首页 > 最新文献

2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)最新文献

英文 中文
Synthesized dataset for search-based test data generation methods focused on MC/DC criterion 以MC/DC准则为核心的基于搜索的测试数据生成方法合成数据集
Ján Cegin, K. Rástočný, M. Bieliková
Unit testing focused on the Modified Condition/Decision Coverage (MC/DC) criterion is essential in development of safety-critical systems as recommended by international standards. Designing unit tests for such specific software is time-consuming task which can be partially automated by test data generation methods. Special attention is given to search-based methods which are often used for problems where traditional methods like symbolic execution fall short. However, no publicly available dataset for evaluation of such methods taking into account specifics of the MC/DC criterion, which is esential for safety-critical systems. In this paper we present an analysis of software of safety-critical systems and we postulate to find a fitting open source project which could serve as a synthesized dataset for future evaluations of search-based test data generation methods for the MC/DC criterion.
基于修改条件/决策覆盖(MC/DC)标准的单元测试在国际标准推荐的安全关键系统开发中至关重要。为这种特定的软件设计单元测试是一项耗时的任务,可以通过测试数据生成方法部分地自动化。特别关注基于搜索的方法,它经常用于传统方法(如符号执行)无法解决的问题。然而,考虑到MC/DC标准的细节,没有公开可用的数据集来评估这些方法,这对于安全关键系统是必不可少的。在本文中,我们对安全关键系统的软件进行了分析,并假设找到一个合适的开源项目,该项目可以作为MC/DC标准的基于搜索的测试数据生成方法的综合数据集。
{"title":"Synthesized dataset for search-based test data generation methods focused on MC/DC criterion","authors":"Ján Cegin, K. Rástočný, M. Bieliková","doi":"10.1109/QRS-C51114.2020.00118","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00118","url":null,"abstract":"Unit testing focused on the Modified Condition/Decision Coverage (MC/DC) criterion is essential in development of safety-critical systems as recommended by international standards. Designing unit tests for such specific software is time-consuming task which can be partially automated by test data generation methods. Special attention is given to search-based methods which are often used for problems where traditional methods like symbolic execution fall short. However, no publicly available dataset for evaluation of such methods taking into account specifics of the MC/DC criterion, which is esential for safety-critical systems. In this paper we present an analysis of software of safety-critical systems and we postulate to find a fitting open source project which could serve as a synthesized dataset for future evaluations of search-based test data generation methods for the MC/DC criterion.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116784261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions 交换安全可用的加密货币交易的准备信息
Oliver Kattwinkel, Michael Rademacher
In 2008, the cryptocurrency Bitcoin, which is equivalent to the original idea of a blockchain, emerged as a new currency and revolutionized the digital exchange of value. Despite the great user and research interest, the customary practice is still complex. Poor usability and negative user experience lead to several security threats. This work examines the mitigation of third party attack vectors and non-malicious human failure types identified in the personal payment process. Current approaches are analyzed and a new payment protocol is specified to foster the exchange of preparatory payment information. The qualitative evaluation reveals a significant improvement over the current best-practice exchange procedure. The system demonstrates a balance between security and usability and provides a method for more user-friendly blockchain transactions.
2008年,相当于区块链最初想法的加密货币比特币作为一种新货币出现,彻底改变了数字价值交换。尽管有很大的用户和研究兴趣,习惯的实践仍然是复杂的。较差的可用性和负面的用户体验会导致一些安全威胁。这项工作研究了在个人支付过程中识别的第三方攻击向量和非恶意人为故障类型的缓解。分析了目前的方法,并指定了一种新的支付协议,以促进预备支付信息的交换。定性评价表明,在目前最佳做法交流程序的基础上有了重大改进。该系统展示了安全性和可用性之间的平衡,并提供了一种更加用户友好的区块链交易方法。
{"title":"Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions","authors":"Oliver Kattwinkel, Michael Rademacher","doi":"10.1109/QRS-C51114.2020.00032","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00032","url":null,"abstract":"In 2008, the cryptocurrency Bitcoin, which is equivalent to the original idea of a blockchain, emerged as a new currency and revolutionized the digital exchange of value. Despite the great user and research interest, the customary practice is still complex. Poor usability and negative user experience lead to several security threats. This work examines the mitigation of third party attack vectors and non-malicious human failure types identified in the personal payment process. Current approaches are analyzed and a new payment protocol is specified to foster the exchange of preparatory payment information. The qualitative evaluation reveals a significant improvement over the current best-practice exchange procedure. The system demonstrates a balance between security and usability and provides a method for more user-friendly blockchain transactions.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Overview of the EMUs Maintenance Scheduling in China 中国动车组维护计划概述
Wenqiang Zheng, Taotao Zhou, Yanfu Li
The maintenance of electric multiple units (EMUs) has significant importance in ensuring the safe operation of EMUs. However, there have been limited experiences especially on the EMUs high-level maintenance scheduling which needs more research efforts. This paper presents an overview of both EMUs high-level and elementary maintenance scheduling in China. The current practice of maintenance scheduling is briefly summarized. Moreover, the key factors involved in the high-level maintenance scheduling are discussed, which can be basic guidelines to formulate constraints in modeling these scheduling problems. This study would benefit the researchers interested in the research of EMUs high-level maintenance scheduling and further studies could be performed to formulate an optimization model to systematically the balance between maintenance resources and economic operations.
电动车组的维护对保证电动车组的安全运行具有重要意义。但是在动车组的高水平维修调度方面经验有限,需要更多的研究。本文介绍了国内动车组高水平和初级维修计划的概况。简要总结了目前维修调度的实践。此外,本文还讨论了高层维修调度中涉及的关键因素,这些因素可以作为制定这些调度问题建模约束的基本准则。本研究可为动车组高层维修计划的研究提供参考,并可进一步研究建立系统的维修资源与经济运行平衡的优化模型。
{"title":"An Overview of the EMUs Maintenance Scheduling in China","authors":"Wenqiang Zheng, Taotao Zhou, Yanfu Li","doi":"10.1109/QRS-C51114.2020.00058","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00058","url":null,"abstract":"The maintenance of electric multiple units (EMUs) has significant importance in ensuring the safe operation of EMUs. However, there have been limited experiences especially on the EMUs high-level maintenance scheduling which needs more research efforts. This paper presents an overview of both EMUs high-level and elementary maintenance scheduling in China. The current practice of maintenance scheduling is briefly summarized. Moreover, the key factors involved in the high-level maintenance scheduling are discussed, which can be basic guidelines to formulate constraints in modeling these scheduling problems. This study would benefit the researchers interested in the research of EMUs high-level maintenance scheduling and further studies could be performed to formulate an optimization model to systematically the balance between maintenance resources and economic operations.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"141 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model-based RCM Analysis Method 基于模型的RCM分析方法
Zhibao Mian, Shuli Jia, Xiaodong Shi, Cairong Tang, Junjie Chen, Y. Gao
The reliability-centered maintenance (RCM) is one of the most advanced maintenance plan generating technologies for equipments. At present, the key technologies such as FMEA and FMECA supporting the RCM analysis remains in the manual stage in some enterprises. The disadvantages are time-consuming, labour-intensive and error-prone. For complex systems containing thousands of components, to achieve a fast and effective FMECA analysis is difficult. RCM should benefit from the most advanced model-based systems engineering methods. In this paper, a model-based RCM analysis framework (MRAF) is presented. Based on this framework, RCM analysts can use model-based reliability analysis techniques, such as AADL, to model the system architecture and faults information. Then the AADL-based analysis platform OSATE can be used to automatically produce the FMEA. By combining the generated FMEA with the criticality analysis (CA) technology, this paper can semiautomatically generate the FMECA for equipments and systems being analyzed by RCM.
以可靠性为中心的维护(RCM)是目前最先进的设备维护计划生成技术之一。目前,一些企业对支持RCM分析的FMEA、FMECA等关键技术还停留在手工阶段。缺点是费时、费力且容易出错。对于包含数千个组件的复杂系统,实现快速有效的FMECA分析是困难的。RCM应该受益于最先进的基于模型的系统工程方法。本文提出了一个基于模型的RCM分析框架(MRAF)。基于该框架,RCM分析人员可以使用基于模型的可靠性分析技术,如AADL,对系统架构和故障信息进行建模。然后利用基于aadl的分析平台OSATE自动生成FMEA。本文将生成的FMEA与临界性分析(CA)技术相结合,实现了对RCM分析的设备和系统的FMECA的半自动生成。
{"title":"A Model-based RCM Analysis Method","authors":"Zhibao Mian, Shuli Jia, Xiaodong Shi, Cairong Tang, Junjie Chen, Y. Gao","doi":"10.1109/QRS-C51114.2020.00059","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00059","url":null,"abstract":"The reliability-centered maintenance (RCM) is one of the most advanced maintenance plan generating technologies for equipments. At present, the key technologies such as FMEA and FMECA supporting the RCM analysis remains in the manual stage in some enterprises. The disadvantages are time-consuming, labour-intensive and error-prone. For complex systems containing thousands of components, to achieve a fast and effective FMECA analysis is difficult. RCM should benefit from the most advanced model-based systems engineering methods. In this paper, a model-based RCM analysis framework (MRAF) is presented. Based on this framework, RCM analysts can use model-based reliability analysis techniques, such as AADL, to model the system architecture and faults information. Then the AADL-based analysis platform OSATE can be used to automatically produce the FMEA. By combining the generated FMEA with the criticality analysis (CA) technology, this paper can semiautomatically generate the FMECA for equipments and systems being analyzed by RCM.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TTCN-3 based NG112 Test System and Playground for Emergency Communication 基于TTCN-3的NG112测试系统及应急通信平台
Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Y. Rebahi
Great research efforts are made towards transferring additional data, such as location and sensor information, within the duration of an NG112 call. Especially in the field of emergency communication, the transmission of eHealth sensor data, which provide information about the vital parameters of a person in need of help, could improve the overall rescue operation. Since emergency calls are time-critical, it is necessary to analyse the impact of the attached sensor data on the emergency call system. In this paper, we present a TTCN-3 Test System that emulates smart devices by sending simulated sensor data via Bluetooth to a smartphone to trigger automated emergency calls. This emergency call is routed through an NG112 platform back to the Test System to measure the latency between sending the data and receiving the call. By incrementing the number of simulated sensors, the impact of the attached sensor data can be evaluated.
为了在NG112呼叫期间传输额外的数据,例如位置和传感器信息,进行了大量的研究工作。特别是在应急通信领域,eHealth传感器数据的传输可以提供有关需要帮助的人的重要参数的信息,可以改善整体救援行动。由于紧急呼叫具有时间要求,因此有必要分析所附传感器数据对紧急呼叫系统的影响。在本文中,我们提出了一个TTCN-3测试系统,该系统通过蓝牙向智能手机发送模拟传感器数据来模拟智能设备,从而触发自动紧急呼叫。此紧急呼叫通过NG112平台路由回测试系统,以测量发送数据和接收呼叫之间的延迟。通过增加模拟传感器的数量,可以评估附加传感器数据的影响。
{"title":"TTCN-3 based NG112 Test System and Playground for Emergency Communication","authors":"Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Y. Rebahi","doi":"10.1109/QRS-C51114.2020.00088","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00088","url":null,"abstract":"Great research efforts are made towards transferring additional data, such as location and sensor information, within the duration of an NG112 call. Especially in the field of emergency communication, the transmission of eHealth sensor data, which provide information about the vital parameters of a person in need of help, could improve the overall rescue operation. Since emergency calls are time-critical, it is necessary to analyse the impact of the attached sensor data on the emergency call system. In this paper, we present a TTCN-3 Test System that emulates smart devices by sending simulated sensor data via Bluetooth to a smartphone to trigger automated emergency calls. This emergency call is routed through an NG112 platform back to the Test System to measure the latency between sending the data and receiving the call. By incrementing the number of simulated sensors, the impact of the attached sensor data can be evaluated.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"85 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzing of Mobile Application in the Banking Domain: a Case Study 银行领域移动应用的模糊化:一个案例研究
Martin A. Schneider, Marc-Florian Wendland, Abdurrahman Akin, Serafettin Sentürk
Mobile applications are today ubiquitous, and everybody uses them on a daily basis. This applies also to security-critical mobile applications such as online banking apps. In today's architectures, these mobile applications are usually fed from the same source as mobile applications on smart phones, i.e. web services. This makes security testing of web services inevitable. Furthermore, regulation increases and requires stronger security mechanisms as with the strong customer authentication from the Revised European Payment Services Directive (PSD2). Automated security testing is a way to cope with the increasing requirements on assuring the security of such web services and their implemented security controls whilst dealing with decreasing resources for such efforts. In this paper, we present our experiences from a case study provided by Kuveyt Türk Bank performed within the ITEA-3 project TESTOMAT where we introduced automated security testing in terms of fuzzing to complement manual security testing.
如今,移动应用无处不在,每个人每天都在使用它们。这也适用于对安全至关重要的移动应用程序,如网上银行应用程序。在今天的架构中,这些移动应用程序通常来自与智能手机上的移动应用程序相同的来源,即web服务。这使得对web服务进行安全测试成为必然。此外,监管增加,需要更强大的安全机制,如修订后的欧洲支付服务指令(PSD2)中的强大客户身份验证。自动化的安全性测试是一种方法,用于处理不断增加的需求,确保此类web服务及其实现的安全控制的安全性,同时处理此类工作的资源减少。在本文中,我们展示了Kuveyt trk Bank在ITEA-3项目TESTOMAT中提供的案例研究的经验,在TESTOMAT中,我们根据模糊测试引入了自动化安全性测试,以补充手动安全性测试。
{"title":"Fuzzing of Mobile Application in the Banking Domain: a Case Study","authors":"Martin A. Schneider, Marc-Florian Wendland, Abdurrahman Akin, Serafettin Sentürk","doi":"10.1109/QRS-C51114.2020.00087","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00087","url":null,"abstract":"Mobile applications are today ubiquitous, and everybody uses them on a daily basis. This applies also to security-critical mobile applications such as online banking apps. In today's architectures, these mobile applications are usually fed from the same source as mobile applications on smart phones, i.e. web services. This makes security testing of web services inevitable. Furthermore, regulation increases and requires stronger security mechanisms as with the strong customer authentication from the Revised European Payment Services Directive (PSD2). Automated security testing is a way to cope with the increasing requirements on assuring the security of such web services and their implemented security controls whilst dealing with decreasing resources for such efforts. In this paper, we present our experiences from a case study provided by Kuveyt Türk Bank performed within the ITEA-3 project TESTOMAT where we introduced automated security testing in terms of fuzzing to complement manual security testing.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of State-of-Art Autonomous Driving Technologies with Deep Learning 基于深度学习的最新自动驾驶技术综述
Yu Huang, Yue Chen
This is a survey of autonomous driving technologies with deep learning methods. We investigate the major fields of self-driving systems, such as perception, mapping and localization, prediction, planning and control, simulation, V2X and safety etc. Due to the limited space, we focus the analysis on several key areas, i.e. 3D object detection, depth estimation from cameras, multiple sensor fusion on the data, feature and task level respectively, behavior modelling and prediction of vehicle driving and pedestrian trajectories.
这是一个关于深度学习方法的自动驾驶技术的调查。我们研究了自动驾驶系统的主要领域,如感知、地图和定位、预测、规划和控制、仿真、V2X和安全等。由于篇幅所限,本文将重点分析几个关键领域,即3D目标检测、相机深度估计、多传感器数据融合、特征和任务级别、车辆驾驶和行人轨迹的行为建模和预测。
{"title":"Survey of State-of-Art Autonomous Driving Technologies with Deep Learning","authors":"Yu Huang, Yue Chen","doi":"10.1109/QRS-C51114.2020.00045","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00045","url":null,"abstract":"This is a survey of autonomous driving technologies with deep learning methods. We investigate the major fields of self-driving systems, such as perception, mapping and localization, prediction, planning and control, simulation, V2X and safety etc. Due to the limited space, we focus the analysis on several key areas, i.e. 3D object detection, depth estimation from cameras, multiple sensor fusion on the data, feature and task level respectively, behavior modelling and prediction of vehicle driving and pedestrian trajectories.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132660671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Black-Box Testing of Financial Virtual Assistants 金融虚拟助手的黑盒测试
I. Itkin, E. Treshcheva, Luba Konnova, Pavel Braslavski, R. Yavorskiy
We propose a hybrid technique of black-box testing of virtual assistants (VAs) in the financial sector. The specifics of the highly regulated industry imposes numerous limitations on the testing process: GDPR and other data protection requirements, the absence of interaction logs with real users, restricted access to internal data, etc. These limitations also decrease the applicability of a few VA testing methods that are widely described in the research literature. The approach suggested in this paper consists of semi-controlled interaction logging from the trained testers and subsequent augmenting the collected data for automated testing.
我们提出了一种混合技术的黑盒测试的虚拟助理(VAs)在金融部门。高度监管的行业的特殊性给测试过程带来了许多限制:GDPR和其他数据保护要求,缺乏与真实用户的交互日志,限制访问内部数据等。这些限制也降低了研究文献中广泛描述的一些VA测试方法的适用性。本文中建议的方法包括来自训练有素的测试人员的半控制交互记录,以及随后为自动化测试增加收集的数据。
{"title":"Black-Box Testing of Financial Virtual Assistants","authors":"I. Itkin, E. Treshcheva, Luba Konnova, Pavel Braslavski, R. Yavorskiy","doi":"10.1109/QRS-C51114.2020.00120","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00120","url":null,"abstract":"We propose a hybrid technique of black-box testing of virtual assistants (VAs) in the financial sector. The specifics of the highly regulated industry imposes numerous limitations on the testing process: GDPR and other data protection requirements, the absence of interaction logs with real users, restricted access to internal data, etc. These limitations also decrease the applicability of a few VA testing methods that are widely described in the research literature. The approach suggested in this paper consists of semi-controlled interaction logging from the trained testers and subsequent augmenting the collected data for automated testing.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"29 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A general and efficient framework for improving Balanced Failure Biasing 一种改进平衡失效偏置的通用有效框架
S. Mao, M. Zhang, Jiaohong Yan, Yao Chen
Balanced Failure Biasing (BFB) is a way to simulate the probability of reaching a rare goal state in highly reliable Markovian systems (HRMSs). BFB gives the same probability to each ralely-arrived path of one state, therefore leading to large expenditures on paths with little influence on results. We propose a new framework using Stratified Sampling, which is a general and efficient framework for improving BFB. We introduce Stratified Sampling on BFB (SBFB), which divides the original state space into many subspaces, and rearranges the attention on each subspace. To make a further reduction on average path length, we introduce Stratified Sampling on Distance-based BFB (SBFB-D). According to experiments based on case of Workstation Cluster and case of Distributed Database System, SBFB has about 0.07% and 2.13% relative error on these two cases respectively, while SBFB-D has about 0.07% and 0.197%, comparing to standard BFB's 11.1% and 11.1%. Besides, SBFB spends about 12.30s and 28.65s on path simulation respectively, while SBFB-D spends about 13.10s and 17.40s, comparing to standard-BFB's 26.44s and 36.78s.
平衡故障偏置(BFB)是一种模拟高可靠马尔可夫系统(hrms)达到罕见目标状态的概率的方法。BFB对每个到达同一状态的路径给出相同的概率,因此导致在路径上花费很大,但对结果影响很小。我们提出了一种新的分层抽样框架,这是一种通用的、有效的改进BFB的框架。引入分层抽样(SBFB),将原始状态空间划分为多个子空间,并重新安排每个子空间上的注意力。为了进一步减少平均路径长度,我们引入了基于距离的BFB分层采样(SBFB-D)。基于工作站集群案例和分布式数据库系统案例的实验表明,与标准BFB的11.1%和11.1%相比,SBFB在这两种情况下的相对误差分别为0.07%和2.13%,SBFB- d的相对误差分别为0.07%和0.197%。此外,SBFB的路径模拟时间分别为12.30秒和28.65秒,SBFB- d的路径模拟时间分别为13.10秒和17.40秒,而标准bfb的路径模拟时间分别为26.44秒和36.78秒。
{"title":"A general and efficient framework for improving Balanced Failure Biasing","authors":"S. Mao, M. Zhang, Jiaohong Yan, Yao Chen","doi":"10.1109/QRS-C51114.2020.00081","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00081","url":null,"abstract":"Balanced Failure Biasing (BFB) is a way to simulate the probability of reaching a rare goal state in highly reliable Markovian systems (HRMSs). BFB gives the same probability to each ralely-arrived path of one state, therefore leading to large expenditures on paths with little influence on results. We propose a new framework using Stratified Sampling, which is a general and efficient framework for improving BFB. We introduce Stratified Sampling on BFB (SBFB), which divides the original state space into many subspaces, and rearranges the attention on each subspace. To make a further reduction on average path length, we introduce Stratified Sampling on Distance-based BFB (SBFB-D). According to experiments based on case of Workstation Cluster and case of Distributed Database System, SBFB has about 0.07% and 2.13% relative error on these two cases respectively, while SBFB-D has about 0.07% and 0.197%, comparing to standard BFB's 11.1% and 11.1%. Besides, SBFB spends about 12.30s and 28.65s on path simulation respectively, while SBFB-D spends about 13.10s and 17.40s, comparing to standard-BFB's 26.44s and 36.78s.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"63 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function 具有远程维护功能的医疗物联网系统安全、保障与隐私平衡的风险评估方法
R. Sasaki
It is necessary to evaluate the risk of Internet of Things (IoT) systems not only in terms of security and privacy but also in terms of safety. In addition, because IoT systems are distributed over a wide area, the risk evaluation should consider remote maintenance. Therefore, it is necessary to conduct risk assessment based on the maintainability, safety, security, and privacy (MSSP) concept to realize these four indices in a well-balanced manner. To this end, we proposed an enhanced method that has the function not only to clarify the magnitude of the risk before the measure but also to find an optimal combination of measure plan. As a result of applying this method and the support program named PMSSP to an under-the-sheet type medical IoT monitoring system for multiple vital signs, and we were able to specifically determine the optimal combination of measures.
对物联网(IoT)系统的风险进行评估,不仅要从安全性和隐私性方面考虑,还要从安全性方面考虑。此外,由于物联网系统分布在广泛的区域,因此风险评估应考虑远程维护。因此,有必要基于可维护性、安全性、安全性和隐私性(MSSP)的概念进行风险评估,以均衡地实现这四个指标。为此,我们提出了一种增强方法,该方法不仅可以在度量之前明确风险的大小,而且可以找到最优的度量方案组合。通过将该方法和名为PMSSP的支持项目应用于膜下式医疗物联网多个生命体征监测系统,我们能够具体确定措施的最佳组合。
{"title":"Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function","authors":"R. Sasaki","doi":"10.1109/QRS-C51114.2020.00040","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00040","url":null,"abstract":"It is necessary to evaluate the risk of Internet of Things (IoT) systems not only in terms of security and privacy but also in terms of safety. In addition, because IoT systems are distributed over a wide area, the risk evaluation should consider remote maintenance. Therefore, it is necessary to conduct risk assessment based on the maintainability, safety, security, and privacy (MSSP) concept to realize these four indices in a well-balanced manner. To this end, we proposed an enhanced method that has the function not only to clarify the magnitude of the risk before the measure but also to find an optimal combination of measure plan. As a result of applying this method and the support program named PMSSP to an under-the-sheet type medical IoT monitoring system for multiple vital signs, and we were able to specifically determine the optimal combination of measures.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1