By Topic

Secure Software Integration and Reliability Improvement Companion (SSIRI-C), 2010 Fourth International Conference on

Date 9-11 June 2010

Filter Results

Displaying Results 1 - 25 of 43
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Request Permissions | PDF file iconPDF (325 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Request Permissions | PDF file iconPDF (125 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Request Permissions | PDF file iconPDF (115 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - vii
    Request Permissions | PDF file iconPDF (155 KB)  
    Freely Available from IEEE
  • Message from Steering Committee Chairs

    Publication Year: 2010 , Page(s): viii
    Request Permissions | PDF file iconPDF (170 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2010 , Page(s): ix
    Request Permissions | PDF file iconPDF (130 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2010 , Page(s): x
    Request Permissions | PDF file iconPDF (128 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010 , Page(s): xi
    Request Permissions | PDF file iconPDF (115 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010 , Page(s): xii - xiv
    Request Permissions | PDF file iconPDF (127 KB)  
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010 , Page(s): xv
    Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010 , Page(s): xvi
    Request Permissions | PDF file iconPDF (104 KB)  
    Freely Available from IEEE
  • Keynote abstracts

    Publication Year: 2010 , Page(s): xvii - xx
    Request Permissions | Click to expandAbstract | PDF file iconPDF (209 KB)  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic Approach to Model Checking UML State Machines

    Publication Year: 2010 , Page(s): 1 - 6
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (198 KB) |  | HTML iconHTML  

    UML has become the dominant modeling language in software engineering arena. In order to reduce cost induced by design issues, it is crucial to detect model-level errors in the initial phase of software development. In this paper, we focus on the formal verification of dynamic behavior of UML diagrams. We present an approach to automatically verifying models composed of UML state machines. Our app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic Approach to Verify Sensor Network Systems

    Publication Year: 2010 , Page(s): 7 - 12
    Request Permissions | Click to expandAbstract | PDF file iconPDF (306 KB) |  | HTML iconHTML  

    The programming language nesC for TinyOS applications supports special features of sensor network systems by providing a component-oriented programming model which is flexibly concurrent/reactive and event-driven. Sensor network systems are correctness critical since they are expected to work autonomously. Formal verification techniques such as model checking have been successfully applied to assu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Achieving the Reliability in TV Embedded System

    Publication Year: 2010 , Page(s): 13 - 17
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    In this paper we propose an approach to improving the reliability of a TV set through the systematical model-based automated testing procedure. The proposed approach defines a probabilistic transition model of a TV set based on user behavior. The test scenarios are derived from the usage model and conducted through the automated execution framework, in which the TV set under testing is treated as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Analysis of Advanced Automotive ECU Architectures at Early Design Stages Using EMF and Model Transformation

    Publication Year: 2010 , Page(s): 18 - 23
    Request Permissions | Click to expandAbstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    In the automotive industry active safety functions are deployed to better protect the passengers and vulnerable road users in case of an accident. To do so, advanced system architectures which enable an OEM to integrate this new functionality safely and efficiently have to be developed. In order to evaluate different possible concepts at an early stage in the development, model-based approaches ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Method of Probabilistic Model Checking

    Publication Year: 2010 , Page(s): 24 - 25
    Request Permissions | Click to expandAbstract | PDF file iconPDF (122 KB) |  | HTML iconHTML  

    A probabilistic system is useful in modeling randomized algorithms (e.g., consensus algorithms), unreliable or unpredictable behaviors (e.g., human behaviors in decision making process), etc. Markov Decision Process (MDP) is used to construct this kind of system, because it has both nondeterministic and probabilistic choices. In this work, we study probabilistic models and analyze some issues such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constraint Checking for XML-Based Language Specification by SAT Solver

    Publication Year: 2010 , Page(s): 26 - 27
    Request Permissions | Click to expandAbstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    XML has been widely applied in kinds of areas and applications as a data exchange format. Recently, plenty of of languages based on XML emerge. There are many constraints specified by natural language in these XML-based language specifications to regulate the rules that are supposed to be obeyed by designers or programmers. To specify those constraints precisely, we present a relational calculus t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Lexical Analyzer on the Cell Processor

    Publication Year: 2010 , Page(s): 28 - 29
    Request Permissions | Click to expandAbstract | PDF file iconPDF (223 KB) |  | HTML iconHTML  

    Pattern matching or finding the occurrences of a pattern in a text arises frequently in many applications. The task of splitting the character stream or text into words is called tokenization. Search engines use tokenizers. The first phase of a compiler outputs a stream of tokens of the given high-level language program. The pattern rules are specified as regular expressions. Many tools have been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking C# Code: A Translation Approach

    Publication Year: 2010 , Page(s): 30 - 31
    Request Permissions | Click to expandAbstract | PDF file iconPDF (155 KB) |  | HTML iconHTML  

    Extracting model from source code helps to ensure the implementation in accord with design. The properties of interest can be checked on implemented system via the extracted model. Previous approaches usually abstract the source at the level of intermediate language or assembly code. We are building a module to automatically extract CSP# model from C# source code and use PAT (Process Analysis Tool... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structured Assurance Case Methodology for Assessing Software Trustworthiness

    Publication Year: 2010 , Page(s): 32 - 33
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (180 KB) |  | HTML iconHTML  

    We describe ongoing NIST research into software assurance as an important requirement for evaluating software trustworthiness. We describe our efforts to apply a structured assurance case toward assuring selected software properties. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Problem of Usable Binary Authentication

    Publication Year: 2010 , Page(s): 34 - 35
    Request Permissions | Click to expandAbstract | PDF file iconPDF (146 KB) |  | HTML iconHTML  

    Attacks by malware usually work by getting a binary to be executed. Sometimes users are unaware that such binaries are being executed. The end result is that attackers can either compromise a system or get it to fail. One defence against such attacks is to ensure integrity of files [3]. A more comprehensive mechanism is binary authentication (code signing is also a form of binary authentication) w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Verification of a Service Orchestration Language

    Publication Year: 2010 , Page(s): 36 - 37
    Request Permissions | Click to expandAbstract | PDF file iconPDF (130 KB) |  | HTML iconHTML  

    Recently, Orc is proposed as a powerful yet elegant language for distributed and concurrent programming which provides computational services such as distributed communication and data manipulation via sites. With a few concurrency primitives, programmers are able to orchestrate the invocation of sites to achieve a goal, and meanwhile, manage timeouts, priorities, and failures. To guarantee the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Patterns for Integrating Variability in Timed Automata

    Publication Year: 2010 , Page(s): 38 - 45
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (922 KB) |  | HTML iconHTML  

    Products nowadays come in large number of variants, that allow to tailor products to the specific requirements of the customer. In the production process it is desirable to re-use the common core of product variants, and spend the main effort for an invariant in the development of the individualization of the product. This is true for all kinds of industrial products, including software systems an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.