首页 > 最新文献

2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
Differentially Private Generation of Social Networks via Exponential Random Graph Models 基于指数随机图模型的社交网络差分私密生成
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-11
Fang Liu, E. Eugenio, Ick-Hoon Jin, C. Bowen
Many social networks contain sensitive relational information. One approach to protect the sensitive relational information while offering flexibility for social network research and analysis is to release synthetic social networks at a pre-specified privacy risk level, given the original observed network. We propose the DP-ERGM procedure that synthesizes networks that satisfy the differential privacy (DP) via the exponential random graph model (EGRM). We apply DP-ERGM to a college student friendship network and compare its original network information preservation in the generated private networks with two other approaches: differentially private DyadWise Randomized Response (DWRR) and Sanitization of the Conditional probability of Edge given Attribute classes (SCEA). The results suggest that DP-EGRM preserves the original information significantly better than DWRR and SCEA in both network statistics and inferences from ERGMs and latent space models. In addition, DP-ERGM satisfies the node DP, a stronger notion of privacy than the edge DP that DWRR and SCEA satisfy.
许多社交网络包含敏感的关系信息。在为社交网络研究和分析提供灵活性的同时,保护敏感关系信息的一种方法是在给定原始观察网络的情况下,以预先指定的隐私风险级别发布合成社交网络。本文提出了一种基于指数随机图模型(EGRM)的DP- ergm算法,该算法综合了满足差分隐私(DP)的网络。我们将DP-ERGM应用于一个大学生友谊网络,并将其在生成的私有网络中的原始网络信息保存与另外两种方法进行了比较:差分私有DyadWise随机响应(DWRR)和边缘给定属性类的条件概率处理(SCEA)。结果表明,DP-EGRM在网络统计和基于ergm和潜在空间模型的推断上都比DWRR和SCEA更好地保留了原始信息。此外,DP- ergm满足节点DP,比DWRR和SCEA满足的边缘DP具有更强的隐私概念。
{"title":"Differentially Private Generation of Social Networks via Exponential Random Graph Models","authors":"Fang Liu, E. Eugenio, Ick-Hoon Jin, C. Bowen","doi":"10.1109/COMPSAC48688.2020.00-11","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-11","url":null,"abstract":"Many social networks contain sensitive relational information. One approach to protect the sensitive relational information while offering flexibility for social network research and analysis is to release synthetic social networks at a pre-specified privacy risk level, given the original observed network. We propose the DP-ERGM procedure that synthesizes networks that satisfy the differential privacy (DP) via the exponential random graph model (EGRM). We apply DP-ERGM to a college student friendship network and compare its original network information preservation in the generated private networks with two other approaches: differentially private DyadWise Randomized Response (DWRR) and Sanitization of the Conditional probability of Edge given Attribute classes (SCEA). The results suggest that DP-EGRM preserves the original information significantly better than DWRR and SCEA in both network statistics and inferences from ERGMs and latent space models. In addition, DP-ERGM satisfies the node DP, a stronger notion of privacy than the edge DP that DWRR and SCEA satisfy.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124133924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bat Algorithm Method for Automatic Determination of Color and Contrast of Modified Digital Images 修改后数字图像颜色和对比度自动确定的Bat算法
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-94
A. Gálvez, A. Iglesias, E. Osaba, J. Ser
This paper presents a new artificial intelligence-based method to address the following problem: given an initial digital image (source image), and a modification of the image (mod image) obtained from the source through a color map and visual attributes assumed to be unknown, determine suitable values for color map and contrast such that, when applied to the mod image, a similar image to the source is obtained. This problem has several applications in the fields of image restoration and cleaning. Our approach is based on the application of a powerful swarm intelligence method called bat algorithm. The method is tested on an illustrative example of the digital image of a famous oil painting. The experimental results show that the method performs very well, with a similarity error rate between the source and the reconstructed images of only 8.37%.
本文提出了一种基于人工智能的新方法来解决以下问题:给定初始数字图像(源图像),并通过假设未知的颜色映射和视觉属性对源图像(模图像)进行修改,确定合适的颜色映射和对比度值,以便在应用于模图像时获得与源图像相似的图像。该问题在图像恢复和图像清洗等领域有着广泛的应用。我们的方法是基于一种强大的群体智能方法的应用,称为bat算法。以一幅著名油画的数字图像为例,对该方法进行了验证。实验结果表明,该方法具有良好的性能,源图像与重建图像的相似错误率仅为8.37%。
{"title":"Bat Algorithm Method for Automatic Determination of Color and Contrast of Modified Digital Images","authors":"A. Gálvez, A. Iglesias, E. Osaba, J. Ser","doi":"10.1109/COMPSAC48688.2020.00-94","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-94","url":null,"abstract":"This paper presents a new artificial intelligence-based method to address the following problem: given an initial digital image (source image), and a modification of the image (mod image) obtained from the source through a color map and visual attributes assumed to be unknown, determine suitable values for color map and contrast such that, when applied to the mod image, a similar image to the source is obtained. This problem has several applications in the fields of image restoration and cleaning. Our approach is based on the application of a powerful swarm intelligence method called bat algorithm. The method is tested on an illustrative example of the digital image of a famous oil painting. The experimental results show that the method performs very well, with a similarity error rate between the source and the reconstructed images of only 8.37%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus 基于长短期记忆的车载控制器局域网总线入侵检测系统
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00011
Md. Delwar Hossain, Hiroyuki Inoue, H. Ochiai, Doudou Fall, Y. Kadobayashi
The Controller Area Network (CAN) bus system works inside connected cars as a central system for communication between electronic control units (ECUs). Despite its central importance, the CAN does not support an authentication mechanism, i.e., CAN messages are broadcast without basic security features. As a result, it is easy for attackers to launch attacks at the CAN bus network system. Attackers can compromise the CAN bus system in several ways: denial of service, fuzzing, spoofing, etc. It is imperative to devise methodologies to protect modern cars against the aforementioned attacks. In this paper, we propose a Long Short-Term Memory (LSTM)-based Intrusion Detection System (IDS) to detect and mitigate the CAN bus network attacks. We first inject attacks at the CAN bus system in a car that we have at our disposal to generate the attack dataset, which we use to test and train our model. Our results demonstrate that our classifier is efficient in detecting the CAN attacks. We achieved a detection accuracy of 99.9949%.
控制器区域网络(CAN)总线系统作为电子控制单元(ecu)之间通信的中央系统,在联网汽车内部工作。尽管它的核心重要性,CAN不支持认证机制,即,CAN消息广播没有基本的安全特性。因此,攻击者很容易对CAN总线网络系统进行攻击。攻击者可以通过几种方式破坏can总线系统:拒绝服务、模糊测试、欺骗等。必须设计出保护现代汽车免受上述攻击的方法。本文提出了一种基于LSTM的入侵检测系统(IDS)来检测和缓解CAN总线网络的攻击。我们首先向汽车的CAN总线系统注入攻击,以生成攻击数据集,我们用它来测试和训练我们的模型。结果表明,该分类器在检测CAN攻击方面是有效的。我们实现了99.9949%的检测准确率。
{"title":"Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus","authors":"Md. Delwar Hossain, Hiroyuki Inoue, H. Ochiai, Doudou Fall, Y. Kadobayashi","doi":"10.1109/COMPSAC48688.2020.00011","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00011","url":null,"abstract":"The Controller Area Network (CAN) bus system works inside connected cars as a central system for communication between electronic control units (ECUs). Despite its central importance, the CAN does not support an authentication mechanism, i.e., CAN messages are broadcast without basic security features. As a result, it is easy for attackers to launch attacks at the CAN bus network system. Attackers can compromise the CAN bus system in several ways: denial of service, fuzzing, spoofing, etc. It is imperative to devise methodologies to protect modern cars against the aforementioned attacks. In this paper, we propose a Long Short-Term Memory (LSTM)-based Intrusion Detection System (IDS) to detect and mitigate the CAN bus network attacks. We first inject attacks at the CAN bus system in a car that we have at our disposal to generate the attack dataset, which we use to test and train our model. Our results demonstrate that our classifier is efficient in detecting the CAN attacks. We achieved a detection accuracy of 99.9949%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"194 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
sshr: An SSH Proxy Server Responsive to System Changes without Forcing Clients to Change sshr:响应系统更改而不强制客户端更改的SSH代理服务器
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00043
Hirofumi Tsuruta, Ryosuke Matsumoto
To respond to various requests from users, web service infrastructure must change system configurations quickly and flexibly without making users aware of the system configuration. However, because SSH used as a secure remote connection service to a server must send a connection request by specifying the IP address or hostname of the server, the SSH client must know the changed information when the IP address or hostname is changed. To overcome this difficulty, a method exists by which a client tool such as gcloud command obtains the IP address or hostname of the destination server based on unique label information of each server. However, this method requires restrictions and changes to the tools used by the client side. Another method is to use a proxy server, such as SSH Piper, to obtain the IP address or hostname of the destination server based on the SSH username. In existing SSH proxy servers, the source code must be changed directly to change the proxy server behavior. As described herein, we propose an SSH proxy server which can follow system changes using hook functions that can be incorporated by system administrators without requiring restrictions or changes to the clients. The proposed method has high extensibility for system changes because the proxy server behavior can be changed easily merely by modifying the hook function to be incorporated. Furthermore, using the proposed method confirmed that the overhead of establishing an SSH session is about 20 ms, which is a short time during which the SSH client does not feel a delay when logging into the server with SSH.
为了响应来自用户的各种请求,web服务基础设施必须快速灵活地更改系统配置,而不让用户意识到系统配置。但是,由于SSH作为服务器的安全远程连接服务,必须通过指定服务器的IP地址或主机名来发送连接请求,因此当IP地址或主机名发生变化时,SSH客户端必须知道更改的信息。为了克服这个困难,存在一种方法,通过gcloud命令等客户端工具根据每个服务器的唯一标签信息获取目标服务器的IP地址或主机名。但是,这种方法需要对客户端使用的工具进行限制和更改。另一种方法是使用代理服务器(如SSH Piper)根据SSH用户名获取目标服务器的IP地址或主机名。在现有的SSH代理服务器中,必须直接更改源代码来更改代理服务器的行为。如本文所述,我们提出了一个SSH代理服务器,它可以使用钩子函数跟踪系统更改,系统管理员可以将钩子函数合并,而不需要对客户端进行限制或更改。该方法对于系统变更具有很高的可扩展性,因为只需修改要合并的钩子函数就可以很容易地改变代理服务器的行为。此外,使用该方法验证了建立SSH会话的开销约为20ms,这是SSH客户端使用SSH登录服务器时不会感到延迟的短时间。
{"title":"sshr: An SSH Proxy Server Responsive to System Changes without Forcing Clients to Change","authors":"Hirofumi Tsuruta, Ryosuke Matsumoto","doi":"10.1109/COMPSAC48688.2020.00043","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00043","url":null,"abstract":"To respond to various requests from users, web service infrastructure must change system configurations quickly and flexibly without making users aware of the system configuration. However, because SSH used as a secure remote connection service to a server must send a connection request by specifying the IP address or hostname of the server, the SSH client must know the changed information when the IP address or hostname is changed. To overcome this difficulty, a method exists by which a client tool such as gcloud command obtains the IP address or hostname of the destination server based on unique label information of each server. However, this method requires restrictions and changes to the tools used by the client side. Another method is to use a proxy server, such as SSH Piper, to obtain the IP address or hostname of the destination server based on the SSH username. In existing SSH proxy servers, the source code must be changed directly to change the proxy server behavior. As described herein, we propose an SSH proxy server which can follow system changes using hook functions that can be incorporated by system administrators without requiring restrictions or changes to the clients. The proposed method has high extensibility for system changes because the proxy server behavior can be changed easily merely by modifying the hook function to be incorporated. Furthermore, using the proposed method confirmed that the overhead of establishing an SSH session is about 20 ms, which is a short time during which the SSH client does not feel a delay when logging into the server with SSH.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131066358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Adaptive Regularized Risk Forecasting 数据驱动的自适应正则化风险预测
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-77
You Liang, A. Thavaneswaran, Zimo Zhu, R. Thulasiram, Md. Erfanul Hoque
Regularization methods allow data scientists and risk managers to enhance the predictive power of a statistical model and improve the quality of risk forecasts. Financial risk forecasting is about forecasting volatility, Value at Risk (VaR), expected shortfall (ES) and model risk ratio. While regularized estimates have been shown to perform well in model selection and parameter estimation, their applications in financial risk forecasting has not yet been studied. In this paper, regularized adaptive forecasts and computationally efficient forecasting algorithms for volatility, VaR, ES and model risk are studied using various regularization methods such as ridge, lasso and elastic net. Sample sign correlation of standardized log returns (standardized by volatility forecasts) is used to identify the conditional distribution of the log returns series and provide regularized interval forecasts as well as regularized probability forecasts. Superiority of the regularized risk forecasts is demonstrated using different volatility models including a recently proposed generalized data-driven volatility model in [8]. Validation of the regularized risk forecasts using real financial data is given. Regularized probabilistic forecasts for stationary time series models are also discussed in some detail.
正则化方法允许数据科学家和风险管理人员增强统计模型的预测能力,提高风险预测的质量。金融风险预测是对波动率、风险价值(VaR)、预期差额(ES)和模型风险比的预测。虽然正则化估计在模型选择和参数估计方面表现良好,但其在金融风险预测中的应用尚未得到研究。本文采用岭、套索和弹性网等多种正则化方法,研究了波动性、VaR、ES和模型风险的正则化自适应预测和计算效率高的预测算法。使用标准化对数收益(由波动率预测标准化)的样本符号相关性来识别对数收益序列的条件分布,并提供正则化区间预测和正则化概率预测。使用不同的波动率模型(包括最近在[8]中提出的广义数据驱动波动率模型)证明了正则化风险预测的优越性。用实际财务数据对正则化风险预测进行了验证。本文还详细讨论了平稳时间序列模型的正则化概率预测。
{"title":"Data-Driven Adaptive Regularized Risk Forecasting","authors":"You Liang, A. Thavaneswaran, Zimo Zhu, R. Thulasiram, Md. Erfanul Hoque","doi":"10.1109/COMPSAC48688.2020.00-77","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-77","url":null,"abstract":"Regularization methods allow data scientists and risk managers to enhance the predictive power of a statistical model and improve the quality of risk forecasts. Financial risk forecasting is about forecasting volatility, Value at Risk (VaR), expected shortfall (ES) and model risk ratio. While regularized estimates have been shown to perform well in model selection and parameter estimation, their applications in financial risk forecasting has not yet been studied. In this paper, regularized adaptive forecasts and computationally efficient forecasting algorithms for volatility, VaR, ES and model risk are studied using various regularization methods such as ridge, lasso and elastic net. Sample sign correlation of standardized log returns (standardized by volatility forecasts) is used to identify the conditional distribution of the log returns series and provide regularized interval forecasts as well as regularized probability forecasts. Superiority of the regularized risk forecasts is demonstrated using different volatility models including a recently proposed generalized data-driven volatility model in [8]. Validation of the regularized risk forecasts using real financial data is given. Regularized probabilistic forecasts for stationary time series models are also discussed in some detail.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"443 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132932544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IDEAL: An Interactive De-Anonymization Learning System 理想:一个交互式去匿名化学习系统
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-210
Na Li, R. Murugesan, Lin Li, Hao Zheng
In the era of digital communities, a massive volume of data is created from people's online activities on a daily basis. Such data is sometimes shared with third-parties for commercial benefits, which has caused people's concerns about privacy disclosure. Privacy preserving technologies have been developed to protect people's sensitive information in data publishing. However, due to the availability of data from other sources, e.g., blogging, it is still possible to de-anonymize users even from anonymized data sets. This paper presents the design and implementation of an Interactive De-Anonymization Learning system—IDEAL. The system can help students learn about de-anonymization through engaging hands-on activities, such as tuning different parameters to evaluate their impact on the accuracy of de-anonymization, and observing the affect of data anonymization on de-anonymization. A pilot lab session to evaluate the system was conducted among thirty-five students at Prairie View A&M University and the feedback was very positive.
在数字社区时代,人们每天的在线活动产生了大量的数据。这些数据有时会出于商业利益与第三方共享,这引起了人们对隐私泄露的担忧。隐私保护技术的发展是为了在数据发布中保护人们的敏感信息。但是,由于其他来源(例如博客)的数据的可用性,即使从匿名数据集也可以对用户进行去匿名化。本文提出了一个交互式去匿名化学习系统ideal的设计与实现。该系统可以帮助学生通过参与动手活动来学习去匿名化,例如调整不同的参数来评估它们对去匿名化准确性的影响,以及观察数据匿名化对去匿名化的影响。在Prairie View A&M大学的35名学生中进行了一次试验,以评估该系统,反馈非常积极。
{"title":"IDEAL: An Interactive De-Anonymization Learning System","authors":"Na Li, R. Murugesan, Lin Li, Hao Zheng","doi":"10.1109/COMPSAC48688.2020.0-210","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-210","url":null,"abstract":"In the era of digital communities, a massive volume of data is created from people's online activities on a daily basis. Such data is sometimes shared with third-parties for commercial benefits, which has caused people's concerns about privacy disclosure. Privacy preserving technologies have been developed to protect people's sensitive information in data publishing. However, due to the availability of data from other sources, e.g., blogging, it is still possible to de-anonymize users even from anonymized data sets. This paper presents the design and implementation of an Interactive De-Anonymization Learning system—IDEAL. The system can help students learn about de-anonymization through engaging hands-on activities, such as tuning different parameters to evaluate their impact on the accuracy of de-anonymization, and observing the affect of data anonymization on de-anonymization. A pilot lab session to evaluate the system was conducted among thirty-five students at Prairie View A&M University and the feedback was very positive.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133493100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Value Driven Process Towards Software Engineering for Business and Society (SE4BS) 面向商业和社会的软件工程价值驱动过程(SE4BS)
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-111
H. Washizaki, Junzo Hagimoto, Kazuo Hamai, Mitsunori Seki, Takeshi Inoue, Shinya Taniguchi, Hiroshi Kobayashi, Kenji Hiranabe, E. Hanyuda
Successful digital transformation (DX) requires not only technology, but also an understanding of the importance of business agility. In addition, without careful traceability, software engineering projects can be not based on business and social values. To address these issues, we categorize useful methods, practices, and models in software development and operations that make connections and traceability from business ideas incorporating business agility to software products, services, and user experiences. Then we propose a typical value-driven process stemming from business and social perspectives as new software engineering necessary for the DX era.
成功的数字化转型(DX)不仅需要技术,还需要理解业务敏捷性的重要性。此外,如果没有仔细的可追溯性,软件工程项目就不能基于业务和社会价值。为了解决这些问题,我们对软件开发和操作中有用的方法、实践和模型进行了分类,这些方法、实践和模型建立了从结合业务敏捷性的业务理念到软件产品、服务和用户体验之间的联系和可追溯性。然后,我们从商业和社会的角度提出了一个典型的价值驱动过程,作为DX时代所需的新软件工程。
{"title":"Value Driven Process Towards Software Engineering for Business and Society (SE4BS)","authors":"H. Washizaki, Junzo Hagimoto, Kazuo Hamai, Mitsunori Seki, Takeshi Inoue, Shinya Taniguchi, Hiroshi Kobayashi, Kenji Hiranabe, E. Hanyuda","doi":"10.1109/COMPSAC48688.2020.0-111","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-111","url":null,"abstract":"Successful digital transformation (DX) requires not only technology, but also an understanding of the importance of business agility. In addition, without careful traceability, software engineering projects can be not based on business and social values. To address these issues, we categorize useful methods, practices, and models in software development and operations that make connections and traceability from business ideas incorporating business agility to software products, services, and user experiences. Then we propose a typical value-driven process stemming from business and social perspectives as new software engineering necessary for the DX era.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Heterogeneous Systems Modelling with Adaptive Traffic Profiles and Its Application to Worst-Case Analysis of a DRAM Controller 基于自适应流量曲线的异构系统建模及其在DRAM控制器最坏情况分析中的应用
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00020
M. Andreozzi, Frances Conboy, G. Stea, Raffaele Zippo
Computing Systems are evolving towards more complex, hetero-geneous systems where multiple computing cores and accelera-tors on the same system concur to improve computing resources utilization, resources re-use and the efficiency of data sharing across workloads. Such complex systems require equally complex tools and models to design and engineer them so that their use-case requirements can be satisfied. Adaptive Traffic Profiles (ATP) introduce a fast prototyping technology, which allows one to model the dynamic memory behavior of computer system de-vices when executing their workloads. ATP defines a standard file format and comes with an open source transaction generator engine written in C++. Both ATP files and the engine are porta-ble and pluggable to different host platforms, to allow workloads to be assessed with various models at different levels of abstraction. We present here the ATP technology developed at Arm and published in [5]. We present a case-study involving the usage of ATP, namely the analysis of the worst-case latency at a DRAM controller, which is assessed via two separate toolchains, both using traffic modelling encoded in ATP.
计算系统正在向更复杂、异构的系统发展,在这种系统中,同一系统上的多个计算核心和加速器协同工作,以提高计算资源利用率、资源重用和跨工作负载的数据共享效率。这样复杂的系统需要同样复杂的工具和模型来设计和设计它们,以便它们的用例需求能够得到满足。自适应流量配置文件(ATP)引入了一种快速原型技术,它允许人们在执行其工作负载时对计算机系统设备的动态内存行为进行建模。ATP定义了一个标准的文件格式,并附带了一个用c++编写的开源事务生成器引擎。ATP文件和引擎都是可移植的,可插入到不同的主机平台,从而允许使用不同抽象级别的各种模型评估工作负载。我们在此介绍由Arm开发并发表在b[5]上的ATP技术。我们提出了一个涉及ATP使用的案例研究,即分析DRAM控制器的最坏情况延迟,通过两个独立的工具链进行评估,两者都使用ATP编码的流量模型。
{"title":"Heterogeneous Systems Modelling with Adaptive Traffic Profiles and Its Application to Worst-Case Analysis of a DRAM Controller","authors":"M. Andreozzi, Frances Conboy, G. Stea, Raffaele Zippo","doi":"10.1109/COMPSAC48688.2020.00020","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00020","url":null,"abstract":"Computing Systems are evolving towards more complex, hetero-geneous systems where multiple computing cores and accelera-tors on the same system concur to improve computing resources utilization, resources re-use and the efficiency of data sharing across workloads. Such complex systems require equally complex tools and models to design and engineer them so that their use-case requirements can be satisfied. Adaptive Traffic Profiles (ATP) introduce a fast prototyping technology, which allows one to model the dynamic memory behavior of computer system de-vices when executing their workloads. ATP defines a standard file format and comes with an open source transaction generator engine written in C++. Both ATP files and the engine are porta-ble and pluggable to different host platforms, to allow workloads to be assessed with various models at different levels of abstraction. We present here the ATP technology developed at Arm and published in [5]. We present a case-study involving the usage of ATP, namely the analysis of the worst-case latency at a DRAM controller, which is assessed via two separate toolchains, both using traffic modelling encoded in ATP.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Empirical Investigation into the Effects of Code Comments on Issue Resolution 代码注释对问题解决影响的实证研究
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-150
Qiwei Song, Xianglong Kong, Lulu Wang, Bixin Li
Comments are beneficial for developers to understand and maintain the code in software development life cycle. Well-commented code can generally help developers to resolve issues efficiently. Due to the complexity of code implementation, code comments may be generated to represent different types of information. And it is hard to keep all the code well-commented in real-world projects. In this case, it is meaningful to investigate how the different types of comments impact the resolution of issues. Then we can maintain the code comments purposefully, and we can also provide some suggestions for the comment generation techniques. To analyze the efforts of different comments on issue resolution, we classify code comments into two categories, i.e., functionality-aspect and non-functionality-aspect comments. In this paper, we analyze the effects of 53k pieces of code comments on the issues from 10 open-source projects within a period of 24 months. The results show that the majority of code comments are used to represent the functionality, e.g., the summary and purpose of code. Nevertheless, the other non-functionality-aspect comments have much stronger correlation with the resolution of software issues. For the resolved patches, the non-functionality-aspect comments are more frequently to be updated or added than the functionality-aspect comments. These findings confirm the important role of non-functionality-aspect comments during issue resolution, although their proportion is far less than that of functionality-aspect comments.
注释有助于开发人员在软件开发生命周期中理解和维护代码。注释良好的代码通常可以帮助开发人员有效地解决问题。由于代码实现的复杂性,可能会生成代码注释来表示不同类型的信息。在真实的项目中,很难保证所有的代码都有良好的注释。在这种情况下,研究不同类型的评论如何影响问题的解决是有意义的。然后,我们可以有目的地维护代码注释,并对注释生成技术提供一些建议。为了分析不同注释对问题解决的作用,我们将代码注释分为两类,即功能方面的注释和非功能方面的注释。在本文中,我们分析了在24个月内来自10个开源项目的53k段代码注释对问题的影响。结果表明,大多数代码注释用于表示功能,例如代码的摘要和目的。然而,其他非功能方面的评论与软件问题的解决有着更强的相关性。对于已解决的补丁,非功能方面的注释比功能方面的注释更频繁地被更新或添加。这些发现证实了非功能方面的注释在问题解决过程中的重要作用,尽管它们的比例远低于功能方面的注释。
{"title":"An Empirical Investigation into the Effects of Code Comments on Issue Resolution","authors":"Qiwei Song, Xianglong Kong, Lulu Wang, Bixin Li","doi":"10.1109/COMPSAC48688.2020.0-150","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-150","url":null,"abstract":"Comments are beneficial for developers to understand and maintain the code in software development life cycle. Well-commented code can generally help developers to resolve issues efficiently. Due to the complexity of code implementation, code comments may be generated to represent different types of information. And it is hard to keep all the code well-commented in real-world projects. In this case, it is meaningful to investigate how the different types of comments impact the resolution of issues. Then we can maintain the code comments purposefully, and we can also provide some suggestions for the comment generation techniques. To analyze the efforts of different comments on issue resolution, we classify code comments into two categories, i.e., functionality-aspect and non-functionality-aspect comments. In this paper, we analyze the effects of 53k pieces of code comments on the issues from 10 open-source projects within a period of 24 months. The results show that the majority of code comments are used to represent the functionality, e.g., the summary and purpose of code. Nevertheless, the other non-functionality-aspect comments have much stronger correlation with the resolution of software issues. For the resolved patches, the non-functionality-aspect comments are more frequently to be updated or added than the functionality-aspect comments. These findings confirm the important role of non-functionality-aspect comments during issue resolution, although their proportion is far less than that of functionality-aspect comments.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives CD- leak:使用CD/DVD驱动器的隐蔽声学信号从无声气隙计算机泄漏秘密
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-163
Mordechai Guri
Air-gapped networks are isolated from the Internet, since they store and process sensitive information. It has been shown that attackers can exfiltrate data from air-gapped networks by sending acoustic signals generated by computer speakers, however this type of covert channel relies on the existence of loudspeakers in the air-gapped environment. In this paper, we present CD-LEAK - a novel acoustic covert channel that works in constrained environments where loudspeakers are not available to the attacker. Malware installed on a compromised computer can maliciously generate acoustic signals via the optical CD/DVD drives. Binary information can then be modulated over the acoustic signals and be picked up by a nearby Internet connected receiver (e.g., a workstation, hidden microphone, smartphone, laptop, etc.). We examine CD/DVD drives and discuss their acoustical characteristics. We also present signal generation and detection, and data modulation and demodulation algorithms. Based on our proposed method, we developed a transmitter and receiver for PCs and smartphones, and provide the design and implementation details. We examine the channel and evaluate it on various optical drives. We also provide a set of countermeasures against this threat - which has been overlooked.
气隙网络与互联网隔离,因为它们存储和处理敏感信息。研究表明,攻击者可以通过发送由计算机扬声器产生的声信号从气隙网络中窃取数据,然而这种隐蔽通道依赖于气隙环境中扬声器的存在。在本文中,我们提出了CD-LEAK——一种新的声学隐蔽通道,可以在攻击者无法使用扬声器的受限环境中工作。安装在受损计算机上的恶意软件可以通过光盘驱动器恶意生成声音信号。然后,二进制信息可以通过声学信号进行调制,并被附近连接互联网的接收器(例如,工作站、隐藏麦克风、智能手机、笔记本电脑等)接收。我们检查CD/DVD驱动器并讨论它们的声学特性。我们还介绍了信号的产生和检测,以及数据调制和解调算法。基于我们提出的方法,我们开发了一个pc和智能手机的发射器和接收器,并提供了设计和实现细节。我们检查通道并在各种光驱上对其进行评估。我们还提供了一套对付这一威胁的对策——这一点一直被忽视。
{"title":"CD-LEAK: Leaking Secrets from Audioless Air-Gapped Computers Using Covert Acoustic Signals from CD/DVD Drives","authors":"Mordechai Guri","doi":"10.1109/COMPSAC48688.2020.0-163","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-163","url":null,"abstract":"Air-gapped networks are isolated from the Internet, since they store and process sensitive information. It has been shown that attackers can exfiltrate data from air-gapped networks by sending acoustic signals generated by computer speakers, however this type of covert channel relies on the existence of loudspeakers in the air-gapped environment. In this paper, we present CD-LEAK - a novel acoustic covert channel that works in constrained environments where loudspeakers are not available to the attacker. Malware installed on a compromised computer can maliciously generate acoustic signals via the optical CD/DVD drives. Binary information can then be modulated over the acoustic signals and be picked up by a nearby Internet connected receiver (e.g., a workstation, hidden microphone, smartphone, laptop, etc.). We examine CD/DVD drives and discuss their acoustical characteristics. We also present signal generation and detection, and data modulation and demodulation algorithms. Based on our proposed method, we developed a transmitter and receiver for PCs and smartphones, and provide the design and implementation details. We examine the channel and evaluate it on various optical drives. We also provide a set of countermeasures against this threat - which has been overlooked.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128842462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1