By Topic

2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion

27-29 June 2011

Filter Results

Displaying Results 1 - 25 of 47
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (397 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Message from Steering Committee Chairs

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (140 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2011, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (162 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (150 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2011, Page(s):xii - xv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Towards Denotational Semantics for Verilog in PVS

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Verilog is a hardware description language that has been widely used in industry. We have explored its denotational semantics, operational semantics and algebraic semantics. In order to support the mechanical proof for the properties of Verilog programs, this paper studies the mechanical approach to the denotational semantics. We apply PVS in this exploration. Based on this achievement, algebraic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Analysis and Verification for Safety-Critical Software Based on Modelling and Testing

    Publication Year: 2011, Page(s):3 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Currently how to ensure the reliability of safety-critical software is an urgent research. The center of our work is to study the analysis and verification method of spacecraft safety-critical software base on dynamical system to attain the objectives of result predication, status control and requirement verification, which can provide a theory and technical framework for safety-critical software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthesizing SRN Models from System Operations with SysML Diagrams for Availability Analysis

    Publication Year: 2011, Page(s):5 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    The paper proposes a method to synthesize stochastic reward nets (SRN) models from System Modeling Language (SysML) diagrams to evaluate the impact caused by operations in an operation procedure on availability in a systematic way for the ordinary system designers. The proposed method is implemented on in-house model-based system evaluation framework of NEC, called CASSI, for performance and avail... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Learning Environment for Software Security Education

    Publication Year: 2011, Page(s):7 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    In recent years, importance on software security has been recognized. Along with the trend, to foster software engineers who possess software security technologies is expressed. The authors have been tackling software engineering education, and have lots of artifacts as the outcomes of the education. The authors propose a learning process that utilizes these artifacts as input for learning of soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feedback-Directed Test Case Generation Based on UML Activity Diagrams

    Publication Year: 2011, Page(s):9 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    As UML models are widely used as design blueprints, model-based techniques can be used in test case generation. However, test cases obtained from these techniques are usually abstract test cases, represented as sequences of actions in abstract models, and heavy human efforts are needed to translate them into concrete test cases accepted by programs for execution. To reduce this effort, we present ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Approaches to Wireless Sensor Networks

    Publication Year: 2011, Page(s):11 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Wireless sensor networking, as a burgeoning technology, supports the monitoring of physical environments and control of sensor data, and has been widely applied in many fields. Due to its unique features, a number of formal theories, as well as verification tools, have been developed to make an in-depth study. In this paper, we propose a timed broadcasting language, the Timed Wireless Sensor Proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case Study on Installing a Porting Process for Embedded Operating System in a Small Team

    Publication Year: 2011, Page(s):19 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Recently as the demand of smart devices increases, the porting of embedded operating systems such as Google Android, Microsoft Windows Mobile, and Embedded Linux, becomes more important. Consequently, the importance of efficient, systematic porting is also raised. Generally, developers initiate embedded operating system porting from getting operating system source codes and materials. After they g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Machine Learning, a Brief Overview

    Publication Year: 2011, Page(s):26 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    The purpose of this article is to give a brief overview on the current work towards the emerging research problem of secure machine learning. Machine learning technique has been applied widely in various applications especially in spam detection and network intrusion detection. Most existing learning schemes assume that the environment they settle in is benign. However this is not always true in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Formal Specification of Automatic Train Protection and Block System for Local Line

    Publication Year: 2011, Page(s):35 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    This paper presents a formal specification of an Automatic Train Protection and Block (ATPB) model for local line railway system in Japan proposed by the author, and validates the model by internal consistency proving and systematic testing. The system consists of two parts, the on-board subsystem and ground subsystem. The former is to detect the basic state of train, such as position, speed and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying the Safety of Xen Security Modules

    Publication Year: 2011, Page(s):30 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    In virtualization environment, the communication and resource sharing between virtual machines can be protected by mandatory access control mechanism to guarantee the isolation of the virtual machines. The safety of the mandatory access control framework depends on whether the security sensitive operations are protected by the security check functions completely. In this paper, we present a novel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and Verification of UML2.0 Sequence Diagrams Using Event Deterministic Finite Automata

    Publication Year: 2011, Page(s):41 - 46
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    A key challenge in software development process is to detect errors in earlier phases of the software life cycle. For this purpose, the verification of UML diagrams plays an important role in detecting flaws at the analysis and design phase. To enhance the correctness of one of the most popular UML diagrams: sequence diagram (SD), model checking propositional projection temporal logic (PPTL) is ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static Data Race Detection for Interrupt-Driven Embedded Software

    Publication Year: 2011, Page(s):47 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Interrupt mechanisms are widely used to process multiple concurrent tasks in the software without OS abstraction layer in various cyber physical systems (CPSs), such as space flight control systems. Data races caused by interrupt preemption frequently occur in those systems, leading to unexpected results or even severe system failures. In recent Chinese space projects, many software defects relate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximate Simulation for Metric Hybrid Input/Output Automata

    Publication Year: 2011, Page(s):53 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Hybrid input/output automata provide a language for the description and analysis of hybrid systems. In this paper, we develop a notion of approximate simulation relation for metric hybrid input/output automata, which is an extension classic simulation relation in hybrid input/output automata, and investigate some interesting results. In addition, we discuss a particular kind of approximation simul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Instrumentation Tool for Program Dynamic Analysis in Java

    Publication Year: 2011, Page(s):60 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1086 KB) | HTML iconHTML

    Dynamic analysis has been widely used in program analysis. Instrumentation is a general technology used to trace dynamic behavior of software. This paper presents a java source code instrumentation tool, which supports making instrumentation manually and automatically according to rules based on AST analysis. On one hand, users can instrument source code manually. It supports to manage those instr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain-Specific Safety Analysis for Digital Nuclear Plant Protection Systems

    Publication Year: 2011, Page(s):68 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1542 KB) | HTML iconHTML

    Rigorous safety demonstration through safety analysis is strongly mandated for safety-critical systems. Nuclear plant protection systems often use techniques such as FTA, FMEA and HAZOP. Safety experts perform them manually, and quality of the analysis totally depends on the ability and experience of the experts. If we restrict the application domain of safety analysis into specific critical failu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.