Crash report analysis is a necessary step before developers begin fixing errors. Fuzzing or hybrid (with dynamic symbolic execution) fuzzing is often used in the secure Development lifecycle. Modern fuzzers could prod...
详细信息
ISBN:
(纸本)9781665423311
Crash report analysis is a necessary step before developers begin fixing errors. Fuzzing or hybrid (with dynamic symbolic execution) fuzzing is often used in the secure Development lifecycle. Modern fuzzers could produce many crashes and developers do not have enough time to fix them till release date. There are two approaches that could reduce developers' effort on crash analysis: crash clustering and crash severity estimation. Crash severity estimation could help developers to prioritize crashes and close security issues first. Crash clustering puts similar crash reports in one cluster what could speed up the analyzing time for all crash reports. In this paper, we focus on crash clustering. We propose an approach for clustering and deduplicating of crashes that occurred in Linux applications. We implement this approach as a tool that could cluster Casr [1] crash reports. We evaluated our tool on a set of crash reports that was collected from fuzzing results.
The article is devoted to the study of the issues of lexicalisation of the so-called 'somatic lexicon' in the paradigm of spatial case forms in the modern Udmurt language in a typological aspect. The relevance...
详细信息
ISBN:
(纸本)9798350349993
The article is devoted to the study of the issues of lexicalisation of the so-called 'somatic lexicon' in the paradigm of spatial case forms in the modern Udmurt language in a typological aspect. The relevance of the research lies in the fact that the study of the above questions of Udmurt linguistics opens new perspectives to some lexico-grammatical problems of Permic linguistics both from a diachronic and synchronistic aspect. As a result of the study it was revealed that the somatic lexicon is represented in different degrees in the case paradigm of the modern Udmurt language, the most common being the use of the illative case. Apparently, this also explains the fact that the process of lexicalisation is most often implemented in the specified grammatical form. This is also confirmed by fixed word combinations, where one element has now lost its independent distribution: tode vajyny 'to remember', bure vajyny 'to remember', sane ponyny 'to take into account' and others. The phenomenon of lexicalisation, that is the transition of combinations of separate elements into fixed word combinations, in Udmurt is most often affected by linguistic units containing the verb forms pyryny 'to enter, come in and other words with the given meaning',lyktyny 'to come, come in, etc.', voź yny 'hold', potyny 'go out, go out, etc.' koš kyny 'go away, leave, etc. ' with examples like pele pyryny 'remember', jyre lyktyny 'come to mind', ś ulmaz voźyny 'hold in the heart', jyryś potyny 'forget', jyryś koš kyny 'forget', etc. The full illative - inessive - elative paradigm can be observed in the word-formation of a limited number of somatic lexical units such as jyr 'head', pel' 'ear', or ś ulem 'heart'. A typologically similar tendency can be observed in other languages, for example in Russian. Evidence is found in written attestations from the turn of the 19th-20th centuries: vojti v golovu 'to enter the head' - derzhat' v golove 'to keep in the head' - vyjti iz golovy 'to leave the h
ParJava integrated environment supporting development and maintenance of data parallel Java-programs is discussed. When a parallel program is developed it is necessary to assure not only its correctness, but also its ...
详细信息
The influence of the viscosity on a wave attractor flow has been previously studied, particularly in relation to the widening of the hydrodynamical structures. In this work, we simulate an attractor flow with a peculi...
The influence of the viscosity on a wave attractor flow has been previously studied, particularly in relation to the widening of the hydrodynamical structures. In this work, we simulate an attractor flow with a peculiar bottom shape that includes an underwater hill. During the simulation, we discovered a side structure appearing beyond the wave attractor. We determined that the appearance of this structure is connected to viscosity. In this article, we consider the behavior of this newly found structure. Additionally, we discuss the challenges of energy accumulation and the estimation of the Reynolds number, which is a non-trivial problem in the context of wave attractor flows.
Lagrangian vortex methods are powerful tool for numerical simulation in CFD and coupled fluid structure interaction (FSI) problems. The main feature of vortex methods is vorticity considering as a primary computed var...
详细信息
The problem of the flow simulation around airfoils using Lagrangian vortex methods is considered. Numerical schemes of the second order of accuracy for free vortex sheet intensity distribution along the airfoil are de...
详细信息
The problem of 2D incompressible flow simulation around airfoils using vortex methods is considered. An exact solution for the boundary integral equation with respect to a free vortex sheet intensity at the airfoil su...
详细信息
The main difference between container-based and virtualization-based cloud environments is the way of the virtualization methods for OS and auxiliary resources. Software applications can be both deployed in a cloud on...
详细信息
ISBN:
(数字)9781728190884
ISBN:
(纸本)9781728190891
The main difference between container-based and virtualization-based cloud environments is the way of the virtualization methods for OS and auxiliary resources. Software applications can be both deployed in a cloud on virtual machines or in local data centres on physical machines. Containers are based on OS-level virtualization. So, container applications can be deployed on a virtual machine in the cloud too. To deal with the growth of various, but functionally similar cloud environments, the TOSCA [1] (Topology and Orchestration for Cloud Applications) standard was created. It allows to describe deployment resources in a TOSCA Domain-specific language that does not depend on the provider. Kubernetes [8] is an open-source system for deployment automation, scaling, and management of containerized applications. TOSCA standard was created to describe cloud applications, but the model may be suitable for describing container applications that Kubernetes orchestrate. This paper considers Kubernetes as a cloud provider and examines the applicability of the TOSCA standard for unifying deployment and orchestration not only of resources provided by virtualization-based clouds but also of containerized ones.
Crash report accumulation is a necessary step during continuous fuzzing. Dynamic software analysis techniques like fuzzing and dynamic symbolic execution generate a large number of crashes for analysis. However, the t...
详细信息
ISBN:
(数字)9798331504663
ISBN:
(纸本)9798331504670
Crash report accumulation is a necessary step during continuous fuzzing. Dynamic software analysis techniques like fuzzing and dynamic symbolic execution generate a large number of crashes for analysis. However, the time and resource constraints often lead to the postponement of fixing some less critical issues, potentially introducing new errors in future releases. Thus, there is a need to distinguish new errors from old ones. We propose a crash accumulation method and implemented it as part of the CASR toolset. We evaluated our approach on crash reports collected from fuzzing results.
The use of cloud computing can reduce the economic costs of maintaining IT infrastructure, but at the same time, the likelihood of confidential data theft increases. To reduce the likelihood of it, cloud computing use...
详细信息
ISBN:
(数字)9781665404761
ISBN:
(纸本)9781665446426
The use of cloud computing can reduce the economic costs of maintaining IT infrastructure, but at the same time, the likelihood of confidential data theft increases. To reduce the likelihood of it, cloud computing uses homomorphic encryption. However, a homomorphic cipher only allows adding and multiplying encrypted numbers; in some cases, a division operation is required to implement algorithms. To implement the division operation with encrypted numbers it is necessary to implement the encrypted number comparison operation. Considering that the operation of comparing encrypted numbers is carried out using numerical methods, it is necessary to adapt the existing algorithms for Euclidean division. In this article, we propose a two-stage algorithm for Euclidean division of numbers encrypted using the CKKS scheme and investigate its properties.
暂无评论