By Topic

2012 IEEE Sixth International Conference on Software Security and Reliability Companion

20-22 June 2012

Filter Results

Displaying Results 1 - 25 of 55
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1340 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Message from the Steering Committee Chairs

    Publication Year: 2012, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (468 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2012, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (1099 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (651 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the SSCP Workshop Chairs

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the MVV Workshop Chairs

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2012, Page(s):xv - xvii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Keynote Speech I

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB)

    We argue that a general theory of trust in networks of humans and computers must be built on both a theory of behavioral trust and a theory of computational trust. This argument is motivated by increased participation of people in social networking, crowd sourcing, human computation, and socio-economic protocols, e.g., protocols modeled by trust and gift-exchange games, norms-establishing contract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech II

    Publication Year: 2012, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (102 KB)

    Over the past decade, the rapid advances and growth in deployment of service-based systems, such as the booming cloud computing systems, have had major impacts on the economy, society, and our daily lives. Today, users have grown more accustomed to accessing various online services from a wide range of computing devices, from smart phones/tablets to desktop PCs, for both business and entertainment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech III

    Publication Year: 2012, Page(s): xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB)

    Summary form only given. As network and multi-core systems are becoming pervasive, software systems also go concurrent. In a concurrent setting, in order to accomplish its computation task a program must cooperate with other programs by exchanging messages between them. These result in non-determinism and sophisticated interaction behavior, making it very difficult to ensure that concurrent softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Talk I

    Publication Year: 2012, Page(s): xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (94 KB)

    Licensure of certain software engineers in the United States will be required in at least 10 states by 2013 and, likely, by all US states and jurisdictions within a few years. States license engineers to ensure that those who offer services directly to the public are minimally competent. But what kinds of software systems affect the health, safety and welfare of the public? Which software engineer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Talk II

    Publication Year: 2012, Page(s): xxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    The widespread use of software systems and their ever increasing size and complexity induce many challenges to software developers and quality assurance practitioners. A fully integrated approach, based on qualitative and quantitative aspects, is needed to ensure that software dependability is correctly handled and the expected goals are reached for the final product. Dependability assessment, bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited Talk III

    Publication Year: 2012, Page(s): xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB)

    Summary form only given. Recently, long running transactions attracted much research attention, because they are adopted in distributed systems, such as service-oriented systems, to ensure consistency. How to model and verify long running transactions is critical to improve the reliability of current distributed systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    This paper describes a successive and updated work of Revirt project which presents a virtual machine replay framework on Xen hyper visor. As both the commodity hardware and Xen hyper visor have been changed significantly since the first publication of Revirt, the initial implementation does not meet the needs of modern architecture any more. This paper presents an improved implementation of virtu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Network Cryptography into the Operating System

    Publication Year: 2012, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (979 KB) | HTML iconHTML

    Cryptography libraries are inflexible and difficult for developers to integrate with their applications. These difficulties may be contributing to applications, like PGP, that are non-intuitive for end-users and are often used improperly or not at all. In this paper we argue that the best place for cryptography to be implemented is at the Operating System level rather than the current application-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Security Scheme for Online Banking Based on Virtual Machine

    Publication Year: 2012, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Current online banking scheme built on ordinary software stack, which comprises of the operating system and its applications running on it, is facing attacks including Phishing, Pharming, Malicious Software Attacks (MSW), Man in the Middle Attacks (MITM) and Key logger. Today's countermeasures either prevent only part of these attacks or have high cost on performance and usability. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Software Testing in the Cloud

    Publication Year: 2012, Page(s):18 - 23
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Cloud computing has emerged as a new computing paradigm that impacts several different research fields, including software testing. Testing cloud applications has its own peculiarities that demand for novel testing methods and tools. On the other hand, cloud computing also facilitates and provides opportunities for the development of more effective and scalable software testing techniques. This pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method for Modeling Complex Network of Software System Security

    Publication Year: 2012, Page(s):24 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Complexity is an inherence of software systems. Network models are valid and significant models to describe large-scale complex systems. On the basis of studying the theory development and application status of complex networks, the complex network topology rules based on component of software system security is proposed, the formalized definition of software security complex network model is prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thinking Towards a Pattern Language for Predicate Based Encryption Crypto-Systems

    Publication Year: 2012, Page(s):27 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    Predicate Based Encryption (PBE) is a novel family of public key encryption schemes that allows for expressive, and fine-grained, access control to be integrated within the cryptographic process. Providing an efficient means to realise distributed encrypted access control. Security patterns allow for security problems and their solutions to be described concretely and precisely, and be applied dir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Bayesian Network Models for Predicting Software Reliability

    Publication Year: 2012, Page(s):33 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    This paper discusses the results of applying a hybrid Bayesian Network to predict software reliability measures. The model combined quantitative testing data with subjective expert judgment about program-specific aspects over many releases. Six different programs were analyzed using historical data to validate the model. The model predictions varied from project-to-project suggesting that addition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Automated Security Testing of Android Applications on the Cloud

    Publication Year: 2012, Page(s):35 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    App markets are stirring a paradigm shift in the way software is provisioned to the end users. The benefits of this model are plenty, including the ability to rapidly and effectively acquire, introduce, maintain, and enhance software used by the consumers. This paradigm shift, however, has given rise to a new set of security challenges. In parallel with the emergence of app markets, we have witnes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.