By Topic

Secure System Integration and Reliability Improvement, 2008. SSIRI '08. Second International Conference on

Date 14-17 July 2008

Filter Results

Displaying Results 1 - 25 of 64
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (560 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chair

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the Program Chair

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Founding Chair

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (65 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Keynote abstracts

    Publication Year: 2008, Page(s):xvi - xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SSIRI 2008 Final Program

    Publication Year: 2008, Page(s):xix - xxiii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Vulnerability Analysis of HD Photo Image Viewer Applications

    Publication Year: 2008, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    We investigated whether some of the image viewer applications that render HD photo image files are susceptible to compromise by opening a malformed HD photo image file. We customized and used an automated toolset to conduct both mutation- and generation-based fuzzing to conduct the assessment. The results of exercising the test cases indicate that the image viewer applications are highly resistant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss

    Publication Year: 2008, Page(s):8 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Assuring authenticity of packets is a critical security measure in multicast applications. Due to the high overhead of signing every multicast packet with a digital signature, schemes employing signature amortization abate this cost by endorsing a block of packets at once. By utilizing a fault-tolerant coding algorithm, signature amortization schemes can tolerate packet loss. However, enhancing th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs

    Publication Year: 2008, Page(s):16 - 23
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1877 KB) | HTML iconHTML

    FPGAs are often considered for high-end applications that require embedded cryptography. These devices must thus be protected against physical attacks. However, unlike ASICs, in which custom and backend-level counter-measures can be devised, FPGAs offer less possibilities for a designer to implement counter-measures. We investigate "wave dynamic differential logic'' (WDDL), a logic-level counter-m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Experimental Evaluation of the Reliability of Adaptive Random Testing Methods

    Publication Year: 2008, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3324 KB) | HTML iconHTML

    Adaptive random testing (ART) techniques have been proposed in the literature to improve the effectiveness of random testing (RT) by evenly distributing test cases over the input space. Simulations and mutation analyses of various ART techniques have demonstrated their improvements on fault detecting ability when measured by the number of test cases required to detect the first fault. In this pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pairwise Testing in the Presence of Configuration Change Cost

    Publication Year: 2008, Page(s):32 - 38
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    Testing is an important but expensive part of software development. This paper discusses the minimization of testing cost in the presence of configuration change cost. By configuration change cost we mean the cost of configuration changes that occur in sequential testcase execution - the time and effort incurred in changing the configuration if the execution of two consecutive testcases requires d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Historical Value-Based Approach for Cost-Cognizant Test Case Prioritization to Improve the Effectiveness of Regression Testing

    Publication Year: 2008, Page(s):39 - 46
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Regression testing has been used to support software testing activities and assure the acquirement of appropriate quality through several versions of a software program. Regression testing, however, is too expensive because it requires many test case executions, and the number of test cases increases sharply as the software evolves. In this paper, we propose the Historical Value-Based Approach, wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validating UML Statechart-Based Assertions Libraries for Improved Reliability and Assurance

    Publication Year: 2008, Page(s):47 - 51
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    In this paper we present a new approach for developing libraries of temporal formal specifications. Our approach is novel in its use of UML statechart-based assertions for formal specifications and its emphasis on validation testing, including an emphasis on the inclusion of validation test scenarios as an integral part of a formal specification library. Validation test scenarios are needed to ens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring Reliability and Availability of Soft System Bus

    Publication Year: 2008, Page(s):52 - 59
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (642 KB) | HTML iconHTML

    Many critical systems require high reliability and availability even when the systems are being maintained or upgraded. Soft System Bus (SSB) is the middleware for such systems. A conceptual architecture of SSB based on structured p2p network was proposed in our previous work. But, how high reliability and availability can be ensured was left unsolved. In this paper, we propose mechanisms to solve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Reliability Assessment Based on Deterministic Chaos Theory for an Open Source Software

    Publication Year: 2008, Page(s):60 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Open source software which serve as key components of critical infrastructures in the social life are still ever-expanding now. We focus on the quality problems of open source software developed under open source project. In case of considering the effect of the debugging process in the development of a method of reliability assessment for open source project, it is necessary to grasp the deeply-i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Improvement of Real-Time Embedded System Using Checkpointing

    Publication Year: 2008, Page(s):67 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    The checkpointing problem in real-time embedded systems is dealt with from a reliability point of view. Transient faults are assumed to be detected in a non-concurrent manner (e.g., periodically). The probability of successful real-time task completion in the presence of transient faults is derived with the consideration of the effects of the transient faults that may occur during checkpointing or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Performance Analysis for Software System Considering Real-Time Property in Case of NHPP Task Arrival

    Publication Year: 2008, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    In this paper, we discuss the software performance evaluation method considering the real-time property. The dynamic software reliability growth process is described by the Markovian software reliability model with imperfect debugging. Assuming that the software system can process the multiple tasks simultaneously and that the arrival process of the tasks follows a nonhomogeneous Poisson process (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shortening Test Case Execution Time for Embedded Software

    Publication Year: 2008, Page(s):81 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    Cost-effectiveness is perhaps the most driving characteristic behind a test automation approach aiming to spend less time in testing a software and finding as many faults as possible. Many research papers have been addressing the automation of test case generation activity by means of models, methods, tools and frameworks. However, in a practical software development environment it is not reasonab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Blind Watermarking Scheme Based on Wavelet Tree Quantization

    Publication Year: 2008, Page(s):89 - 95
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2865 KB) | HTML iconHTML

    This paper proposes a blind watermarking scheme based on wavelet tree quantization for copyright protection. In such a quantization scheme, there exists a large significant difference while embedding a watermark bit 1 and a watermark bit 0; it then does not require any original image or watermark during the watermark extraction. As a result, the watermarked images look lossless in comparison with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.