首页 > 最新文献

2014 IEEE Eighth International Conference on Software Security and Reliability-Companion最新文献

英文 中文
System Call Anomaly Detection Using Multi-HMMs 基于multi - hmm的系统调用异常检测
E. Yolacan, Jennifer G. Dy, D. Kaeli
This paper focuses on techniques to detect anomalous behavior in system call sequences. Since profiling complex sequential data is still an open problem in anomaly detection, there is a need to explore new approaches. While previous research has used Hidden Markov Models (HMMs) for anomaly-based intrusion detection, the proposed models tend to increase rapidly in complexity in order to increase the detection rate while reducing the false detections. In this paper, we propose a multi-HMMapproach applied for anomaly detection in clustered system call sequences. We run our experiments using the well-known system call data set provided by the University of New Mexico (UNM). Our process trace clustering approach using HMMs for system call anomaly detection provides accurate results and reduces the complexity required to detect anomalies. In this paper, we show how system call traces processed with our HMM method can provide a path forward to improved intrusion detection techniques.
本文主要研究系统调用序列中异常行为的检测技术。由于分析复杂序列数据在异常检测中仍然是一个开放的问题,因此需要探索新的方法。虽然以往的研究使用隐马尔可夫模型(hmm)进行基于异常的入侵检测,但为了提高检测率和减少误检测,所提出的模型往往会迅速增加复杂性。本文提出了一种应用于集群系统调用序列异常检测的多hmm方法。我们使用新墨西哥大学(UNM)提供的著名系统调用数据集来运行我们的实验。我们使用hmm进行系统调用异常检测的过程跟踪聚类方法提供了准确的结果,并降低了检测异常所需的复杂性。在本文中,我们展示了如何用HMM方法处理系统调用跟踪,从而为改进入侵检测技术提供了一条途径。
{"title":"System Call Anomaly Detection Using Multi-HMMs","authors":"E. Yolacan, Jennifer G. Dy, D. Kaeli","doi":"10.1109/SERE-C.2014.19","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.19","url":null,"abstract":"This paper focuses on techniques to detect anomalous behavior in system call sequences. Since profiling complex sequential data is still an open problem in anomaly detection, there is a need to explore new approaches. While previous research has used Hidden Markov Models (HMMs) for anomaly-based intrusion detection, the proposed models tend to increase rapidly in complexity in order to increase the detection rate while reducing the false detections. In this paper, we propose a multi-HMMapproach applied for anomaly detection in clustered system call sequences. We run our experiments using the well-known system call data set provided by the University of New Mexico (UNM). Our process trace clustering approach using HMMs for system call anomaly detection provides accurate results and reduces the complexity required to detect anomalies. In this paper, we show how system call traces processed with our HMM method can provide a path forward to improved intrusion detection techniques.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124966388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks 移动Ad Hoc网络中网络层攻击及AODV防御研究综述
Amna Saeed, Asad Raza, Haider Abbas
Rapid progress in technology have also increased the demand of networked systems. Due to the significance of information that travels through these systems, security issues in wired and wireless networks have become a prime concern. Mobile Ad hoc Networks (MANET) is a promising technology that provides robust and convenient networking options in a number of situations. However, MANETs are more vulnerable to security threats due to their dynamic and undefined organization structure. This paper presents a detailed review analysis of the security requirements of MANETs. The focus of this research is the network layer security problems in MANETs. The study was carried out for network layer attacks and Ad-hoc On Demand Distance Vector (AODV) routing protocol and some of its variants that provide security solutions to network layer attacks in MANETs.
技术的飞速发展也增加了对网络化系统的需求。由于通过这些系统传输的信息的重要性,有线和无线网络中的安全问题已成为主要关注的问题。移动自组织网络(MANET)是一种很有前途的技术,它在许多情况下提供了健壮和方便的网络选项。然而,由于其动态和不确定的组织结构,manet更容易受到安全威胁。本文对manet的安全需求进行了详细的回顾分析。本文研究的重点是manet中的网络层安全问题。该研究针对网络层攻击和Ad-hoc随需应变距离矢量(AODV)路由协议及其一些变体进行,这些变体为manet中的网络层攻击提供了安全解决方案。
{"title":"A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks","authors":"Amna Saeed, Asad Raza, Haider Abbas","doi":"10.1109/SERE-C.2014.37","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.37","url":null,"abstract":"Rapid progress in technology have also increased the demand of networked systems. Due to the significance of information that travels through these systems, security issues in wired and wireless networks have become a prime concern. Mobile Ad hoc Networks (MANET) is a promising technology that provides robust and convenient networking options in a number of situations. However, MANETs are more vulnerable to security threats due to their dynamic and undefined organization structure. This paper presents a detailed review analysis of the security requirements of MANETs. The focus of this research is the network layer security problems in MANETs. The study was carried out for network layer attacks and Ad-hoc On Demand Distance Vector (AODV) routing protocol and some of its variants that provide security solutions to network layer attacks in MANETs.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System Reliability 为提高缓存命中率和系统可靠性的编译器辅助指令重定位
Benbin Chen, Lin Li, Yiyang Li, Hongyin Luo, Donghui Guo
Because the spatial and temporal locality of program codes, compiler could use heuristics and profile guided prediction to relocate the output of program codes to reduce the cache confliction. In this paper, for improving the average accessing time of memory subsystem by raising the cache hit rate, hybrid compiler assisted prediction and relocation techniques are proposed. Different with the traditional scheme that provide the fixed heuristics predication for various kinds of programs, the more elaborate scheme with command line direction and the markov based heuristics algorithm with different parameters is adopted for program prediction in this paper. As a result, the sequential instructions layout based on the executing probability and frequency ensures the benefit to cache hit rate and the fetch unit of processor, meanwhile in favour of the system reliability.
由于程序代码在空间和时间上的局部性,编译器可以利用启发式和概要引导预测来重新定位程序代码的输出,以减少缓存冲突。为了通过提高缓存命中率来提高内存子系统的平均访问时间,本文提出了混合编译器辅助预测和重定位技术。与传统方案对各类程序提供固定的启发式预测不同,本文采用了更为精细的命令行方向方案和基于马尔可夫的不同参数启发式算法进行程序预测。因此,基于执行概率和频率的顺序指令布局保证了缓存命中率和处理器提取单元的优势,同时有利于系统的可靠性。
{"title":"Compiler Assisted Instruction Relocation for Performance Improvement of Cache Hit Rate and System Reliability","authors":"Benbin Chen, Lin Li, Yiyang Li, Hongyin Luo, Donghui Guo","doi":"10.1109/SERE-C.2014.46","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.46","url":null,"abstract":"Because the spatial and temporal locality of program codes, compiler could use heuristics and profile guided prediction to relocate the output of program codes to reduce the cache confliction. In this paper, for improving the average accessing time of memory subsystem by raising the cache hit rate, hybrid compiler assisted prediction and relocation techniques are proposed. Different with the traditional scheme that provide the fixed heuristics predication for various kinds of programs, the more elaborate scheme with command line direction and the markov based heuristics algorithm with different parameters is adopted for program prediction in this paper. As a result, the sequential instructions layout based on the executing probability and frequency ensures the benefit to cache hit rate and the fetch unit of processor, meanwhile in favour of the system reliability.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Static and Dynamic Pairs on Pair Programming 静态和动态对结对编程的影响
Rajendran Swamidurai, D. Umphress
Pair programming is a programming technique in which pair of people doing programming on a single machine. The programming pair consists of a driver and a navigator or observer. The driver addresses the operational issues; i.e., responsible for implementing the current module in hand. The navigator addresses the strategic issues; i.e., keeps in mind the strategic direction the code must take. Pair programming is a dynamic process and pairing aids the rapid dispersal of system knowledge through the team while developing it. Since most of the pair programming experiments were not conducted as described in extreme programming and the empirical evidence of pair programming is mixed we were not got the true picture about the impact created by pair programming on software development. In this paper, we evaluated the dynamic pair programming methodology with static pair programming and traditional individual programming. The empirical evidence shows that static pair programming is the most expensive and slower technology than dynamic pair programming and individual programming technologies. It also indicates that dynamic pair programming is the fastest software development methodology than static pair programming and traditional individual programming methodologies.
结对编程是一种编程技术,其中一对人在一台机器上进行编程。编程对由一个驱动程序和一个导航器或观察者组成。驱动程序处理操作问题;即,负责实现手头的当前模块。导航员处理战略问题;也就是说,记住代码必须采取的战略方向。结对编程是一个动态的过程,结对有助于系统知识在开发过程中通过团队快速传播。由于大多数结对编程实验并没有像极端编程中描述的那样进行,并且结对编程的经验证据是混合的,因此我们没有得到结对编程对软件开发产生影响的真实情况。本文将动态结对规划方法与静态结对规划和传统的个体规划方法进行了比较。经验证据表明,静态结对编程是比动态结对编程和个体编程技术最昂贵和最慢的技术。它还表明动态结对编程是比静态结对编程和传统的个体编程方法最快的软件开发方法。
{"title":"The Impact of Static and Dynamic Pairs on Pair Programming","authors":"Rajendran Swamidurai, D. Umphress","doi":"10.1109/SERE-C.2014.52","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.52","url":null,"abstract":"Pair programming is a programming technique in which pair of people doing programming on a single machine. The programming pair consists of a driver and a navigator or observer. The driver addresses the operational issues; i.e., responsible for implementing the current module in hand. The navigator addresses the strategic issues; i.e., keeps in mind the strategic direction the code must take. Pair programming is a dynamic process and pairing aids the rapid dispersal of system knowledge through the team while developing it. Since most of the pair programming experiments were not conducted as described in extreme programming and the empirical evidence of pair programming is mixed we were not got the true picture about the impact created by pair programming on software development. In this paper, we evaluated the dynamic pair programming methodology with static pair programming and traditional individual programming. The empirical evidence shows that static pair programming is the most expensive and slower technology than dynamic pair programming and individual programming technologies. It also indicates that dynamic pair programming is the fastest software development methodology than static pair programming and traditional individual programming methodologies.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131476432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Qualitative Safety Analysis Method for AADL Model AADL模型的定性安全性分析方法
Bin Gu, Yunwei Dong, Xiaomin Wei
FMECA (Failure Modes, Effects and Criticality Analysis) is an effective systematic process to evaluate software safety. In this paper, the safety model of embedded systems is built by integrating the AADL (Architecture Analysis and Design Language) model with extension of Error Model Annex, and the FMECA is adopted as a qualitative safety analysis for AADL (Architecture Analysis and Design Language) model of embedded system based on AADL safety model. The traditional FMECA method is improved to be suitable for AADL model evaluation, and some safety properties are added into AADL error model annex in order to fill in FMECA check list automatically at AADL modeling design phase. On using the OVP (Over Voltage Protection) system, a case study is demonstrated the feasibility of modified FMECA for AADL model.
FMECA (Failure Modes, Effects and Criticality Analysis)是一种有效的评价软件安全性的系统方法。本文将AADL (Architecture Analysis and Design Language)模型与误差模型附件的扩展相结合,建立嵌入式系统的安全模型,并在AADL安全模型的基础上,采用FMECA对嵌入式系统的AADL (Architecture Analysis and Design Language)模型进行定性安全分析。对传统的FMECA方法进行了改进,使其更适合AADL模型的评估,并在AADL误差模型附件中加入了一些安全特性,以便在AADL建模设计阶段自动填写FMECA检查表。以过电压保护(OVP)系统为例,验证了修正FMECA对AADL模型的可行性。
{"title":"A Qualitative Safety Analysis Method for AADL Model","authors":"Bin Gu, Yunwei Dong, Xiaomin Wei","doi":"10.1109/SERE-C.2014.41","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.41","url":null,"abstract":"FMECA (Failure Modes, Effects and Criticality Analysis) is an effective systematic process to evaluate software safety. In this paper, the safety model of embedded systems is built by integrating the AADL (Architecture Analysis and Design Language) model with extension of Error Model Annex, and the FMECA is adopted as a qualitative safety analysis for AADL (Architecture Analysis and Design Language) model of embedded system based on AADL safety model. The traditional FMECA method is improved to be suitable for AADL model evaluation, and some safety properties are added into AADL error model annex in order to fill in FMECA check list automatically at AADL modeling design phase. On using the OVP (Over Voltage Protection) system, a case study is demonstrated the feasibility of modified FMECA for AADL model.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Load Scheduling Strategy for Electric Vehicles Charging System 电动汽车充电系统的负荷调度策略
Zheng Wang, Xiao Wu, Hongbin Zhao
Intelligent charging system for electric vehicles is a new application of power grid cyber-physical system which requires higher safety and reliability. During the execution of the system, it will bring a range of safety issues because of the heavy load of charging grid in some disturbance conditions. This paper analyzes the load safety issues and presents a load scheduling strategy based on one prediction that improves the safety of the system by dispatching charging piles based on the predictive load. In addition, the authors designed the architecture of the charging pile management system to achieve scheduling and management. Meanwhile, simulation experiment about prediction and scheduling strategy is done on the basis of the above and its feasibility has been proved.
电动汽车智能充电系统是电网信息物理系统的新应用,对安全性和可靠性有更高的要求。在系统运行过程中,在某些扰动条件下,由于充电网负荷过大,会带来一系列的安全问题。分析了电力系统的负荷安全问题,提出了一种基于预测的负荷调度策略,通过基于预测负荷调度充电桩,提高系统的安全性。此外,设计了充电桩管理系统的体系结构,实现了充电桩的调度和管理。同时,在此基础上进行了预测调度策略的仿真实验,验证了该策略的可行性。
{"title":"A Load Scheduling Strategy for Electric Vehicles Charging System","authors":"Zheng Wang, Xiao Wu, Hongbin Zhao","doi":"10.1109/SERE-C.2014.42","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.42","url":null,"abstract":"Intelligent charging system for electric vehicles is a new application of power grid cyber-physical system which requires higher safety and reliability. During the execution of the system, it will bring a range of safety issues because of the heavy load of charging grid in some disturbance conditions. This paper analyzes the load safety issues and presents a load scheduling strategy based on one prediction that improves the safety of the system by dispatching charging piles based on the predictive load. In addition, the authors designed the architecture of the charging pile management system to achieve scheduling and management. Meanwhile, simulation experiment about prediction and scheduling strategy is done on the basis of the above and its feasibility has been proved.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122345096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing Requirements to Detect Latent Security Vulnerabilities 分析需求以发现潜在的安全漏洞
Curtis C. R. Busby Earle, R. France, I. Ray
To fully embrace the challenge of securing software, security concerns must be considered at the earliest stages of software development. Studies have shown that this reduces the time, cost and effort required to integrate security features into software during development. In this paper we describe a technique for uncovering potential vulnerabilities through an analysis of software requirements and describe its use using a small, motivating example.
为了充分接受保护软件的挑战,必须在软件开发的早期阶段考虑安全性问题。研究表明,这减少了在开发期间将安全特性集成到软件中所需的时间、成本和精力。在本文中,我们描述了一种通过分析软件需求来发现潜在漏洞的技术,并通过一个小的、鼓舞人心的例子来描述它的使用。
{"title":"Analysing Requirements to Detect Latent Security Vulnerabilities","authors":"Curtis C. R. Busby Earle, R. France, I. Ray","doi":"10.1109/SERE-C.2014.35","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.35","url":null,"abstract":"To fully embrace the challenge of securing software, security concerns must be considered at the earliest stages of software development. Studies have shown that this reduces the time, cost and effort required to integrate security features into software during development. In this paper we describe a technique for uncovering potential vulnerabilities through an analysis of software requirements and describe its use using a small, motivating example.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128816227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robustness and Fragility of a New Local-World Dynamical Network Model 一种新的局部世界动态网络模型的鲁棒性和脆弱性
Peizhong Liu, Minghang Wang, Ping Li
In the paper, we have proposed a local-world synchronization-preferential growth topology model. The synchronizability of a class of continuous-time local-world dynamical networks is investigated. Then it has been found that the synchronizability of the dynamical network with the local-world synchronization-preferential mechanism is robust against not only the random removal of vertices but also the specific removal of those most connected vertices.
本文提出了一种局部世界同步优先增长拓扑模型。研究了一类连续时间局部世界动态网络的同步性问题。结果表明,采用局部世界同步优先机制的动态网络的同步性不仅对随机移除的顶点具有鲁棒性,而且对最连通顶点的特定移除也具有鲁棒性。
{"title":"Robustness and Fragility of a New Local-World Dynamical Network Model","authors":"Peizhong Liu, Minghang Wang, Ping Li","doi":"10.1109/SERE-C.2014.53","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.53","url":null,"abstract":"In the paper, we have proposed a local-world synchronization-preferential growth topology model. The synchronizability of a class of continuous-time local-world dynamical networks is investigated. Then it has been found that the synchronizability of the dynamical network with the local-world synchronization-preferential mechanism is robust against not only the random removal of vertices but also the specific removal of those most connected vertices.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122528776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diagnosis-Guided Regression Test Refinement 诊断导向回归测试改进
J. J. Li, Patricia Morreale, J. Palframan
The original goal of regression test refinement is to accommodate program changes to insure that new features are property implemented while existing features are not impacted. We found that regression test refinement was also essential for diagnosis of failed tests. This paper proposed and tried out an incremental diagnosis approach to refine regression tests of monotone systems where we use test output patterns to select the most effective test cases from the regression suite for diagnosis. That is, after detection of failed tests, more test data are generated into the regression suite to pinpoint the exact causes of failures. This refinement of the regression test suite is a training process from failed tests, so that the new regression suite is more likely to detect failures and diagnose the causes.
回归测试精化的最初目标是适应程序更改,以确保在不影响现有特性的情况下实现新特性。我们发现回归测试的细化对于失败测试的诊断也是必不可少的。本文提出并尝试了一种增量诊断方法来改进单调系统的回归测试,我们使用测试输出模式从回归套件中选择最有效的测试用例进行诊断。也就是说,在检测到失败的测试之后,更多的测试数据被生成到回归套件中,以查明失败的确切原因。回归测试套件的这种细化是对失败测试的训练过程,因此新的回归测试套件更有可能检测到失败并诊断出原因。
{"title":"Diagnosis-Guided Regression Test Refinement","authors":"J. J. Li, Patricia Morreale, J. Palframan","doi":"10.1109/SERE-C.2014.23","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.23","url":null,"abstract":"The original goal of regression test refinement is to accommodate program changes to insure that new features are property implemented while existing features are not impacted. We found that regression test refinement was also essential for diagnosis of failed tests. This paper proposed and tried out an incremental diagnosis approach to refine regression tests of monotone systems where we use test output patterns to select the most effective test cases from the regression suite for diagnosis. That is, after detection of failed tests, more test data are generated into the regression suite to pinpoint the exact causes of failures. This refinement of the regression test suite is a training process from failed tests, so that the new regression suite is more likely to detect failures and diagnose the causes.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114095412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Software Structure to Predict Vulnerability Exploitation Potential 利用软件结构预测漏洞利用潜力
Awad A. Younis, Y. Malaiya
Most of the attacks on computer systems are due to the presence of vulnerabilities in software. Recent trends show that number of newly discovered vulnerabilities still continue to be significant. Studies have also shown that the time gap between the vulnerability public disclosure and the release of an automated exploit is getting smaller. Therefore, assessing vulnerabilities exploitability risk is critical as it aids decision-makers prioritize among vulnerabilities, allocate resources, and choose between alternatives. Several methods have recently been proposed in the literature to deal with this challenge. However, these methods are either subjective, requires human involvement in assessing exploitability, or do not scale. In this research, our aim is to first identify vulnerability exploitation risk problem. Then, we introduce a novel vulnerability exploitability metric based on software structure properties viz.: attack entry points, vulnerability location, presence of dangerous system calls, and reachability. Based on our preliminary results, reachability and the presence of dangerous system calls appear to be a good indicator of exploitability. Next, we propose using the suggested metric as feature to construct a model using machine learning techniques for automatically predicting the risk of vulnerability exploitation. To build a vulnerability exploitation model, we propose using Support Vector Machines (SVMs). Once the predictor is built, given unseen vulnerable function and their exploitability features the model can predict whether the given function is exploitable or not.
大多数对计算机系统的攻击都是由于软件存在漏洞。最近的趋势表明,新发现的漏洞数量仍然很大。研究还表明,漏洞公开披露和自动漏洞攻击发布之间的时间间隔越来越小。因此,评估漏洞可利用性风险是至关重要的,因为它有助于决策者优先考虑漏洞、分配资源和在备选方案之间进行选择。最近在文献中提出了几种方法来应对这一挑战。然而,这些方法要么是主观的,需要人类参与评估可利用性,要么是不可伸缩的。在本研究中,我们的目的是首先识别漏洞利用风险问题。然后,我们引入了一种新的基于软件结构属性的漏洞利用度量,即攻击入口点、漏洞位置、危险系统调用的存在和可达性。根据我们的初步结果,可达性和危险系统调用的存在似乎是可利用性的良好指标。接下来,我们建议使用建议的度量作为特征来构建使用机器学习技术的模型,以自动预测漏洞利用的风险。为了建立漏洞利用模型,我们提出使用支持向量机(svm)。一旦建立了预测器,给定不可见的脆弱函数及其可利用性特征,该模型就可以预测给定函数是否可利用。
{"title":"Using Software Structure to Predict Vulnerability Exploitation Potential","authors":"Awad A. Younis, Y. Malaiya","doi":"10.1109/SERE-C.2014.17","DOIUrl":"https://doi.org/10.1109/SERE-C.2014.17","url":null,"abstract":"Most of the attacks on computer systems are due to the presence of vulnerabilities in software. Recent trends show that number of newly discovered vulnerabilities still continue to be significant. Studies have also shown that the time gap between the vulnerability public disclosure and the release of an automated exploit is getting smaller. Therefore, assessing vulnerabilities exploitability risk is critical as it aids decision-makers prioritize among vulnerabilities, allocate resources, and choose between alternatives. Several methods have recently been proposed in the literature to deal with this challenge. However, these methods are either subjective, requires human involvement in assessing exploitability, or do not scale. In this research, our aim is to first identify vulnerability exploitation risk problem. Then, we introduce a novel vulnerability exploitability metric based on software structure properties viz.: attack entry points, vulnerability location, presence of dangerous system calls, and reachability. Based on our preliminary results, reachability and the presence of dangerous system calls appear to be a good indicator of exploitability. Next, we propose using the suggested metric as feature to construct a model using machine learning techniques for automatically predicting the risk of vulnerability exploitation. To build a vulnerability exploitation model, we propose using Support Vector Machines (SVMs). Once the predictor is built, given unseen vulnerable function and their exploitability features the model can predict whether the given function is exploitable or not.","PeriodicalId":373062,"journal":{"name":"2014 IEEE Eighth International Conference on Software Security and Reliability-Companion","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1