For over 30 years, system software has been bound by compatibility with legacy applications. The system software base, whether proprietary or open source, is dominated by the programming language C and the POSIX opera...
详细信息
ISBN:
(纸本)9781605580807
For over 30 years, system software has been bound by compatibility with legacy applications. The system software base, whether proprietary or open source, is dominated by the programming language C and the POSIX operating system specification. Even when commercial operating systems stray from this model, they don't go very ***, the POSIX/C base was constructed in a more benign environment than today and before many security issues were widely understood. Rather than fix these issues, compatibility has been deemed more important than security, and so this base has been kept intact with all its flaws. As a result, programmers routinely create software with security holes---even in the most security critical software---and today's systems are easily *** propose a new paradigm of system discontinuity which emphasizes security over compatibility by removing those constructs in our system software which lead to security holes in applications. Of course, removing parts of the interface will break applications, and hence the discontinuity. To deal with this situation, we advocate the use of virtual machines to enable multiple operating systems to run concurrently. Thus high security OSs can be used for the most security sensitive applications. Compatibility is maintained for less security sensitive applications using legacy operating systems. Over time, legacy applications can migrate to a more secure OS, thus raising the security of all applications.
Refactoring is an essential agile practice for software evolution. While program-internal code-level refactoring is well established, architecture-level refactoring has been researched but not yet widely adopted in pr...
详细信息
ISBN:
(纸本)9798400700408
Refactoring is an essential agile practice for software evolution. While program-internal code-level refactoring is well established, architecture-level refactoring has been researched but not yet widely adopted in practice. As a result, application programming interface (API) refactoring is not well understood, and practitioners consequently struggle with the evolution of distributed systems using Web APIs and other remoting technologies. To fill this knowledge gap, we propose to apply refactoring to the problem of designing and developing adaptive APIs. This paper introduces an interface Refactoring Catalog (IRC) and presents eight of its refactorings. IRC has been available online since 2021 and collects 22 refactorings at present. Eleven of these patterns leverage Patterns for API Design, originating from our previous work; the remaining ones deal with the number and size of API endpoints and their operations, cover renaming of these API building blocks and message representation elements, and deal with architectural change.
One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism a...
详细信息
One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism and metamorphism malware is able to fool current detection techniques. Thus, security researchers and the anti-virus industry are facing a herculean task in extracting payloads hidden within packed executables. It is a common practice to use manual unpacking or static unpacking using some software tools and analyse the application programming interface (API) calls for malware detection. However, extracting these features from the unpacked executables for reverse obfuscation is labour intensive and requires deep knowledge of low-level programming that includes kernel and assembly language. This paper presents an automated method of extracting API call features and analysing them in order to understand their use for malicious purpose. While some research has been conducted in arriving at file birthmarks using API call features and the like, there is a scarcity of work that relates to features in malcodes. To address this gap, we attempt to automatically analyse and classify the behavior of API function calls based on the malicious intent hidden within any packed program. This paper uses four-step methodology for developing a fully automated system to arrive at six main categories of suspicious behavior of API call features.
A novel object oriented API that enables the merger of the design power architecture specification with its HDL representation is described. The single high level view of the design and its power intent enabled by the...
详细信息
A novel object oriented API that enables the merger of the design power architecture specification with its HDL representation is described. The single high level view of the design and its power intent enabled by the API promotes many advantages for both design and verification users. An overview of the API architecture is presented together with a sample of methods and usage examples that illustrate its benefits.
Computational grids allow users to share resources of distributed machines, even if those machines belong to different corporations. The scheduling of applications must be performed aiming at performance goals, and fo...
详细信息
Computational grids allow users to share resources of distributed machines, even if those machines belong to different corporations. The scheduling of applications must be performed aiming at performance goals, and focusing on choose which processes can have access to specif resources, and which resources. In this article we discuss aspects of scheduling of application in grid computing environment. We also present a tool for scheduling simulation along with test scenarios and results.
application programming interface (API) constraints on objects are rules that API client code must follow in order to get expected results from these objects. Runtime verification, an important approach for detecting ...
详细信息
application programming interface (API) constraints on objects are rules that API client code must follow in order to get expected results from these objects. Runtime verification, an important approach for detecting API constraint violations, usually suffers from high runtime overhead. This paper focuses on temporal API constraints on multiple interacting objects. Violation detection of such constraints is more challenging than violation detection of single object constraints, and may induce higher runtime overhead. To reduce the runtime overhead, without compromising the effectiveness of verification, we propose a Lazy Verification Approach (LAVA), which enables verification lazily. Verification probes in LAVA are loaded automatically during the program execution as late as possible. And only probes on objects that have been bound by a binding point (a special method invocation that binds involved objects together) are enabled. Based on these optimization strategies, we implemented an efficient and flexible runtime verification framework. We show the effectiveness of our approach by applying it to verify five constraints in the DaCapo [1] benchmark. The empirical results show that our approach can reduce the number of method invocation events sent by probes, which is the main cause of runtime overhead, by 74% to 100% on average, and bring about an optimization ratio of 44.1% to 89.9% on runtime overhead.
This Coastal and Hydraulics Engineering Technical Note describes the approach, methodology, and utilities of a Python code to flexibly create finite element meshes for a single catchment, multiple catchments, or an en...
详细信息
This Coastal and Hydraulics Engineering Technical Note describes the approach, methodology, and utilities of a Python code to flexibly create finite element meshes for a single catchment, multiple catchments, or an entire watershed. This tool was developed with the intent of model development for rapid responses with an emphasis on Adaptive Hydraulics 5.0 Diffusive Wave AdH-DW applications, though any numerical code that uses an unstructured mesh could be applied.
The Human-Systems Integration (HSI) Metric Tradespace Exploration Environment (HMTee) is a convenient R Shiny application for human factors and HSI analysis problems. This report is intended to serve as technical docu...
详细信息
The Human-Systems Integration (HSI) Metric Tradespace Exploration Environment (HMTee) is a convenient R Shiny application for human factors and HSI analysis problems. This report is intended to serve as technical documentation for developers or others with technical expertise to learn about the implementation of HMTee and integrate other software or HSI models with HMTee functionality. It provides an overview of the technical approach, documents the HMTee application programming interface, and provides an exemplar model for analyzing required lifting strength via the Revised NIOSH (National Institute for Occupational Safety and Health) Lifting Equation to illustrate the process of adding new analytical capabilities to HMTee.
Noise is caused by malfunctioning pixels in camera sensors, faulty memory locations in hardware, or transmission in a noisy channel. Two common types of impulse noise are the salt-and-pepper noise and the random-value...
详细信息
Noise is caused by malfunctioning pixels in camera sensors, faulty memory locations in hardware, or transmission in a noisy channel. Two common types of impulse noise are the salt-and-pepper noise and the random-valued noise. There are many works on the restoration of images corrupted by impulse noise. The median filter was once the most popular nonlinear filter for removing impulse noise, because of its good denoising power and computational efficiency. Open MP is an extensive and powerful application programming interface (API) that supports many functionalities required for median filter. Median filter using OpenMP, the corrupted insect pest in paddy field can be analyzed and effective measures can take immediately to eradicate the harmful insect.
暂无评论