the development of distributed computing systems and of their usage in domains such as the Internet of things, Big Data, etc., raises numerous questions on the tools available to model the complexity of such systems. ...
详细信息
the rise of software-based system control in safety-critical systems has made software safety a critical part of a system safety program. the risk of catastrophic software system failure increases withthe growth of s...
详细信息
Traditional centralized carbon emission trading systems suffer from data falsification, which is not conducive to the goal of carbon reduction. this paper proposes a blockchain-based on-chain and off-chain dual-truste...
详细信息
Satellite-Terrestrial Integrated Networks (STINs) integrate satellite networks, the Internet, and mobile wireless networks and are able to provide powerful services to users. In STIN, satellite gateways play an import...
详细信息
the proceedings contain 66 papers. the topics discussed include: an improved Gaussian-mapping algorithm for edge detection based on FPGA;traffic sign recognition based on improved YOLOv5s;privacy-preserving arbitrary ...
ISBN:
(纸本)9798350383706
the proceedings contain 66 papers. the topics discussed include: an improved Gaussian-mapping algorithm for edge detection based on FPGA;traffic sign recognition based on improved YOLOv5s;privacy-preserving arbitrary hollow polygon geometric range query scheme in fog computing-based IoVs;graph neural networks for drug response prediction;optimizing real-time trichiasis object detection: a comparative analysis of YOLOv5 and YOLOv8 performance metrics;adaptive opinion control based on two-stage community detection;agile development research based on softwareengineering to software testing;research on the evaluation system for train service plan in high-speed railway based on operation efficiency and effectiveness;biological template protection based on multikey cryptographic decomposition features;and defect detection in computer motherboard assembly through fusion of multi-scale features and attention mechanisms.
the development of more flexible and robust models for reasoning about systems in environments with potentially conflicting information is becoming more and more relevant in different contexts. In this direction, we r...
详细信息
ISBN:
(纸本)9783031352560;9783031352577
the development of more flexible and robust models for reasoning about systems in environments with potentially conflicting information is becoming more and more relevant in different contexts. In this direction, we recently introduced paraconsistent transition systems, i.e. transition systems whose transitions are tagged with a pair of weights, one standing for the degree of evidence that the transition exists, another weighting its potential non existence. Moreover, these structures were endowed with a modal logic [3] that was further formalised as an institution in [5]. this paper goes a step further, proposing an approach for the structured specification of paraconsistent transition processes, i.e. paraconsistent transition systems with initial states. the proposed approach is developed along the lines of [12], which introduced a complete methodology for (standard) reactive systems development building on the Sannella and Tarlecki stepwise implementation process. For this, we enrich the logic with dynamic modalities and hybrid features, and provide a pallet of constructors and abstractors to support the development process of paraconsistent processes along the entire design cycle.
the Internet of things (IoT) extends the reach of the Internet by allowing intelligent devices to discover and connect withthe actual surroundings, as well as interact with other physical entities. software Defined N...
详细信息
Heap-based memory vulnerabilities are significant contributors to software security and reliability. the presence of these vulnerabilities is influenced by factors such as code coverage, the frequency of heap operatio...
详细信息
ISBN:
(纸本)9783031646256;9783031646263
Heap-based memory vulnerabilities are significant contributors to software security and reliability. the presence of these vulnerabilities is influenced by factors such as code coverage, the frequency of heap operations, and the specific execution order. Current fuzzing solutions aim to efficiently detect these vulnerabilities by utilizing static analysis or incorporating feedback on the sequence of heap operations. However, these solutions have limited practical applicability and do not comprehensively address the temporal and spatial aspects of heap operations. In this paper, we propose a dedicated fuzzing technique called CtxFuzz to efficiently discover heap-based temporal and spatial memory vulnerabilities without requiring any domain knowledge. CtxFuzz utilizes context heap operation sequences (the sequences of heap operations such as allocation, deallocation, read, and write that are associated with corresponding heap memory addresses) as a new feedback mechanism to guide the fuzzing process. By doing so, CtxFuzz can explore more heap states and trigger more heap-based memory vulnerabilities, both temporal and spatial. We evaluate CtxFuzz on 9 real-world open-source programs and compare their performance with5 state-of-the-art fuzzers. the results demonstrate that CtxFuzz outperforms most fuzzers in terms of discovering heap-based memory vulnerabilities. Moreover, Our experiments led to the identification of 10 zero-day vulnerabilities (10 CVEs).
In embedded systems development, contract based design is a design paradigm where a system is divided hierarchically into components and developed in a top-down manner, using contracts as a means to divide responsibil...
详细信息
ISBN:
(数字)9783031352577
ISBN:
(纸本)9783031352560;9783031352577
In embedded systems development, contract based design is a design paradigm where a system is divided hierarchically into components and developed in a top-down manner, using contracts as a means to divide responsibilities and manage the complexity of the system. Contract theories provide a formal basis for reasoning about the properties of the system, and of the contracts themselves. In previous work, we have developed a contract theory for sequential, procedural programs, that is defined abstractly, at the semantic level. the theory fulfils well-established, desired properties of system design. In this paper, we present a methodology for applying the contract theory in real embedded software design. We show how to instantiate the contract theory with concrete syntaxes for defining components and contracts, and how the contract theory enables formal reasoning about the resulting objects. In order to cope withthe need for different behavioural models at different levels of abstraction in an embedded system, we extend the contract theory through parametrisation on the semantic domain. We illustrate the application of the proposed methodology on a small, but realistic example, where the temporal logic TLA is used for reasoning at the system level, while lower level components are specified using pre- and post-conditions in the form of ACSL, a specification language for C.
the machine learning classification techniques becomes inaccurate due to presence of imbalance. there are many balancing methods available among them data-based under sampling methods are mostly used. We have also con...
详细信息
暂无评论