This contribution delves into the incorporation of Sustainable Development Goals (SDGs) into the computerengineering curriculum. The study addresses challenges associated with integrating SDGs as cross-cutting conten...
详细信息
Maritime transportation business suffers from trust issues and burdensome paperwork. Blockchain-based smart contracts are a promising solution. Due to the nature of the blockchain, it is important to verify smart cont...
详细信息
ISBN:
(纸本)9783031664557;9783031664564
Maritime transportation business suffers from trust issues and burdensome paperwork. Blockchain-based smart contracts are a promising solution. Due to the nature of the blockchain, it is important to verify smart contracts before deployment, especially for its functionality and legality. In this paper, we propose a verification framework that automatically verifies the functionality and legality requirements of maritime transportation smart contracts. Smart contracts of an application, based on a set of templates, are modeled in a network of timed automata;domain-specific requirements are collected and formulated as temporal logic formulas;real-time model checking tool UPPAAL is then used to check whether these requirements are satisfied. We carry out experiments on nine real-world smart contracts to show the effectiveness and feasibility of our framework. We also compare our work with existing tools to show its effectiveness and efficiency.
In edge-cloud systems, the quality of infrastructure deployment is crucial for delivering high-quality services, especially when using popular Infrastructure as Code (IaC) tools like Ansible. Ensuring the reliability ...
详细信息
ISBN:
(纸本)9783031751097;9783031751103
In edge-cloud systems, the quality of infrastructure deployment is crucial for delivering high-quality services, especially when using popular Infrastructure as Code (IaC) tools like Ansible. Ensuring the reliability of such large-scale code systems poses a significant challenge due to the limited testing resources. software defect prediction (SDP) addresses this limitation by identifying defectprone software modules, allowing developers to prioritize testing resources effectively. This paper introduces a Large Language Model (LLM)-based approach for SDP in Ansible scripts with Code-Smell-guided Prompting (CSP). CSP leverages code smell indicators extracted from Ansible scripts to refine prompts given to LLMs, enhancing their understanding of code structure concerning defects. Our experimental results demonstrate that CSP variants, particularly the Chain of Thought CSP (CoT-CSP), outperform traditional prompting strategies, as evidenced by improved F1-scores and Recall. To the best of our knowledge, this is the first attempt to employ LLMs for SDP in Ansible scripts. By employing a code smell-guided prompting strategy tailored for Ansible, we anticipate that the proposed method will enhance software quality assurance and reliability, thereby increasing the overall reliability of edge-cloud systems.
This paper presents BC-SBOM, a novel blockchainbased system designed to enhance the management of software Bills of Materials (SBOMs). By leveraging blockchain technology, BC-SBOM ensures secure storage and sharing of...
详细信息
ISBN:
(纸本)9791188428137
This paper presents BC-SBOM, a novel blockchainbased system designed to enhance the management of software Bills of Materials (SBOMs). By leveraging blockchain technology, BC-SBOM ensures secure storage and sharing of SBOMs, while providing a comprehensive global view of dependencies among software components. The system also supports rapid propagation of alerts for newly discovered vulnerabilities, thereby increasing responsiveness to potential threats. Offering superior reliability, transparency, and availability compared to traditional SBOM tools, BC-SBOM aims to significantly improve the management of complex softwaresystems and contribute to the advancement of software security practices. Copyright 2025 Global IT Research Institute (GIRI). All rights reserved.
Cycling is an important field of sport and a great example of a sport in which athletes are highly measured due to cycling computers that monitor and document workouts in detail. Leveraging this variety of data, we de...
详细信息
As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. software engineers need to be aware of various security thr...
详细信息
ISBN:
(纸本)9783031783852;9783031783869
As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them. Currently, there is a lack of guidance for software engineers aiming to develop secure web applications. We conducted a design science research study, resulting in a set of guidelines to aid software engineers in developing secure web applications. The set of guidelines was constructed based on interview data with 10 industry practitioners. These guidelines were then evaluated using a survey with 28 respondents. Our results indicate that these proposed guidelines can be applied by software engineers to support the development and assessment of secure web applications in different stages of the software development lifecycle.
Large language models (LLMs) based on transformer architecture have revolutionized natural language processing (NLP), demonstrating excellent capabilities in understanding and generating human-like text. In software E...
详细信息
ISBN:
(纸本)9783031808883;9783031808890
Large language models (LLMs) based on transformer architecture have revolutionized natural language processing (NLP), demonstrating excellent capabilities in understanding and generating human-like text. In softwareengineering, LLMs have been applied in code generation, documentation, and report writing tasks, to support the developer and reduce the amount of manual work. In software Testing, one of the cornerstones of softwareengineering, LLMs have been explored for generating test code, test inputs, automating the oracle process or generating test scenarios. However, their application to high-level testing stages such as system testing, in which a deep knowledge of the business and the technological stack is needed, remains largely unexplored. This paper presents an exploratory study about how LLMs can support system test development. Given that LLM performance depends on input data quality, the study focuses on how to query general purpose LLMs to first obtain test scenarios and then derive test cases from them. The study evaluates two popular LLMs (GPT-4o and GPT-4o-mini), using as a benchmark a European project demonstrator. The study compares two different prompt strategies and employs well-established prompt patterns, showing promising results as well as room for improvement in the application of LLMs to support system testing.
This paper develops a Smart Public Transportation System using RFID technology, IoT integration, and a MERN-based web application for increasing the efficiency, accessibility, and user experience of urban transit syst...
详细信息
作者:
Yang, ShuoLi, HongruGuo, JianECNU
MoE Engn Res Ctr Software Hardware Codesign Technol & Applicat Shanghai Peoples R China ECNU
Shanghai Trusted Ind Internet Software Collaborat Shanghai Peoples R China ECNU
Xinjiang Teachers Coll Shanghai Peoples R China ECNU
Natl Trusted Embedded Software Engn Technol Res C Shanghai Peoples R China
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applicati...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applications, ROS2 is replacing ROS1 at a rapid pace, and its security issues have direct implications for the security of robot systems. This paper presents an exploration and study of the communication security issues of ROS2 by combining CIA triad with the ROS2 communication mechanism. We propose the fundamental security requirements of the ROS2 system under different communication mechanisms and provide formal modeling and definition. Moreover, we classify and analyze network attacks at the ROS2 level and implement a tool, ROS2Tester, to conduct modeling the ROS2 formal security modules, penetration testing and evaluating the security of ROS2 systems.
Smart grid technologies can revolutionize power distribution. However, engineers can't write the software to realize this goal without large, publicly available datasets. Power companies are reluctant to share the...
详细信息
暂无评论