首页 > 最新文献

Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems最新文献

英文 中文
Virtual machine consolidation for cloud data centers using parameter-based adaptive allocation 使用基于参数的自适应分配的云数据中心虚拟机整合
A. Mosa, R. Sakellariou
Cloud computing enables cloud providers to offer computing infrastructure as a service (IaaS) in the form of virtual machines (VMs). Cloud management platforms automate the allocation of VMs to physical machines (PMs). An adaptive VM allocation policy is required to handle changes in the cloud environment and utilize the PMs efficiently In the literature, adaptive VM allocation is typically performed using either reservation-based or demand-based allocation. In this work, we have developed a parameter-based VM consolidation solution that aims to mitigate the issues with the reservation-based and demand-based solutions. This parameter-based VM consolidation exploits the range between demand-based and reservation-based finding VM to PM allocations that strike a delicate balance according to cloud providers' goals. Experiments conducted using CloudSim show how the proposed parameter-based solution gives a cloud provider the flexibility to manage the trade-off between utilization and other requirements.
云计算使云提供商能够以虚拟机(vm)的形式提供计算基础设施即服务(IaaS)。云管理平台自动将虚拟机分配给物理机。需要自适应VM分配策略来处理云环境中的变化并有效地利用pm。在文献中,自适应VM分配通常使用基于保留或基于需求的分配来执行。在这项工作中,我们开发了一个基于参数的VM整合解决方案,旨在缓解基于预订和基于需求的解决方案的问题。这种基于参数的VM整合利用了基于需求和基于预订的VM到PM分配之间的范围,根据云提供商的目标实现了微妙的平衡。使用CloudSim进行的实验表明,所提出的基于参数的解决方案如何使云提供商能够灵活地管理利用率和其他需求之间的权衡。
{"title":"Virtual machine consolidation for cloud data centers using parameter-based adaptive allocation","authors":"A. Mosa, R. Sakellariou","doi":"10.1145/3123779.3123807","DOIUrl":"https://doi.org/10.1145/3123779.3123807","url":null,"abstract":"Cloud computing enables cloud providers to offer computing infrastructure as a service (IaaS) in the form of virtual machines (VMs). Cloud management platforms automate the allocation of VMs to physical machines (PMs). An adaptive VM allocation policy is required to handle changes in the cloud environment and utilize the PMs efficiently In the literature, adaptive VM allocation is typically performed using either reservation-based or demand-based allocation. In this work, we have developed a parameter-based VM consolidation solution that aims to mitigate the issues with the reservation-based and demand-based solutions. This parameter-based VM consolidation exploits the range between demand-based and reservation-based finding VM to PM allocations that strike a delicate balance according to cloud providers' goals. Experiments conducted using CloudSim show how the proposed parameter-based solution gives a cloud provider the flexibility to manage the trade-off between utilization and other requirements.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123714074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Model driven secure web applications: the SeWAT platform 模型驱动的安全web应用:SeWAT平台
Akram Idani
Model driven security (MDS) is a well known approach in the access control domain. It proposes a security-by-design approach intended to link the encoded policy to the security policy modeling. However, this technique does not tie in the specificity and heterogeneity of web applications and hence the proposed model-to-code transformation doesn't fit the needs of web architects. Consequently, web applications are mainly hand-coded, or correspond to legacy code developed before the implementation of security mechanisms. Security concerns are mixed with the application code and hence it is difficult to understand the policy in order to maintain, correct, or evolve it. This work deals with access control mechanisms following the RBAC pattern. Our work proposes a toolset dedicated to modeling and deployment of an acces control engine for a web application assuming that the functional part of the application is developed following a classical process. Our technique tries to reconcile modeling, validation and implementation of role-based security policies, and favours model driven security in the context of web applications. The toolset allows developers to graphically model an MVC web application by making links to its requirements and then generates a security filter from the web application's model. This technique guaranties that the deployed access control policy is conformant to its specification and associated validation activities.
模型驱动安全(MDS)是访问控制领域的一种知名方法。它提出了一种设计安全方法,旨在将编码策略链接到安全策略建模。然而,这种技术并没有考虑到web应用程序的特殊性和异质性,因此所提出的模型到代码的转换并不适合web架构师的需要。因此,web应用程序主要是手工编码的,或者对应于在实现安全机制之前开发的遗留代码。安全性问题与应用程序代码混合在一起,因此很难理解策略以维护、纠正或发展它。这项工作处理遵循RBAC模式的访问控制机制。我们的工作提出了一个工具集,专门用于建模和部署web应用程序的访问控制引擎,假设应用程序的功能部分是按照经典流程开发的。我们的技术试图协调基于角色的安全策略的建模、验证和实现,并在web应用程序的上下文中支持模型驱动的安全性。该工具集允许开发人员通过链接到MVC web应用程序的需求来图形化地建模,然后从web应用程序的模型生成一个安全过滤器。该技术保证部署的访问控制策略符合其规范和相关的验证活动。
{"title":"Model driven secure web applications: the SeWAT platform","authors":"Akram Idani","doi":"10.1145/3123779.3123800","DOIUrl":"https://doi.org/10.1145/3123779.3123800","url":null,"abstract":"Model driven security (MDS) is a well known approach in the access control domain. It proposes a security-by-design approach intended to link the encoded policy to the security policy modeling. However, this technique does not tie in the specificity and heterogeneity of web applications and hence the proposed model-to-code transformation doesn't fit the needs of web architects. Consequently, web applications are mainly hand-coded, or correspond to legacy code developed before the implementation of security mechanisms. Security concerns are mixed with the application code and hence it is difficult to understand the policy in order to maintain, correct, or evolve it. This work deals with access control mechanisms following the RBAC pattern. Our work proposes a toolset dedicated to modeling and deployment of an acces control engine for a web application assuming that the functional part of the application is developed following a classical process. Our technique tries to reconcile modeling, validation and implementation of role-based security policies, and favours model driven security in the context of web applications. The toolset allows developers to graphically model an MVC web application by making links to its requirements and then generates a security filter from the web application's model. This technique guaranties that the deployed access control policy is conformant to its specification and associated validation activities.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123617086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards defending connected vehicles against attacks 保护联网车辆免受攻击
Eslam G. AbdAllah, Mohammad Zulkernine, Y. Gu, C. Liem
Connected vehicles utilize various communication types that take place between different entities such as vehicle, infrastructure, cloud, and mobile. Connected vehicles have sensors and Electronic Control Units (ECUs) that perform in-vehicle communications, and they communicate with the other entities using cellular, vehicular, and wireless networks. These communications may be compromised through different attacks including Man-In-The-Middle (MITM) and Man-At-The-End (MATE) attacks. Existing security solutions are not suitable for this complex integration between different technologies. In this paper, we provide a taxonomy of connected vehicle attacks that can be classified into four main categories. We identify the relations between these attacks and connected vehicle attributes and security requirements. We also present a trust model that contains various countermeasures to secure connected vehicles against different attacks. This trust model consists of four components: integrity, access control, availability, and privacy. The proposed trust model will ensure the achievement of the security requirements against common MITM and MATE attacks.
联网车辆利用车辆、基础设施、云和移动设备等不同实体之间的各种通信类型。联网车辆具有传感器和执行车内通信的电子控制单元(ecu),并通过蜂窝网络、车载网络和无线网络与其他实体进行通信。这些通信可能会被不同的攻击所破坏,包括中间人(MITM)和终端人(MATE)攻击。现有的安全解决方案不适合这种不同技术之间的复杂集成。在本文中,我们提供了一个联网车辆攻击的分类,可以分为四个主要类别。我们确定了这些攻击与联网车辆属性和安全需求之间的关系。我们还提出了一个信任模型,该模型包含各种对策,以保护联网车辆免受不同的攻击。该信任模型由四个组件组成:完整性、访问控制、可用性和隐私。所提出的信任模型将确保满足针对常见MITM和MATE攻击的安全要求。
{"title":"Towards defending connected vehicles against attacks","authors":"Eslam G. AbdAllah, Mohammad Zulkernine, Y. Gu, C. Liem","doi":"10.1145/3123779.3123794","DOIUrl":"https://doi.org/10.1145/3123779.3123794","url":null,"abstract":"Connected vehicles utilize various communication types that take place between different entities such as vehicle, infrastructure, cloud, and mobile. Connected vehicles have sensors and Electronic Control Units (ECUs) that perform in-vehicle communications, and they communicate with the other entities using cellular, vehicular, and wireless networks. These communications may be compromised through different attacks including Man-In-The-Middle (MITM) and Man-At-The-End (MATE) attacks. Existing security solutions are not suitable for this complex integration between different technologies. In this paper, we provide a taxonomy of connected vehicle attacks that can be classified into four main categories. We identify the relations between these attacks and connected vehicle attributes and security requirements. We also present a trust model that contains various countermeasures to secure connected vehicles against different attacks. This trust model consists of four components: integrity, access control, availability, and privacy. The proposed trust model will ensure the achievement of the security requirements against common MITM and MATE attacks.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133081083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reconstructing timed symbolic traces from rtioco-based timed test sequences using backward-induction 利用反向归纳法从基于比率的时间测试序列重构时间符号轨迹
Junaid Iqbal, D. Truscan, J. Vain, Ivan Porres
As of today, model-based testing is considered as a leading-edge technology in the IT industry. In model-based testing, an implementation under test is tested for compliance with a model that describes the required behaviour of the implementation. Uppaal Tron is a popular tool for online model-based conformance testing of real-time systems; it uses the Uppaal verification engine to generate and convert on-the-fly timed symbolic traces into concrete test sequences. Among the advantages of online testing is the reduction of the symbolic state space needed for computing traces, better addressing non-determinism, as well as the possibility to execute longer-lasting test runs. However, analysing and debugging long test runs can be tedious and time-consuming especially when analysing root causes of failed tests. In game theory, backward-induction is a process to reason backwards in time, from the end of a problem or situation, in order to determine a sequence of optimal actions. In this paper, we propose an approach to reconstruct symbolic traces from test sequences generated by Uppaal Tron using backward-induction. The resulting symbolic traces can be imported in the Uppaal tool and visualised in the Uppaal simulator. The evaluation of the implementation of the approach shows that it has the potential to satisfy the needs of industrial level testing.
到目前为止,基于模型的测试被认为是IT行业的前沿技术。在基于模型的测试中,测试中的实现是否符合描述实现所需行为的模型。Uppaal Tron是实时系统基于模型的一致性在线测试的流行工具;它使用Uppaal验证引擎生成并将实时的定时符号跟踪转换为具体的测试序列。在线测试的优点之一是减少了计算轨迹所需的符号状态空间,更好地处理非确定性,以及执行更持久的测试运行的可能性。然而,分析和调试长时间的测试运行可能是乏味和耗时的,特别是在分析失败测试的根本原因时。在博弈论中,逆向归纳是一个过程,从问题或情况的结束往回推理,以确定一系列最佳行动。本文提出了一种利用逆向归纳法从Uppaal Tron生成的测试序列中重构符号轨迹的方法。生成的符号跟踪可以在Uppaal工具中导入,并在Uppaal模拟器中可视化。实施后的评价表明,该方法具有满足工业水平检测需求的潜力。
{"title":"Reconstructing timed symbolic traces from rtioco-based timed test sequences using backward-induction","authors":"Junaid Iqbal, D. Truscan, J. Vain, Ivan Porres","doi":"10.1145/3123779.3123813","DOIUrl":"https://doi.org/10.1145/3123779.3123813","url":null,"abstract":"As of today, model-based testing is considered as a leading-edge technology in the IT industry. In model-based testing, an implementation under test is tested for compliance with a model that describes the required behaviour of the implementation. Uppaal Tron is a popular tool for online model-based conformance testing of real-time systems; it uses the Uppaal verification engine to generate and convert on-the-fly timed symbolic traces into concrete test sequences. Among the advantages of online testing is the reduction of the symbolic state space needed for computing traces, better addressing non-determinism, as well as the possibility to execute longer-lasting test runs. However, analysing and debugging long test runs can be tedious and time-consuming especially when analysing root causes of failed tests. In game theory, backward-induction is a process to reason backwards in time, from the end of a problem or situation, in order to determine a sequence of optimal actions. In this paper, we propose an approach to reconstruct symbolic traces from test sequences generated by Uppaal Tron using backward-induction. The resulting symbolic traces can be imported in the Uppaal tool and visualised in the Uppaal simulator. The evaluation of the implementation of the approach shows that it has the potential to satisfy the needs of industrial level testing.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117251671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design principles of an embedded language (EFL) enabling well defined order-independent execution 嵌入式语言(EFL)的设计原则,支持定义良好的顺序无关执行
M. Goldstein, D. Dayan, M. Rabin, D. Berlowitz, O. Berlowitz, R. B. Yehezkael
Parallel programming platforms are heterogeneous and incompatible; a common approach is needed to free programmers from platforms' technical intricacies, allowing flexible execution in which sequential and parallel executions produce identical results. The execution and programming model of an embedded flexible language (EFL), which implement this common approach, are presented. EFL allows embedding of deterministic parallel code blocks into a sequential program, written in any host language. EFL programming model constructs are presented. An EFL implementation of the Reduce Parallel Design Pattern is presented. With EFL we aim to implement safe and efficient parallel execution, in software, hardware, or both. Consequences of Rice's theorem regarding parallel computation are discussed. These consequences severely restrict what can be checked at compile time. An approach is proposed for circumventing these restrictions.
并行编程平台是异构的和不兼容的;需要一种通用的方法来将程序员从平台的技术复杂性中解放出来,允许灵活的执行,其中顺序执行和并行执行产生相同的结果。给出了实现这种通用方法的嵌入式灵活语言(EFL)的执行和编程模型。EFL允许将确定性并行代码块嵌入到以任何宿主语言编写的顺序程序中。给出了EFL规划模型的构造。提出了一种简化并行设计模式的EFL实现。通过EFL,我们的目标是在软件、硬件或两者上实现安全高效的并行执行。讨论了Rice定理关于并行计算的结论。这些结果严重限制了编译时可以检查的内容。提出了一种绕过这些限制的方法。
{"title":"Design principles of an embedded language (EFL) enabling well defined order-independent execution","authors":"M. Goldstein, D. Dayan, M. Rabin, D. Berlowitz, O. Berlowitz, R. B. Yehezkael","doi":"10.1145/3123779.3123789","DOIUrl":"https://doi.org/10.1145/3123779.3123789","url":null,"abstract":"Parallel programming platforms are heterogeneous and incompatible; a common approach is needed to free programmers from platforms' technical intricacies, allowing flexible execution in which sequential and parallel executions produce identical results. The execution and programming model of an embedded flexible language (EFL), which implement this common approach, are presented. EFL allows embedding of deterministic parallel code blocks into a sequential program, written in any host language. EFL programming model constructs are presented. An EFL implementation of the Reduce Parallel Design Pattern is presented. With EFL we aim to implement safe and efficient parallel execution, in software, hardware, or both. Consequences of Rice's theorem regarding parallel computation are discussed. These consequences severely restrict what can be checked at compile time. An approach is proposed for circumventing these restrictions.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126672155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information system evolution management: a complex evaluation 信息系统演化管理:一个复杂的评价
Marek Polák, I. Holubová
In our previous papers we have focused on problems of model and/or information system evolution. We have dealt with popular technologies and languages for data storage and data management, such as XML, SQL, XPath, REST, BPMN, etc. In this paper we sum up our contributions and present a complex example of evolution process of an information system. We model complex situations that, starting from a single point, influence the whole system. Our solution, however, brings benefits not only for a typical system with the well-known architecture "presentation layer -- business layer -- database layer", but also for the micro-service architecture that becomes more and more popular these days. In this paradigm every service is specialized, it manages a specific logical part of the system, and it communicates with other services mainly via HTTP or (web) sockets. This architecture brings many advantages especially to system scalability, performance, and resource management. On the other hand, separation of the system to micro-services brings drawbacks, such as more demanding change management and version compatibility. For example, a change of the message structure in one part of the system can influence all related services, integration tests are more complex and must detect more edge cases that in case of monolithic systems, etc. A mechanism that can analyze the changes, propagate them, and/or at least inform the developer about possible inconsistency can reduce time needed for updates and troubleshooting.
在我们之前的论文中,我们集中讨论了模型和/或信息系统演化的问题。我们已经讨论了用于数据存储和数据管理的流行技术和语言,如XML、SQL、XPath、REST、BPMN等。在本文中,我们总结了我们的贡献,并提出了一个信息系统进化过程的复杂例子。我们模拟复杂的情况,从一个点开始,影响整个系统。然而,我们的解决方案不仅为典型的“表示层—业务层—数据库层”体系结构的系统带来了好处,而且也为现在越来越流行的微服务体系结构带来了好处。在这个范例中,每个服务都是专门化的,它管理系统的特定逻辑部分,并且主要通过HTTP或(web)套接字与其他服务通信。这种体系结构带来了许多优势,特别是在系统可伸缩性、性能和资源管理方面。另一方面,将系统分离到微服务会带来一些缺点,比如要求更高的变更管理和版本兼容性。例如,系统某一部分的消息结构更改可能会影响所有相关服务,集成测试更复杂,必须检测到比单片系统更多的边缘情况,等等。可以分析更改、传播更改和/或至少通知开发人员可能的不一致的机制可以减少更新和故障排除所需的时间。
{"title":"Information system evolution management: a complex evaluation","authors":"Marek Polák, I. Holubová","doi":"10.1145/3123779.3123809","DOIUrl":"https://doi.org/10.1145/3123779.3123809","url":null,"abstract":"In our previous papers we have focused on problems of model and/or information system evolution. We have dealt with popular technologies and languages for data storage and data management, such as XML, SQL, XPath, REST, BPMN, etc. In this paper we sum up our contributions and present a complex example of evolution process of an information system. We model complex situations that, starting from a single point, influence the whole system. Our solution, however, brings benefits not only for a typical system with the well-known architecture \"presentation layer -- business layer -- database layer\", but also for the micro-service architecture that becomes more and more popular these days. In this paradigm every service is specialized, it manages a specific logical part of the system, and it communicates with other services mainly via HTTP or (web) sockets. This architecture brings many advantages especially to system scalability, performance, and resource management. On the other hand, separation of the system to micro-services brings drawbacks, such as more demanding change management and version compatibility. For example, a change of the message structure in one part of the system can influence all related services, integration tests are more complex and must detect more edge cases that in case of monolithic systems, etc. A mechanism that can analyze the changes, propagate them, and/or at least inform the developer about possible inconsistency can reduce time needed for updates and troubleshooting.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Employing issues and commits for in-code sentence based use case identification and remodularization 为基于用例识别和重构的代码内句子使用问题和提交
P. Berta, M. Bystrický, M. Krempaský, V. Vranić
Use case driven modularization improves code comprehension and maintenance and provides another view on software alongside object-oriented modularization. However, approaches enabling use case driven modularization require to modularize code manually. In this paper, we propose an approach to employing issues and commits for in-code sentence based use case identification and remodularization. The approach aims at providing use case based perspective on the existing code. The sentences of use case steps are compared to sentences of issue descriptions, while the sentences generated from the source code of issue commits are compared to sentences generated from the corresponding methods in source code in order to quantify the similarity between use case steps and methods in source code using different similarity calculation algorithms. The resulting level of similarity is used to remodularize source code according to use cases. We conducted a study on the OpenCart open source e-shop employing 16 use cases. The approach achieved the recall of 3.37% and precision of 75%. The success of the approach strongly depends on issues and commits assigned to them. The results would be better especially for the code that natively employs use case driven modularization.
用例驱动的模块化改进了代码的理解和维护,并在面向对象的模块化之外提供了另一种软件视图。然而,支持用例驱动模块化的方法需要手动模块化代码。在本文中,我们提出了一种基于用例识别和重构的代码内句子使用问题和提交的方法。该方法旨在为现有代码提供基于用例的透视图。将用例步骤的句子与问题描述的句子进行比较,将问题提交的源代码生成的句子与源代码中相应方法生成的句子进行比较,利用不同的相似度计算算法量化用例步骤与源代码中方法之间的相似度。所得到的相似性级别用于根据用例重新模块化源代码。我们对使用16个用例的OpenCart开源电子商店进行了研究。该方法的查全率为3.37%,查准率为75%。该方法的成功很大程度上取决于问题和分配给它们的任务。结果会更好,特别是对于本地使用用例驱动模块化的代码。
{"title":"Employing issues and commits for in-code sentence based use case identification and remodularization","authors":"P. Berta, M. Bystrický, M. Krempaský, V. Vranić","doi":"10.1145/3123779.3123792","DOIUrl":"https://doi.org/10.1145/3123779.3123792","url":null,"abstract":"Use case driven modularization improves code comprehension and maintenance and provides another view on software alongside object-oriented modularization. However, approaches enabling use case driven modularization require to modularize code manually. In this paper, we propose an approach to employing issues and commits for in-code sentence based use case identification and remodularization. The approach aims at providing use case based perspective on the existing code. The sentences of use case steps are compared to sentences of issue descriptions, while the sentences generated from the source code of issue commits are compared to sentences generated from the corresponding methods in source code in order to quantify the similarity between use case steps and methods in source code using different similarity calculation algorithms. The resulting level of similarity is used to remodularize source code according to use cases. We conducted a study on the OpenCart open source e-shop employing 16 use cases. The approach achieved the recall of 3.37% and precision of 75%. The success of the approach strongly depends on issues and commits assigned to them. The results would be better especially for the code that natively employs use case driven modularization.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122827486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Constraint-based intrusion detection system 基于约束的入侵检测系统
M. Hasan, T. Dean, Fahim T. Imam, F. García, Sylvain P. Leblanc, Mohammad Zulkernine
The expressiveness of constraints has a potential to define network behavior and defend against complex network intrusions. This potential can be an integral part of an Intrusion Detection System (IDS) for defending networks against various attacks. The existing approaches of constraint logic programming have limitations when it comes to solving the network constraints in the presence of the continuous, constantly changing stream of network data. In this paper, we propose two variations of a tree-based constraint satisfaction technique to evaluate network constraints on continuous network data. A Domain Specific Language (DSL) is developed so that the IDS users can specify different intrusions related to their networks. We also present a prototype implementation of these techniques. We evaluate the performance and effectiveness of our approach against the network traffic data generated from an experimental network.
约束的表达性具有定义网络行为和防御复杂网络入侵的潜力。这种潜力可以成为入侵检测系统(IDS)的一个组成部分,用于保护网络免受各种攻击。现有的约束逻辑编程方法在解决存在连续、不断变化的网络数据流的网络约束时存在局限性。在本文中,我们提出了基于树的约束满足技术的两个变体来评估连续网络数据上的网络约束。开发了一种领域特定语言(DSL),以便IDS用户可以指定与其网络相关的不同入侵。我们还提出了这些技术的原型实现。我们根据实验网络生成的网络流量数据评估了我们方法的性能和有效性。
{"title":"A Constraint-based intrusion detection system","authors":"M. Hasan, T. Dean, Fahim T. Imam, F. García, Sylvain P. Leblanc, Mohammad Zulkernine","doi":"10.1145/3123779.3123812","DOIUrl":"https://doi.org/10.1145/3123779.3123812","url":null,"abstract":"The expressiveness of constraints has a potential to define network behavior and defend against complex network intrusions. This potential can be an integral part of an Intrusion Detection System (IDS) for defending networks against various attacks. The existing approaches of constraint logic programming have limitations when it comes to solving the network constraints in the presence of the continuous, constantly changing stream of network data. In this paper, we propose two variations of a tree-based constraint satisfaction technique to evaluate network constraints on continuous network data. A Domain Specific Language (DSL) is developed so that the IDS users can specify different intrusions related to their networks. We also present a prototype implementation of these techniques. We evaluate the performance and effectiveness of our approach against the network traffic data generated from an experimental network.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120950146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards analysis of IP communication in a constrained environment of tactical radio networks 战术无线网络受限环境下IP通信分析
M. Marek, O. Ryšavý, V. Veselý
The trend of unifying communication by deploying TCP/IP also influenced the domain of tactical networks. Commonly used narrowband waveform tactical radios offer only the low bandwidth data transfer. Because of very restricted resources available in these systems running the unmodified TCP/IP protocol stack is problematic if not impossible. This paper presents a simulation-based approach to a systematic analysis of TCP/IP communication in the narrowband tactical radio networks. The aim is to provide a framework able to analysis the source of problems that avoid deploying TCP/IP in tactical radio communication. The proposed method is demonstrated by providing an analysis of a few Internet protocols and evaluation of the suggested simple improvement to address resolution protocol that reduces the number of the required broadcast messages.
通过部署TCP/IP统一通信的趋势也影响了战术网络的领域。常用的窄带波形战术无线电只提供低带宽的数据传输。由于在这些系统中可用的资源非常有限,运行未经修改的TCP/IP协议栈即使不是不可能,也是有问题的。本文提出了一种基于仿真的方法,对窄带战术无线电网络中的TCP/IP通信进行了系统分析。目的是提供一个能够分析问题来源的框架,避免在战术无线电通信中部署TCP/IP。通过对一些互联网协议的分析和对地址解析协议的简单改进的评估,证明了所提出的方法可以减少所需广播消息的数量。
{"title":"Towards analysis of IP communication in a constrained environment of tactical radio networks","authors":"M. Marek, O. Ryšavý, V. Veselý","doi":"10.1145/3123779.3123790","DOIUrl":"https://doi.org/10.1145/3123779.3123790","url":null,"abstract":"The trend of unifying communication by deploying TCP/IP also influenced the domain of tactical networks. Commonly used narrowband waveform tactical radios offer only the low bandwidth data transfer. Because of very restricted resources available in these systems running the unmodified TCP/IP protocol stack is problematic if not impossible. This paper presents a simulation-based approach to a systematic analysis of TCP/IP communication in the narrowband tactical radio networks. The aim is to provide a framework able to analysis the source of problems that avoid deploying TCP/IP in tactical radio communication. The proposed method is demonstrated by providing an analysis of a few Internet protocols and evaluation of the suggested simple improvement to address resolution protocol that reduces the number of the required broadcast messages.","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual channel security 双通道安全
Wissam Al Jurdi, J. B. Abdo
Defying attacks and vulnerabilities has been a challenge since the beginning of modern technology and especially after the gigantic leap of the online market system. Developers tend to aim at protection against theft in a new binary world that opened up a vast field for hacking and breaching personal information. In this study, we propose a dual channel security (DCS) model which is a novel key agreement protocol designed to overcome vulnerabilities and attacks that are arising from well-known protocols. It targets the weaknesses of communication mechanisms commonly used in Diffie-Hellman key exchange (DH), transport layer security (TLS) and near field communication (NFC). Moreover, it eliminates the arduous and costly processes of establishing a secure structure as in public key infrastructure (PKI) and is suitable for two kinds of applications: point of sale terminals (POS) and short-range wireless interconnection of mobile devices (D2D).
自现代技术出现以来,特别是在在线市场系统出现巨大飞跃之后,抵御攻击和漏洞一直是一个挑战。开发人员倾向于在一个新的二进制世界中防止盗窃,这为黑客攻击和泄露个人信息开辟了广阔的领域。在这项研究中,我们提出了一个双通道安全(DCS)模型,这是一个新的密钥协议协议,旨在克服由知名协议产生的漏洞和攻击。它针对的是Diffie-Hellman密钥交换(DH)、传输层安全(TLS)和近场通信(NFC)中常用的通信机制的弱点。此外,它消除了像公钥基础设施(PKI)那样建立安全结构的艰巨和昂贵的过程,适用于两种应用:销售点终端(POS)和移动设备的短距离无线互连(D2D)。
{"title":"Dual channel security","authors":"Wissam Al Jurdi, J. B. Abdo","doi":"10.1145/3123779.3123797","DOIUrl":"https://doi.org/10.1145/3123779.3123797","url":null,"abstract":"Defying attacks and vulnerabilities has been a challenge since the beginning of modern technology and especially after the gigantic leap of the online market system. Developers tend to aim at protection against theft in a new binary world that opened up a vast field for hacking and breaching personal information. In this study, we propose a dual channel security (DCS) model which is a novel key agreement protocol designed to overcome vulnerabilities and attacks that are arising from well-known protocols. It targets the weaknesses of communication mechanisms commonly used in Diffie-Hellman key exchange (DH), transport layer security (TLS) and near field communication (NFC). Moreover, it eliminates the arduous and costly processes of establishing a secure structure as in public key infrastructure (PKI) and is suitable for two kinds of applications: point of sale terminals (POS) and short-range wireless interconnection of mobile devices (D2D).","PeriodicalId":405980,"journal":{"name":"Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1