The central management platforms in traditional crowd-sourced software testing networks are easy to become the target of attack by the enemies, and when the central management platform is attacked, it is easy to cause...
详细信息
The central management platforms in traditional crowd-sourced software testing networks are easy to become the target of attack by the enemies, and when the central management platform is attacked, it is easy to cause a single point of failure and bring the whole system down. In addition, when selecting software testing engineers for crowd-sourcing software testing tasks, most mechanisms select engineers based on their credits. This approach is too one-sided and fails to achieve fine-grained engineer selection. In order to solve above problems, we have proposed a non-interactive and fine-grained crowd-sourcing software testing engineer selection mechanism. In our mechanism, the task publisher can select engineers according to their attributes. Next, we have given an implementation of our non-interactive software testing engineer selection mechanism by applying QAP. The privacy of task publisher and engineers is protected. The security proof is also given. Simulation results show that our mechanism is feasible.
This paper briefly analyzes the security mechanism of android platform and describes permission statement and request of android application. According to android permission mechanism and its shortcoming, the android ...
详细信息
This paper briefly analyzes the security mechanism of android platform and describes permission statement and request of android application. According to android permission mechanism and its shortcoming, the android privilege escalation detection technology and attacking principle is mainly analyzed, and privilege escalation attacking model and architecture of application is put forward. Penetration testing tool Drozer is used to detect application permission. Application package and Manifest file is analyzed to obtain privilege elevation vulnerability. At the same time, sensitive combination permission is distinguished to avoid and exclude the use of malicious code.
The field of practical character recognition has seen great advances these years, owing the to proposition of effective newmethod and progress in computer hardware. However, lots of problems like precision and progres...
详细信息
In recent years, microservice architectures have benefited from low coupling and high cohesion characteristics, allowing flexible on-demand deployment of complex applications and simplifying the difficulty of developi...
In recent years, microservice architectures have benefited from low coupling and high cohesion characteristics, allowing flexible on-demand deployment of complex applications and simplifying the difficulty of developing and maintaining large software systems. However, there is limited research on quality models and testing methods for microservice architectures, which leads to the problem that microservice architecture applications are difficult to test and evaluate. This paper analyzes the main problems when microservice architecture applications face quality measurement and software testing, further improves and refines the quality model of microservice architecture applications on the basis of the existing ISO software product quality model, and introduces testing methods for microservice architecture applications, which can provide reference for the construction of microservice architecture applications.
Natural language processing (NLP) is rapidly developing. A series of Large Language Models (LLMs) have emerged, represented by ChatGPT, which have made significant breakthroughs in natural language understanding and g...
详细信息
ISBN:
(数字)9798350389500
ISBN:
(纸本)9798350389517
Natural language processing (NLP) is rapidly developing. A series of Large Language Models (LLMs) have emerged, represented by ChatGPT, which have made significant breakthroughs in natural language understanding and generation, enabling fluent dialogue with humans, understanding human intentions, and completing complex tasks. However, in addition to the fairness and toxicity of traditional language models, some new problems, including hallucination, have also emerged in LLMs, making them hard to use. Evaluating LLMs manually is challenging due to subjectivity and inefficiency. In this paper, we focused on the fuzzy matching, toxicity detection, and hallucination detection in the evaluation of LLMs automatically, and fine-tune the Mixtral-8x7B Model, which can be deployed in private cloud environment, and prove the effectiveness of our method through experiments.
The intelligent device and mobile applications has been the growth rapidly. The mobile device and related applications has widely used increasingly. The security and compatibility concern for mobile application is mou...
详细信息
ISBN:
(纸本)9781479942329
The intelligent device and mobile applications has been the growth rapidly. The mobile device and related applications has widely used increasingly. The security and compatibility concern for mobile application is mounting as well. This paper analyzed attributes of security and compatibility corresponding to mobile software testing. The software quality features for security and compatibility is given based on the software quality model. The test methods for security and compatibility are proposed according to test model and requirements for mobile applications. The relevant properties with testing techniques and methods are detailed introduced, which indicates that the test method could be effective for mobile software applications.
Stream computing engine is an important part of big data system, and benchmarking is one of the main means to measure the engine's performance. In this paper, we compare the differences between two engines, Spark ...
详细信息
ISBN:
(纸本)9781665472449
Stream computing engine is an important part of big data system, and benchmarking is one of the main means to measure the engine's performance. In this paper, we compare the differences between two engines, Spark Streaming and Flink, in stream processing technologies. Then the open source benchmarking frameworks supporting stream processing and their respective characteristics are studied, and the HiBench testing framework is selected to test the two stream processing engines. The test results show that Flink is better than Spark Streaming in terms of performance in shuffle, stateful computation and windowed computation.
With the rapid development of software industry, a variety of new technologies are produced. Research and development in cloud computing, big data, artificial intelligence, the Internet of Things, blockchain, and othe...
With the rapid development of software industry, a variety of new technologies are produced. Research and development in cloud computing, big data, artificial intelligence, the Internet of Things, blockchain, and other related fields continue to prosper. The increasing lines of code, function points, escalating scale of software systems, and the rising complexity of softwaredevelopment collectively complicate software cost estimation. This article studies how to estimate the size, workload, and cost of an information system using functional scale measurement methods.
As an important information system of intelligent and connected vehicles, most In-Vehicle Infotainment systems are set up and manage the vehicles through user interaction. This paper presents a Fuzzing method IVIFUZZE...
详细信息
ISBN:
(数字)9798350385557
ISBN:
(纸本)9798350385564
As an important information system of intelligent and connected vehicles, most In-Vehicle Infotainment systems are set up and manage the vehicles through user interaction. This paper presents a Fuzzing method IVIFUZZER for vulnerability exploitation on the operation interface of the In-Vehicle Infotainment system. With the help of automated robotic arm and improved OCR technology, collecting system leakage information and directional detection of the identified input points, 6 zero day vulnerabilities were found. The experimental results show that the proposed IVIFUZZER method is effective.
This paper proposes a new collaborative design method, which is developed from the study of dependencies between the parameters of each part of apparatus, and can be devoted to solve the problems of collaborative prod...
详细信息
暂无评论