模拟器来评估系统的可行性。
{"title":"Driver's Perception Model in Driving Assist","authors":"Renzhi Tang, Zhihao Jiang","doi":"10.1109/QRS-C51114.2020.00047","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00047","url":null,"abstract":"Vision is the primary way to perceive the environment during driving. However, due to its low spatial and temporal resolution, a driver may fail to perceive agents on the road, which may lead to collisions. Modern vehicles are equipped with sensors that can better perceive the driving environment, as well as ADAS to provide driving assist. However, ADAS does not consider the driver's perception, which may result in unnecessary warnings or actions against the driver's will. These false-positives may cause distractions and confusions in complex driving scenarios, which pose safety threat. In this project, we proposed a driving assist system which can reduce the number of unnecessary warnings by taking into account the driver's perception of the driving environment. The driver's perception model combines estimation of driving environment update and driver's observation. The driver's observation is obtained from gaze tracking and the driving environment update is estimated based on the last observation. In this paper, we formulated inference problem on the driver's perception, and developed a virtual driving simulator to evaluate the feasibility of the system.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling and Analyzing Smart Contracts using Predicate Transition Nets 基于谓词转换网络的智能合约建模与分析
Xudong He
Blockchain technology has gained wide acceptance in recent years. Smart contracts facilitate the application of the blockchain technology. Smart contracts are programs running distributed environments and are thus error prone. Smart contracts often lack precise specifications and are written in high-level programming languages such as Solidity. In this paper, we present an approach to formally model and analyze smart contracts using predicate transitions nets. We use the blind auction smart contract to demonstrate our approach, which reveals some problematic implementation of some smart contract functions. We have applied predicate transition nets in modeling and analyzing all 11 smart contracts in Azure blockchain workbench. Although we cannot tell whether there is any problem in these smart contracts based on their informal descriptions and Solidity programs without designer input. Our experience has shown the applicability and suitability of predicate transition nets. We believe that our approach can help smart contract designers to detect and prevent early design problems in the current practice of using informal textual descriptions of smart contracts.
近年来,区块链技术得到了广泛的接受。智能合约促进了区块链技术的应用。智能合约是运行在分布式环境中的程序,因此很容易出错。智能合约通常缺乏精确的规范,并且是用Solidity等高级编程语言编写的。在本文中,我们提出了一种使用谓词转换网络正式建模和分析智能合约的方法。我们使用盲拍智能合约来演示我们的方法,这揭示了一些智能合约功能的一些有问题的实现。我们将谓词转换网络应用于Azure区块链工作台中的所有11个智能合约的建模和分析。虽然在没有设计师输入的情况下,我们无法根据这些智能合约的非正式描述和Solidity程序判断它们是否存在问题。我们的经验表明谓词转换网的适用性和适宜性。我们相信,我们的方法可以帮助智能合约设计者在当前使用智能合约的非正式文本描述的实践中发现和防止早期设计问题。
{"title":"Modeling and Analyzing Smart Contracts using Predicate Transition Nets","authors":"Xudong He","doi":"10.1109/QRS-C51114.2020.00029","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00029","url":null,"abstract":"Blockchain technology has gained wide acceptance in recent years. Smart contracts facilitate the application of the blockchain technology. Smart contracts are programs running distributed environments and are thus error prone. Smart contracts often lack precise specifications and are written in high-level programming languages such as Solidity. In this paper, we present an approach to formally model and analyze smart contracts using predicate transitions nets. We use the blind auction smart contract to demonstrate our approach, which reveals some problematic implementation of some smart contract functions. We have applied predicate transition nets in modeling and analyzing all 11 smart contracts in Azure blockchain workbench. Although we cannot tell whether there is any problem in these smart contracts based on their informal descriptions and Solidity programs without designer input. Our experience has shown the applicability and suitability of predicate transition nets. We believe that our approach can help smart contract designers to detect and prevent early design problems in the current practice of using informal textual descriptions of smart contracts.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"25 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Creative Computing based Experimental Study of Somatosensory Games for Promoting Intention Understanding 基于创造性计算的体感游戏促进意图理解的实验研究
Jie Jian, Xiaotong Zhang, Ping-Ping Ma
This paper attempts to understand the theoretical connotation of creative computing constructively through an experimental study. In this experiment, the somatosensory game designed and developed by integrating multidisciplinary knowledge and human power can help leaners develop their intention understanding ability. The data showed that the leaners in the experimental group performed better in intention understanding tasks in the somatosensory interaction environment. The activation of motor related brain regions in mirror neurons may be the basis for understanding the experimental results. From the design and conclusion of this experiment, we constructively verify that a creative computing based method is an effective one.
本文试图通过实验研究,建设性地理解创造性计算的理论内涵。在本实验中,结合多学科知识和人力资源设计开发的体感游戏可以帮助学习者发展意图理解能力。实验结果表明,实验组学习者在体感交互环境下的意图理解任务中表现较好。镜像神经元中运动相关脑区的激活可能是理解实验结果的基础。从实验的设计和结论中,我们建设性地验证了一种基于创造性计算的方法是有效的。
{"title":"Creative Computing based Experimental Study of Somatosensory Games for Promoting Intention Understanding","authors":"Jie Jian, Xiaotong Zhang, Ping-Ping Ma","doi":"10.1109/QRS-C51114.2020.00112","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00112","url":null,"abstract":"This paper attempts to understand the theoretical connotation of creative computing constructively through an experimental study. In this experiment, the somatosensory game designed and developed by integrating multidisciplinary knowledge and human power can help leaners develop their intention understanding ability. The data showed that the leaners in the experimental group performed better in intention understanding tasks in the somatosensory interaction environment. The activation of motor related brain regions in mirror neurons may be the basis for understanding the experimental results. From the design and conclusion of this experiment, we constructively verify that a creative computing based method is an effective one.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131442560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Prioritizing Vulnerability Testing 对漏洞测试进行优先排序
Halit Alptekin, Simge Demir, Şevval Şimşek, Cemal Yilmaz
Vulnerability assessment is the process of identifying and prioritizing the vulnerabilities in a system. Vulnerability scanners can, for example, scan a website for known vulnerabilities by running a repository of security tests, each of which is designed to reveal a known vulnerability. As the security tests need to be executed on each and every web page encountered, it may take quite a while for these scanners to report vulnerabilities. In this work, we present an approach for revealing the vulnerabilities faster by prioritizing the executions of the security tests on a per web page basis. The approach is based on a simple conjecture that “similar” web pages may possess “similar” vulnerabilities and that identifying these similarities can help prioritize the security tests. The results of the experiments we carried out by using 2927 distinct web pages (collected from 80 web sites), support our basic hypothesis; the percentages of the times the actual vulnerabilities appear in the top 8 and 15 predicted vulnerabilities were 86.9% and 98.4%, respectively.
脆弱性评估是识别系统中的脆弱性并确定其优先级的过程。例如,漏洞扫描器可以通过运行一个安全测试库来扫描一个网站,寻找已知的漏洞,每个测试库都旨在揭示一个已知的漏洞。由于安全测试需要在遇到的每个网页上执行,这些扫描器可能需要相当长的时间才能报告漏洞。在这项工作中,我们提出了一种通过在每个网页的基础上优先执行安全测试来更快地揭示漏洞的方法。该方法基于一个简单的猜想,即“相似”的网页可能具有“相似”的漏洞,并且识别这些相似性可以帮助确定安全测试的优先级。我们使用2927个不同的网页(收集自80个网站)进行的实验结果支持我们的基本假设;实际漏洞出现在预测漏洞前8名和前15名的次数分别为86.9%和98.4%。
{"title":"Towards Prioritizing Vulnerability Testing","authors":"Halit Alptekin, Simge Demir, Şevval Şimşek, Cemal Yilmaz","doi":"10.1109/qrs-c51114.2020.00114","DOIUrl":"https://doi.org/10.1109/qrs-c51114.2020.00114","url":null,"abstract":"Vulnerability assessment is the process of identifying and prioritizing the vulnerabilities in a system. Vulnerability scanners can, for example, scan a website for known vulnerabilities by running a repository of security tests, each of which is designed to reveal a known vulnerability. As the security tests need to be executed on each and every web page encountered, it may take quite a while for these scanners to report vulnerabilities. In this work, we present an approach for revealing the vulnerabilities faster by prioritizing the executions of the security tests on a per web page basis. The approach is based on a simple conjecture that “similar” web pages may possess “similar” vulnerabilities and that identifying these similarities can help prioritize the security tests. The results of the experiments we carried out by using 2927 distinct web pages (collected from 80 web sites), support our basic hypothesis; the percentages of the times the actual vulnerabilities appear in the top 8 and 15 predicted vulnerabilities were 86.9% and 98.4%, respectively.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches 基于公理方法的面向属性的软件可信度度量分解
H. Tao, Yixiang Chen, Hengyang Wu
In order to make the software trustworthiness measures more rigorous, we once applied axiomatic approaches to measure software trustworthiness, and established a software trustworthiness measure based on the decomposition of attributes (STMBDA for short). For the sake of validating the effectiveness of STMBDA, in this paper we use it to assess the trustworthiness of 23 spacecraft softwares whose total code is about 300,000 lines. The validation result shows that STMBDA can effectively evaluate the trustworthiness of the spacecraft softwares and identify the weak links in the development process.
为了使软件可信度度量更加严格,我们曾采用公理方法对软件可信度进行度量,建立了基于属性分解的软件可信度度量(简称STMBDA)。为了验证STMBDA的有效性,本文利用它对23个航天器软件的可信度进行了评估,这些软件的代码总数约为30万行。验证结果表明,STMBDA能够有效地评估航天器软件的可信度,识别开发过程中的薄弱环节。
{"title":"Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches","authors":"H. Tao, Yixiang Chen, Hengyang Wu","doi":"10.1109/QRS-C51114.2020.00060","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00060","url":null,"abstract":"In order to make the software trustworthiness measures more rigorous, we once applied axiomatic approaches to measure software trustworthiness, and established a software trustworthiness measure based on the decomposition of attributes (STMBDA for short). For the sake of validating the effectiveness of STMBDA, in this paper we use it to assess the trustworthiness of 23 spacecraft softwares whose total code is about 300,000 lines. The validation result shows that STMBDA can effectively evaluate the trustworthiness of the spacecraft softwares and identify the weak links in the development process.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"17 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1