首页 > 最新文献

Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance最新文献

英文 中文
A software metric for logical errors and integration testing effort 逻辑错误和集成测试工作的软件度量
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613302
R. Leach, D. Coleman
Many software metrics are based on analysis of individual source code modules and do not consider the way that modules are interconnected. This presents a special problem for many current software development project environments that utilize a considerable amount of commercial, off-the-shelf or other reusable software components and devote a considerable amount of time to testing and integrating such components. We describe a new metric called the BVA metric that is based on an assessment of the coupling between program subunits. The metric is based on the testing theory technique known as boundary value analysis. For each parameter or global variable in a program module or subunit, we compute the number of test cases necessary for a "black-box" test of a program subunit based on partitioning that portion of the domain of the subunit that is affected by the parameter. The BVA metric can be computed relatively early in the software life cycle. Experiments in several different languages and both academic and industrial programming environments suggest a close predictive relationship with the density of logical software errors and also with integration and testing effort.
许多软件度量是基于对单个源代码模块的分析,而不考虑模块之间相互连接的方式。这为当前许多软件开发项目环境提出了一个特殊的问题,这些环境利用了大量的商业的、现成的或其他可重用的软件组件,并投入了大量的时间来测试和集成这些组件。我们描述了一个新的度量,称为BVA度量,它基于对程序子单元之间耦合的评估。该度量是基于被称为边界值分析的测试理论技术。对于程序模块或子单元中的每个参数或全局变量,我们计算一个程序子单元的“黑盒”测试所必需的测试用例的数量,测试用例的数量是基于划分受参数影响的子单元域的那一部分。BVA度量可以在软件生命周期的相对早期进行计算。在几种不同的语言以及学术和工业编程环境中进行的实验表明,逻辑软件错误的密度以及集成和测试工作之间存在密切的预测关系。
{"title":"A software metric for logical errors and integration testing effort","authors":"R. Leach, D. Coleman","doi":"10.1109/CMPASS.1997.613302","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613302","url":null,"abstract":"Many software metrics are based on analysis of individual source code modules and do not consider the way that modules are interconnected. This presents a special problem for many current software development project environments that utilize a considerable amount of commercial, off-the-shelf or other reusable software components and devote a considerable amount of time to testing and integrating such components. We describe a new metric called the BVA metric that is based on an assessment of the coupling between program subunits. The metric is based on the testing theory technique known as boundary value analysis. For each parameter or global variable in a program module or subunit, we compute the number of test cases necessary for a \"black-box\" test of a program subunit based on partitioning that portion of the domain of the subunit that is affected by the parameter. The BVA metric can be computed relatively early in the software life cycle. Experiments in several different languages and both academic and industrial programming environments suggest a close predictive relationship with the density of logical software errors and also with integration and testing effort.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
"What is a formal method (and what is an informal method)?" “什么是正式方法(什么是非正式方法)?”
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613286
L. Hatton
This position paper traces a very personal view of formal methods in the period 1982-1997. The author describes his own experiences in formal methods all the way from outright belief in the power of mathematics in the early 1980s, to a measurement-tempered and rather cautious optimism in the late 1990s.
这份立场文件追溯了1982-1997年期间对形式方法的非常个人的看法。作者描述了他自己在形式化方法方面的经历,从20世纪80年代初对数学力量的彻底信仰,到20世纪90年代末对测量的节制和相当谨慎的乐观主义。
{"title":"\"What is a formal method (and what is an informal method)?\"","authors":"L. Hatton","doi":"10.1109/CMPASS.1997.613286","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613286","url":null,"abstract":"This position paper traces a very personal view of formal methods in the period 1982-1997. The author describes his own experiences in formal methods all the way from outright belief in the power of mathematics in the early 1980s, to a measurement-tempered and rather cautious optimism in the late 1990s.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130546864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the uniformity of error propagation in software 软件中误差传播的均匀性
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613237
C. Michael, R. C. Jones
This paper presents an empirical study of an important aspect of software defect behavior: the propagation of data-state errors. A data-state error occurs when a fault is executed and affects a program's data-state, and it is said to propagate if it affects the outcome of the execution. Our results show that data-state errors appear to have a property that is quite useful when simulating faulty code: for a given input, it appears that either all data state errors injected at a given location tend to propagate to the output, or else none of them do. These results are interesting because of what they indicate about the behavior of data-state errors in software. They suggest that data state errors behave in an orderly way, and that the behavior of software may not be as unpredictable as it could theoretically be. Additionally, if all faults behave the same for a given input and a given location, then one can use simulation to get a good picture of how faults behave, regardless of whether the faults one has simulated are representative of real faults.
本文对软件缺陷行为的一个重要方面进行了实证研究:数据状态错误的传播。当执行错误并影响程序的数据状态时,就会发生数据状态错误,如果它影响执行的结果,则称为传播错误。我们的结果表明,在模拟错误代码时,数据状态错误似乎具有一个非常有用的属性:对于给定的输入,似乎在给定位置注入的所有数据状态错误都倾向于传播到输出,或者它们都不会传播到输出。这些结果很有趣,因为它们表明了软件中数据状态错误的行为。他们认为数据状态错误的行为是有序的,软件的行为可能不像理论上那样不可预测。此外,如果对于给定的输入和给定的位置,所有故障的行为都是相同的,那么可以使用模拟来获得故障行为的良好图像,而不管所模拟的故障是否代表真实故障。
{"title":"On the uniformity of error propagation in software","authors":"C. Michael, R. C. Jones","doi":"10.1109/CMPASS.1997.613237","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613237","url":null,"abstract":"This paper presents an empirical study of an important aspect of software defect behavior: the propagation of data-state errors. A data-state error occurs when a fault is executed and affects a program's data-state, and it is said to propagate if it affects the outcome of the execution. Our results show that data-state errors appear to have a property that is quite useful when simulating faulty code: for a given input, it appears that either all data state errors injected at a given location tend to propagate to the output, or else none of them do. These results are interesting because of what they indicate about the behavior of data-state errors in software. They suggest that data state errors behave in an orderly way, and that the behavior of software may not be as unpredictable as it could theoretically be. Additionally, if all faults behave the same for a given input and a given location, then one can use simulation to get a good picture of how faults behave, regardless of whether the faults one has simulated are representative of real faults.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"751 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Quantitative reliability and availability assessment for critical systems including software 包括软件在内的关键系统的定量可靠性和可用性评估
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613307
M. Hecht, Dong Tang, Herbert Hecht, Sohar, Beverly Hills, Robert W. Brill
In many cases, it is possible to derive a quantitative reliability or availability assessment for systems containing software with the appropriate use of system-level measurement-based modeling and supporting data. This paper demonstrates the system-level measurement based approach using a simplified safety protection system example. The approach is contrasted with other software reliability prediction methodologies. The treatment of multiple correlated and common mode failures, systematic failures, and degraded states are also discussed. Finally a tool called MEADEP, which is now under development, is described. The objective of the tool is to reduce the system-level measurement-based approach to a practical task that can be performed on systems with element failure rates as low as 10/sup -6/ per hour.
在许多情况下,通过适当使用基于系统级度量的建模和支持数据,可以为包含软件的系统导出定量的可靠性或可用性评估。本文通过一个简化的安全防护系统实例,论证了基于系统级测量的方法。该方法与其他软件可靠性预测方法进行了对比。对多相关共模故障、系统故障和退化状态的处理也进行了讨论。最后介绍了一个正在开发中的工具MEADEP。该工具的目标是将基于系统级测量的方法减少到一个实际任务,该任务可以在元件故障率低至每小时10/sup -6/的系统上执行。
{"title":"Quantitative reliability and availability assessment for critical systems including software","authors":"M. Hecht, Dong Tang, Herbert Hecht, Sohar, Beverly Hills, Robert W. Brill","doi":"10.1109/CMPASS.1997.613307","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613307","url":null,"abstract":"In many cases, it is possible to derive a quantitative reliability or availability assessment for systems containing software with the appropriate use of system-level measurement-based modeling and supporting data. This paper demonstrates the system-level measurement based approach using a simplified safety protection system example. The approach is contrasted with other software reliability prediction methodologies. The treatment of multiple correlated and common mode failures, systematic failures, and degraded states are also discussed. Finally a tool called MEADEP, which is now under development, is described. The objective of the tool is to reduce the system-level measurement-based approach to a practical task that can be performed on systems with element failure rates as low as 10/sup -6/ per hour.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126773963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Effect of repair policies on software reliability 修复策略对软件可靠性的影响
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613262
S. Gokhale, P. Marinos, M. Lyn, Kishor S. Trivedi
Software reliability is an important metric that quantifies the quality of the software product and is inversely related to the number of unrepaired faults in the system. Fault removal is a critical process in achieving the desired level of quality before software deployment in the field. Conventional software reliability models assume that the time to remove a fault is negligible and that the repair process is perfect. We examine various kinds of repair scenarios, and analyze the effect of these fault removal policies on the residual number of faults at the end of the testing process, using a non-homogeneous continuous time Markov chain. The fault removal rate is initially assumed to be constant, and it is subsequently extended to cover time and state dependencies. These fault removal scenarios can be easily incorporated using the state space view of the non-homogeneous Poisson process.
软件可靠性是量化软件产品质量的重要度量,与系统中未修复故障的数量成反比。在现场部署软件之前,故障排除是实现所需质量水平的关键过程。传统的软件可靠性模型假设排除故障的时间可以忽略不计,并且修复过程是完美的。我们研究了各种修复场景,并使用非齐次连续时间马尔可夫链分析了这些故障去除策略对测试过程结束时剩余故障数的影响。故障去除率最初假设是恒定的,随后扩展到涵盖时间和状态依赖性。使用非齐次泊松过程的状态空间视图可以很容易地将这些故障排除场景合并。
{"title":"Effect of repair policies on software reliability","authors":"S. Gokhale, P. Marinos, M. Lyn, Kishor S. Trivedi","doi":"10.1109/CMPASS.1997.613262","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613262","url":null,"abstract":"Software reliability is an important metric that quantifies the quality of the software product and is inversely related to the number of unrepaired faults in the system. Fault removal is a critical process in achieving the desired level of quality before software deployment in the field. Conventional software reliability models assume that the time to remove a fault is negligible and that the repair process is perfect. We examine various kinds of repair scenarios, and analyze the effect of these fault removal policies on the residual number of faults at the end of the testing process, using a non-homogeneous continuous time Markov chain. The fault removal rate is initially assumed to be constant, and it is subsequently extended to cover time and state dependencies. These fault removal scenarios can be easily incorporated using the state space view of the non-homogeneous Poisson process.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Tools for formal specification, verification, and validation of requirements 用于正式规范、验证和确认需求的工具
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613206
C. Heitmeyer, J. Kirby, B. Labaw
Although formal methods for developing computer systems have been available for more than a decade, few have had significant impact in practice. A major barrier to their use is that software developers find formal methods difficult to understand and apply. One exception is a formal method called SCR for specifying computer system requirements which, due to its easy to use tabular notation and its demonstrated scalability, has already achieved some success in industry. Recently a set of software tools, including a specification editor, a consistency checker, a simulator, and a verifier has been developed to support the SCR method. This paper describes recent enhancements to the SCR tools: a new dependency graph browser which displays the dependencies among the variables in the specification, an improved consistency checker which produces detailed feedback about detected errors, and an assertion checker which checks application properties during simulation. To illustrate the tool enhancements, a simple automobile cruise control system is presented and analyzed.
尽管开发计算机系统的正式方法已经有十多年的历史了,但很少有在实践中产生重大影响的。使用它们的一个主要障碍是软件开发人员发现形式化方法难以理解和应用。一个例外是称为SCR的用于指定计算机系统需求的形式化方法,由于其易于使用的表格表示法和演示的可扩展性,它已经在工业中取得了一些成功。最近开发了一套软件工具,包括规范编辑器、一致性检查器、模拟器和验证器,以支持SCR方法。本文描述了最近对SCR工具的改进:一个新的依赖图浏览器,它显示规范中变量之间的依赖关系;一个改进的一致性检查器,它对检测到的错误产生详细的反馈;一个断言检查器,它在模拟过程中检查应用程序属性。为了说明工具的改进,给出并分析了一个简单的汽车巡航控制系统。
{"title":"Tools for formal specification, verification, and validation of requirements","authors":"C. Heitmeyer, J. Kirby, B. Labaw","doi":"10.1109/CMPASS.1997.613206","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613206","url":null,"abstract":"Although formal methods for developing computer systems have been available for more than a decade, few have had significant impact in practice. A major barrier to their use is that software developers find formal methods difficult to understand and apply. One exception is a formal method called SCR for specifying computer system requirements which, due to its easy to use tabular notation and its demonstrated scalability, has already achieved some success in industry. Recently a set of software tools, including a specification editor, a consistency checker, a simulator, and a verifier has been developed to support the SCR method. This paper describes recent enhancements to the SCR tools: a new dependency graph browser which displays the dependencies among the variables in the specification, an improved consistency checker which produces detailed feedback about detected errors, and an assertion checker which checks application properties during simulation. To illustrate the tool enhancements, a simple automobile cruise control system is presented and analyzed.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Information security: from reference monitors to wrappers 信息安全:从参考监视器到包装器
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613283
L. Badger
Information system security has turned out to be much more challenging than at first thought. In the 1980s a great deal of energy was expended in an attempt to create a broad market of security-enhanced systems. This market, however, did not develop, and most computer systems today include only rudimentary security mechanisms. New technologies, however, such as extensible systems and security wrappers, hold promise to reintroduce security as an effective and ubiquitous system service.
事实证明,信息系统安全比最初想象的要具有挑战性得多。在20世纪80年代,人们花费了大量精力,试图创造一个安全增强系统的广阔市场。然而,这个市场并没有发展起来,今天的大多数计算机系统只包括基本的安全机制。然而,新技术,如可扩展系统和安全包装器,有望将安全性作为一种有效的、无处不在的系统服务重新引入。
{"title":"Information security: from reference monitors to wrappers","authors":"L. Badger","doi":"10.1109/CMPASS.1997.613283","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613283","url":null,"abstract":"Information system security has turned out to be much more challenging than at first thought. In the 1980s a great deal of energy was expended in an attempt to create a broad market of security-enhanced systems. This market, however, did not develop, and most computer systems today include only rudimentary security mechanisms. New technologies, however, such as extensible systems and security wrappers, hold promise to reintroduce security as an effective and ubiquitous system service.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131624810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation-based test of fault-tolerant group membership services 基于仿真的容错组成员服务测试
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613291
G. A. Alvarez, F. Cristian
We address the problem of gaining assurance on the correctness of fault-tolerant and real-time distributed protocols. We validate implementations of two group membership protocols by running a centralized simulation of the distributed system, and testing whether the protocols satisfy the safety and timeliness properties prescribed by their specifications. Our testing environment performs deterministic experiments that include both normal workloads and failures injected into the execution, to test protocol behavior under failure scenarios the protocols are supposed to tolerate. The two membership protocols assume different system models, and depend on quite different sets of underlying services. Even though their specifications contain properties that cannot be evaluated accurately in a distributed platform, our testing environment overcomes this limitation. The tests performed uncovered several flaws in the implementations.
我们解决了获得容错和实时分布式协议正确性保证的问题。我们通过运行分布式系统的集中模拟来验证两个组成员协议的实现,并测试协议是否满足其规范规定的安全性和时效性。我们的测试环境执行确定性实验,包括正常工作负载和注入到执行中的故障,以测试协议应该容忍的故障场景下的协议行为。这两个成员协议假定不同的系统模型,并且依赖于完全不同的底层服务集。即使它们的规范包含了在分布式平台中无法准确评估的属性,我们的测试环境也克服了这一限制。执行的测试揭示了实现中的几个缺陷。
{"title":"Simulation-based test of fault-tolerant group membership services","authors":"G. A. Alvarez, F. Cristian","doi":"10.1109/CMPASS.1997.613291","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613291","url":null,"abstract":"We address the problem of gaining assurance on the correctness of fault-tolerant and real-time distributed protocols. We validate implementations of two group membership protocols by running a centralized simulation of the distributed system, and testing whether the protocols satisfy the safety and timeliness properties prescribed by their specifications. Our testing environment performs deterministic experiments that include both normal workloads and failures injected into the execution, to test protocol behavior under failure scenarios the protocols are supposed to tolerate. The two membership protocols assume different system models, and depend on quite different sets of underlying services. Even though their specifications contain properties that cannot be evaluated accurately in a distributed platform, our testing environment overcomes this limitation. The tests performed uncovered several flaws in the implementations.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132917211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Perturbation analysis of computer programs 计算机程序的摄动分析
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613242
L. Morell, B. Murrill, Renata Rand
Error flow analysis is the study of how errors originate, spread, and propagate during program execution based on the three steps of the fault/failure model: execution, infection, and propagation. These three steps are defined relative to a virtual computer-by judiciously selecting the instruction set and data state of this computer the need for infection analysis can be reduced or eliminated in favor of execution and propagation analysis. A key aspect of propagation analysis is injecting errors into the data state and tracing their expect. Perturbation analysis injects errors by directly modifying the data state of on executing program. The resulting code that is executed-the tail code-is analyzed for its error-flow behavior. Perturbation analysis is a language-independent and efficient method of characterizing the propagation rate of each tail function, the function computed by all tail code originating at a given location. This paper defines a model for perturbation analysis, and uses the model to explain the performance of analysis techniques (e.g. statement, data flow, and mutation analysis).
错误流分析是基于故障/故障模型的三个步骤:执行、感染和传播,研究错误在程序执行期间如何产生、传播和传播。这三个步骤是定义相对于虚拟的计算机明智地选择这台计算机的指令集和数据状态可以减少或消除感染的必要性分析的执行和传播分析。传播分析的一个关键方面是将错误注入数据状态并跟踪它们的预期。摄动分析通过直接修改一个正在执行的程序的数据状态来注入错误。分析执行的结果代码(尾部代码)的错误流行为。微扰分析是一种独立于语言的有效方法,用于表征每个尾函数的传播速率,该函数由所有尾代码在给定位置产生计算。本文定义了一个微扰分析模型,并用该模型来解释分析技术(如语句、数据流和突变分析)的性能。
{"title":"Perturbation analysis of computer programs","authors":"L. Morell, B. Murrill, Renata Rand","doi":"10.1109/CMPASS.1997.613242","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613242","url":null,"abstract":"Error flow analysis is the study of how errors originate, spread, and propagate during program execution based on the three steps of the fault/failure model: execution, infection, and propagation. These three steps are defined relative to a virtual computer-by judiciously selecting the instruction set and data state of this computer the need for infection analysis can be reduced or eliminated in favor of execution and propagation analysis. A key aspect of propagation analysis is injecting errors into the data state and tracing their expect. Perturbation analysis injects errors by directly modifying the data state of on executing program. The resulting code that is executed-the tail code-is analyzed for its error-flow behavior. Perturbation analysis is a language-independent and efficient method of characterizing the propagation rate of each tail function, the function computed by all tail code originating at a given location. This paper defines a model for perturbation analysis, and uses the model to explain the performance of analysis techniques (e.g. statement, data flow, and mutation analysis).","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Is information security an oxymoron? 信息安全是一个矛盾的说法吗?
Pub Date : 1997-06-16 DOI: 10.1109/CMPASS.1997.613273
J. Knight
Although weaknesses have been demonstrated in some security techniques (encryption, protocols, mobile code such as Java, etc.), current security technology is quite strong in many areas. Despite this, information security has proved difficult to achieve in large modern software systems. Many problems have been reported in which supposedly secure systems have been penetrated and in some cases significant damage done. In practice, it appears that many (perhaps even the majority) of serious security failures are attributable to software engineering defects in the systems experiencing the failure. The author discusses the use of wrappers which can deal with deficiencies in security and considers the software architectural approach.
尽管一些安全技术(加密、协议、移动代码如Java等)存在弱点,但当前的安全技术在许多领域都相当强大。尽管如此,事实证明,在大型现代软件系统中实现信息安全是困难的。据报道,在许多问题中,本应安全的系统被侵入,在某些情况下造成了重大损害。在实践中,似乎许多(甚至可能是大多数)严重的安全故障都是由于经历故障的系统中的软件工程缺陷。作者讨论了可以处理安全性缺陷的包装器的使用,并考虑了软件体系结构方法。
{"title":"Is information security an oxymoron?","authors":"J. Knight","doi":"10.1109/CMPASS.1997.613273","DOIUrl":"https://doi.org/10.1109/CMPASS.1997.613273","url":null,"abstract":"Although weaknesses have been demonstrated in some security techniques (encryption, protocols, mobile code such as Java, etc.), current security technology is quite strong in many areas. Despite this, information security has proved difficult to achieve in large modern software systems. Many problems have been reported in which supposedly secure systems have been penetrated and in some cases significant damage done. In practice, it appears that many (perhaps even the majority) of serious security failures are attributable to software engineering defects in the systems experiencing the failure. The author discusses the use of wrappers which can deal with deficiencies in security and considers the software architectural approach.","PeriodicalId":377266,"journal":{"name":"Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of COMPASS '97: 12th Annual Conference on Computer Assurance
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1