Dangling pointer error is pervasive in C/C++ programs and it is very hard to detect. this paper introduces an efficient detector to detect dangling pointer error in C/C++ programs. By selectively leave some memory acc...
详细信息
In a number of information security scenarios, human beings can be better than technical security measures at detecting threats. this is particularly the case when a threat is based on deception of the user rather tha...
详细信息
In a number of information security scenarios, human beings can be better than technical security measures at detecting threats. this is particularly the case when a threat is based on deception of the user rather than exploitation of a specific technical flaw, as is the case of spear-phishing, application spoofing, multimedia masquerading and other semantic social engineering attacks. Here, we put the concept of the human-as-a-security-sensor to the test with a first case study on a small number of participants subjected to different attacks in a controlled laboratory environment and provided with a mechanism to report these attacks if they spot them. A key challenge is to estimate the reliability of each report, which we address with a machine learning approach. For comparison, we evaluate the ability of known technical security countermeasures in detecting the same threats. this initial proof of concept study shows that the concept is viable.
the proceedings contain 23 papers. the topics discussed include: on notification message re-broadcasting for the node-disjoint multipath routing method in ad hoc networks to counter eavesdropping of data packets;an al...
ISBN:
(纸本)9781467373036
the proceedings contain 23 papers. the topics discussed include: on notification message re-broadcasting for the node-disjoint multipath routing method in ad hoc networks to counter eavesdropping of data packets;an alloy verification model for consensus-based auction protocols;a proposal for mobile collaborative work support platform using an embedded data stream management system;using genetic programming to identify tradeoffs in self-stabilizing programs: a case study;ensuring cloud service guarantees via service level agreement (SLA)-based resource allocation;Tengu: an experimentation platform for big data applications;making WiFi work in multi-hop topologies: automatic negotiation and allocation of airtime;expressing different traffic models using the LegoTG framework;providing a high level abstraction for SDN networks in GENI;in-network dynamic pathlet switching with VIRO for SDN networks;and selection of virtual machines based on classification of MapReduce jobs.
Software is finding place in deeply embedded systems to large scale distributedsystems of cloud service providers such as Amazon and Google. Due to the concurrent and distributed nature of this software, it is hard t...
详细信息
ISBN:
(纸本)9781509041527
Software is finding place in deeply embedded systems to large scale distributedsystems of cloud service providers such as Amazon and Google. Due to the concurrent and distributed nature of this software, it is hard to test for correctness of such systems in a foolproof manner. Explicit state model checking is an approach in which we build a model of the system and specify the properties it should hold. then we construct a state transition system from the model and check if it satisfies the specified properties. there are two kinds of properties of interest: safety and liveness. In this paper, we focus our attention on safety verification, which involves checking if the states that are generated in the transition system satisfy some predicate formulae specified in the form of assertions. the main problem here is that the number of states in the transition system grows exponentially withthe number of bits required to store the state of a model at any given point time. So the available main memory even in a server class machine is not sufficient to model check nontrivial practical models. One approach to address this problem is by using resources from a distributed collection of machines. In this paper, we adopt this approach, by proposing a distributed safety property verification algorithm using the vertex centric programming model.
this paper presents the Fogbow middleware. this middlewareaddresses cloud federation challenges by providing an additional layer for federation atop each local private IaaS that wants to join the federation. It uses d...
详细信息
Introducing physical computing into regular school classes is challenged by constraints of schedules and curricula structures, which do not allow for time-consuming electronics prototyping. We present a novel approach...
详细信息
ISBN:
(纸本)9781450343138
Introducing physical computing into regular school classes is challenged by constraints of schedules and curricula structures, which do not allow for time-consuming electronics prototyping. We present a novel approach to prototyping with physical computing components withthe Arduino-based TALKOO kit: It comprises hardware modules, a visual IDE and prototyping material. Sensor and actuator modules are pluggable and do not require soldering and prior knowledge in electronics. the components have the ability to "talk" back to the visual IDE and to a learning analytics system. A new paradigm for visual programming maps physical modules onto virtual representations on screen making programming more intuitive. the TALKOO kit expands the field of application of physical computing for children in regular school contexts. Preliminary evaluation results show that children were able to build elaborative prototypes within an hour.
In many aspects of human activity, there has been a continuous struggle between the forces of centralization and decentralization. computing exhibits the same phenomenon;after having abandoned mainframes in favor of P...
详细信息
ISBN:
(纸本)9781509014828
In many aspects of human activity, there has been a continuous struggle between the forces of centralization and decentralization. computing exhibits the same phenomenon;after having abandoned mainframes in favor of PCs, the last decade has witnessed an unparalleled centralization and consolidation of services in data centers and clouds. Yet, trust, privacy, security and autonomy concerns are requiring to shift control again, taking services from the central nodes (the "core") to the other logical extreme (the "edge") of the Internet. this development can help blurring the boundary between man and machine, and embrace social computing in which humans are part of the computation and decision-making loop, resulting in a human-centered system design. In this tutorial we will elaborate on the necessary steps to be taken and challenges to be solved to realize this vision. the tutorial will include an overview of related research topics, including peerto-peer networks, blockchains, hybrid and decentralized cloud architectures.
As the data processing demands have been increasing, different types of data processing systems are being developed. the new programming systems have different characteristics like types of data handled, processing te...
详细信息
ISBN:
(纸本)9781509041527
As the data processing demands have been increasing, different types of data processing systems are being developed. the new programming systems have different characteristics like types of data handled, processing technique and performance. However, multiple new systems have introduced difficulties for non-expert users like choosing the right system and usage methodology of the new systems. In order to relieve the burden of common users of conducting data processing tasks and taking relevant advantage of the systems features, we intend to integrate the popular programming systems and provide more efficient data processing services. In this paper, we propose to address the task scheduling problem for integrating multiple programming systems. We have designed a cluster based approach for task scheduling across multiple programming systems. this approach helps in minimizing the makespan of workilows and resource consumption. the simulation results show that the proposed approach can reduce the resource consumption significantly while achieving a low makespan for the workfiows.
there are several applications for the deterministic execution of software, e.g. replicated systems, test and debugging scenarios. In all cases the execution should lead to the same effects in order to be consistent. ...
详细信息
ISBN:
(纸本)9781509014828
there are several applications for the deterministic execution of software, e.g. replicated systems, test and debugging scenarios. In all cases the execution should lead to the same effects in order to be consistent. Multi-threading is one of the major sources of nondeterminism. Several deterministic scheduling algorithms exist that allow concurrent but deterministic executions despite of arbitrary switching decisions of the underlying system schedulers. We present the novel and flexible Unified Deterministic Scheduling algorithm (UDS) for weakly and fully deterministic systems. Compared to existing algorithms, UDS has a broad parameter set that can be (re-)configured even at run-time. Further, we show that many existing algorithms are merely a particular configuration of UDS.
the purpose of this paper is a brief review of tools for parallel computing implemented in the current version of the Julia Language. Julia is a young promising language designed for scientific programming. Before des...
详细信息
暂无评论