Android is a modern and popular software platform for smartphones. To manage information and features on smartphones, Android employs intent-based mechanism for interapplication or intra-application communication and ...
详细信息
ISBN:
(纸本)9781479965137
Android is a modern and popular software platform for smartphones. To manage information and features on smartphones, Android employs intent-based mechanism for interapplication or intra-application communication and provides a permission-based security model that requires each application to explicitly request permissions in its manifest file. However, misconfiguration defined in manifest files and that embedded in application code may result in vulnerabilities due to developer confusion and general misuse of the features provided by Android. In this paper, we propose a logic-programming-based approach to analyze smartphones and discover misconfiguration vulnerabilities in Android manifest file and application code. To enable misconfiguration vulnerability analysis and detection, we develop a static technique to extract security related information from application code, and employ logic predicates to describe various vulnerabilities. Based on this approach, we developed a tool called SADroid to systematically analyze and detect misconfiguration vulnerabilities in Android smartphones. Our results with two representative phones show that the inherent weakness of Android permission model and developers' programming errors make Android vulnerable to some attacks.
the problem of video monitoring of laboratory rodents by the means of object-oriented logicprogramming is considered. the videos are produced in neurophysiological experiments on the study of convulsive electrical ac...
详细信息
ISBN:
(纸本)9781538642832
the problem of video monitoring of laboratory rodents by the means of object-oriented logicprogramming is considered. the videos are produced in neurophysiological experiments on the study of convulsive electrical activity of the brain cortex. Videos of behaviour of laboratory rats were recorded simultaneously with electroencephalograms (EEG) in the animals. A comparison of EEG data withthe behaviour of the animals is necessary because sharp motions of the animals can result in EEG signals that are very similar to the epileptic discharges. thus, the first task of the video monitoring is recognition of the sharp motions of the animals and using this information for proper interpretation of the results of the experiments. the second task of the video monitoring is analysis of behaviour of animals in cognitive testing. Essential feature of the video records is in that the experiments are conducted in the same cage where the animal lives, that is, the background of the cage is sawdust. the colour of the animals is about the same as the colour of the sawdust;thus the detection of the animals is not a simple task. In the paper, development of low-level algorithms for video analysis as well as logical methods for the analysis of the animal behaviour is discussed. the methods and algorithms are implemented in the Actor Prolog object-oriented logic language.
the proceedings contain 63 papers. the special focus in this conference is on Automated Deduction. the topics include: A resolution theorem prover for intuitionistic logic;proof-terms for classical and intuitionistic ...
ISBN:
(纸本)3540615113
the proceedings contain 63 papers. the special focus in this conference is on Automated Deduction. the topics include: A resolution theorem prover for intuitionistic logic;proof-terms for classical and intuitionistic resolution;proof-search in intuitionistic logic with equality, or back to simultaneous rigid E-unification;extensions to a generalization critic for inductive proof;learning domain knowledge to improve theorem proving;patching faulty conjectures;internal analogy in theorem proving;termination of theorem proving by reuse;termination of algorithms over non-freely generated data types;a proof checker with abstraction;the design of the CADE-13 ATP system competition;elimination of predicate quantifiers;a geometry theorem prover;structuring metatheory on inductive definitions;an embedding of ruby in isabelle;mechanical verification of mutually recursive procedures;decentralized traffic control system based on logicprogramming;presenting machine-found proofs;towards an expert system for many-valued logics;a system presentation;an introduction to geometry expert;simple competitive parallel theorem provers;unification algorithms cannot be combined in polynomial time;unification and matching modulo nilpotence;an improved lower bound for the elementary theories of trees;prolog technology theorem prover for default reasoning;an updated system description;generating models by SEM;optimizing proof search in model elimination;an abstract machine for fixed-order dynamically stratified programs;unification in pseudo-linear sort theories is decidable;theorem proving with group presentations;transforming termination by self-labelling;theorem proving in cancellative abelian monoids and on the practical value of different definitional translations to normal form.
Applying finite-state verification techniques to software systems looks attractive because they are capable of detecting very subtle defects in the logic design of these systems. Nevertheless, the integration of exist...
详细信息
Applying finite-state verification techniques to software systems looks attractive because they are capable of detecting very subtle defects in the logic design of these systems. Nevertheless, the integration of existing formal verification tools within programming environments is not yet easy, mainly because of the semantic gap between widely used programming languages and the languages used to describe system requirements. In this paper, we propose a formal requirement specification notation based on linear temporal logic, with regard to object oriented program elements, such as classes and interfaces. the specification is inherently object oriented and is meant for the verification of concurrent and distributed software systems. (C) 2003 Elsevier Inc. All rights reserved.
Recent statistical performance studies of search algorithms in difficult combinatorial problems have demonstrated the benefits of randomising and restarting the search procedure. Specifically, it has been found that i...
详细信息
Recent statistical performance studies of search algorithms in difficult combinatorial problems have demonstrated the benefits of randomising and restarting the search procedure. Specifically, it has been found that if the search cost distribution of the non-restarted randomised search exhibits a slower-than-exponential decay (that is, a "heavy tail"), restarts can reduce the search cost expectation. We report on an empirical study of randomised restarted search in ILP. Our experiments conducted on a high-performance distributed computing platform provide an extensive statistical performance sample of five search algorithms operating on two principally different classes of ILP problems, one represented by an artificially generated graph problem and the other by three traditional classification benchmarks (mutagenicity, carcinogenicity, finite element mesh design). the sample allows us to (1) estimate the conditional expected value of the search cost (measured by the total number of clauses explored) given the minimum clause score required and a "cutoff" value (the number of clauses examined before the search is restarted), (2) estimate the conditional expected clause score given the cutoff value and the invested search cost, and (3) compare the performance of randomised restarted search strategies to a deterministic non-restarted search. Our findings indicate striking similarities across the five search algorithms and the four domains, in terms of the basic trends of boththe statistics (1) and (2). Also, we observe that the cutoff value is critical for the performance of the search algorithm, and using its optimal value in a randomised restarted search may decrease the mean search cost (by several orders of magnitude) or increase the mean achieved score significantly with respect to that obtained with a deterministic non-restarted search.
three-dimensional models, or pharmacophores, describing Euclidean constraints on the location on small molecules of functional groups (like hydrophobic groups, hydrogen acceptors and donors, etc.), are often used in d...
详细信息
three-dimensional models, or pharmacophores, describing Euclidean constraints on the location on small molecules of functional groups (like hydrophobic groups, hydrogen acceptors and donors, etc.), are often used in drug design to describe the medicinal activity of potential drugs (or 'ligands'). this medicinal activity is produced by interaction of the functional groups on the ligand with a binding site on a target protein. In identifying structure-activity relations of this kind there are three principal issues: (1) It is often difficult to "align" the ligands in order to identify common structural properties that may be responsible for activity;(2) Ligands in solution can adopt different shapes (or 'conformations') arising from torsional rotations about bonds. the 3-D molecular substructure is typically sought on one or more low-energy conformers;and (3) Pharmacophore models must, ideally, predict medicinal activity on some quantitative scale. It has been shown that the logical representation adopted by inductivelogicprogramming (ILP) naturally resolves many of the difficulties associated withthe alignment and multi-conformation issues. However, the predictions of models constructed by ILP have hitherto only been nominal, predicting medicinal activity to be present or absent. In this paper, we investigate the construction of two kinds of quantitative pharmacophoric models with ILP: (a) Models that predict the probability that a ligand is "active";and (b) Models that predict the actual medicinal activity of a ligand. Quantitative predictions are obtained by the utilising the following statistical procedures as background knowledge: logistic regression and naive Bayes, for probability prediction;linear and kernel regression, for activity prediction. the multi-conformation issue and, more generally, the relational representation used by ILP results in some special difficulties in the use of any statistical procedure. We present the principal issues and some solut
this paper presents recent work using the CHILL parser acquisition system to automate the construction of a natural-language interface for database queries. CHILL treats parser acquisition as the learning of search-co...
详细信息
this paper presents recent work using the CHILL parser acquisition system to automate the construction of a natural-language interface for database queries. CHILL treats parser acquisition as the learning of search-control rules within a logic program representing a shift-reduce parser and uses techniques from inductivelogicprogramming to learn relational control knowledge. Starting with a general framework for constructing a suitable logical form, CHILL is able to train on a corpus comprising sentences paired with database queries and induce parsers that map subsequent sentences directly into executable queries. Experimental results with a complete database-query application for U.S. geography show that CHILL is able to learn parsers that outperform a preexisting, hand-crafted counterpart. these results demonstrate the ability of a corpus-based system to produce more than purely syntactic representations. they also provide direct evidence of the utility of an empirical approach at the level of a complete natural language application.
the proceedings contain 41 papers. the special focus in this conference is on Verification, Temporal logic, Lambda Calculus, Linear logic and Descriptive Complexity. the topics include: Topological queries in spatial ...
ISBN:
(纸本)3540665366
the proceedings contain 41 papers. the special focus in this conference is on Verification, Temporal logic, Lambda Calculus, Linear logic and Descriptive Complexity. the topics include: Topological queries in spatial databases;constraint-based analysis of broadcast protocols;applicative control and computational complexity;applying rewriting techniques to the verification of erlang processes;an expressively complete temporal logic without past tense operators for mazurkiewicz traces;using fields and explicit substitutions to implement objects and functions in a de bruijn setting;a linear logical view of linear type isomorphisms;choice logic programs and Nash equilibria in strategic games;resolution method for modal logic with well-founded frames;fixpoint alternation and the game quantifier;open least element principle and bounded query computation;anti-symmetry of higher-order subtyping;monadic presentations of lambda terms using generalized inductive types;a logical viewpoint on process-algebraic quotients;data-refinement for call-by value programming languages and interactive theorem proving using type theory.
暂无评论