Automated Test Generation from Vulnerability Signatures

Size: px
Start display at page:

Download "Automated Test Generation from Vulnerability Signatures"

Transcription

1 Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Astrat We appliations need to validate and sanitize user inputs in order to avoid attaks suh as Cross Site Sripting (XSS) and SQL Injetion. Writing string manipulation ode for input validation and sanitization is an error-prone proess leading to many vulnerailities in real-world we appliations. Automata-ased stati string analysis tehniques an e used to automatially ompute vulneraility signatures (represented as automata) that haraterize all the inputs that an exploit a vulneraility. However, there are several fators that limit the appliaility of stati string analysis tehniques in general: 1) undeidaility of stati string analysis requires the use of approximations leading to false positives, ) stati string analysis tools do not handle all string operations, ) dynami nature of the sripting languages makes stati analysis diffiult. In this paper, we show that vulneraility signatures omputed for delierately inseure we appliations (developed for demonstrating different types of vulnerailities) an e used to generate test ases for other appliations. Given a vulneraility signature represented as an automaton, we present algorithms for test ase generation ased on state, transition, and path overage. These automatially generated test ases an e used to test appliations that are not analyzale statially, and to disover attak strings that demonstrate how the vulnerailities an e exploited. I. INTRODUCTION Corretness of input validation and sanitization operations is a ruial prolem for we appliations. One of the main forms of interation etween a user and a we appliation is through text fields. The text entered y the user is parsed y the we appliation and used as the input parameter for the ation that is exeuted in response to the user s request. During ation exeution, user input an e passed as a parameter to seurity sensitive operations suh as sending a query to the ak-end dataase. If the input sent y the user inserts unintended ommands to the generated dataase query (whih is alled SQL injetion), then seurity of the appliation an e ompromised resulting in unauthorized aess to sensitive data or loss of data. In another attak senario, alled Cross Site Sripting (XSS), a user sends an input that stores maliious ode in the dataase, that an later e used for attaking other users mahines. Even for input fields whih are not entered as text fields (suh as inputs that are entered using a drop ox), a maliious user an hange the input field and insert an attak y manipulating the http request that is generated y the rowser. In order to ensure the seurity of a we appliation, the This researh is supported in part y NSF grants CCF and CNS Muath Alkhalaf is funded in part y a fellowship from the King Saud University. user inputs that flow into seurity sensitive funtions like dataases queries must e orretly validated and sanitized. Unfortunately, we appliations are notorious for seurity vulnerailities suh as SQL injetion and XSS that are due to lak of input validation and sanitization, or errors in string manipulation operations used for input validation and sanitization. In this paper, we present an automated testing framework that targets testing of input validation and sanitization operations in we appliations for disovering vulnerailities. Our framework omines automated testing tehniques with stati string analysis tehniques for vulneraility analysis [1]. We use stati string analysis to otain an over-approximation of all the input strings that an e used to exploit a ertain type of vulneraility. This set of strings is alled a vulneraility signature, whih ould e an infinite set ontaining aritrarily long strings. For speifiation of different types of vulnerailities we use attak patterns developed y seurity researhers. These are regular expressions that haraterize the strings that would ause a vulneraility when sent to a seurity sensitive funtion. Given an attak pattern and a we appliation, we use automata-ased string analysis tehniques to generate an automaton that orresponds to the vulneraility signature for that appliation for the type of vulneraility haraterized y the attak pattern. As input we appliations, we use the delierately inseure we appliations that are developed y seurity researhers to demonstrate different types of programming praties that lead to vulnerailities. Using the vulneraility signature automata generated y analyzing the delierately inseure we appliations, we automatially generate test ases ased on three overage riteria: state, transition and path overage. Eah test ase orresponds to a string suh that, when that string is given as a text field input to a we appliation, it may exploit the vulneraility that is haraterized y the given vulneraility signature. Our automated test generation algorithm tries to minimize the numer of test ases while ahieving the given overage riteria. In order to demonstrate the effetiveness of our approah we experimented on several real-world we appliations. As we report later in the paper, the automatially generated test sets were very effetive in identifying vulnerailities in these appliations. The rest of the paper is organized as follows. In Setion II we give an overview of our approah. In Setion III we review

2 Attak patterns Delierately inseure we appliations Automata-ased Stati String Analysis Forward analysis for vulneraility detetion Bakward analysis for vulneraility signature generation Vulneraility signature automaton SCC identifiation + DAG onstrution Automata-ased Test Generation Min-over paths algorithm Depth-firsttraversal + SCC entry and exit overage SCC overage Test set for state overage Test set for transition overage Test set for path overage Figure 1. Automated Test Generation from Vulneraility Signatures the vulneraility signature generation tehniques we use. In Setion V and VI we disuss the test generation algorithms we use. In Setion VII we show the experimental results of our approah. In Setion VIII we disuss the related work, and we onlude the paper in Setion IX. II. MOTIVATION AND OVERVIEW The high-level flow of our automated testing framework for input validation and sanitization funtions is shown in Figure 1. In this setion we give an overview of different aspets of our approah, efore explaining the tehnial details in the following setions. A. Automata-ased Stati String Analysis Our automated testing framework generates test ases from vulneraility signatures. A vulneraility signature is a haraterization of all user inputs that an exploit a vulneraility. In our framework we use automata-ased string analysis in whih vulneraility signatures are represented as automata. Automata-ased string analysis is a stati program analysis tehnique. Given a set of input values represented as automata, it symolially exeutes the program to ompute the set of string values that an reah to eah program point. Using a forward-analysis that propagates input values to sinks (i.e., seurity sensitive funtions), it is possile to identify attak strings that an reah to a given sink. Then, a akward analysis that propagates the attak strings ak to user input results in an automaton that orresponds to the vulneraility signature. Automata-ased stati string analysis is hallenging due to several reasons. Due to undeidaility of string verifiation prolem, string analysis tehniques use onservative approximations that over-approximate the vulneraility signatures. Due to these approximations vulneraility signatures may ontain strings that do not orrespond to attaks, leading to false positives. Moreover, string analysis tools only model a suset of availale string lirary funtions, and when an unmodeled lirary funtion is enountered, the funtion has to e over-approximated to indiate that it an return all string values, whih results in further loss of preision. Furthermore, forward and akward symoli exeution using automata an ause exponential low-up in the size of the automata when omplex string manipulation operations suh as string-replae are used extensively. Finally, dynami nature of sripting languages used in we appliation development makes stati analysis very hallenging and appliale to a restrited set of programs. Due to all these hallenges it is not possile to have a push-utton automata-ased string analysis that works for all real-world appliations. In this paper we omine stati vulneraility analysis tehniques with automated test generation. The omined approah ompensates for the weaknesses of the stati vulneraility analysis tehniques. In our approah stati vulneraility analysis is applied to a small set of programs and the results from this analysis is used for testing other appliations. Hene, programs with features that make stati vulneraility analysis infeasile an still e heked using automated testing. Moreover, the approximations that are introdued y stati vulneraility analysis that lead to false positives are eliminated during testing. B. Generating Vulneraility Signatures from Delierately Inseure Appliations Seurity researhers have developed appliations that are delierately inseure to demonstrate typial vulnerailities. These appliations are sometimes used to teah different pitfalls to avoid in developing seure appliations, and sometimes they are used as enhmarks for evaluating different vulneraility analysis tehniques. In our framework we use stati string analysis tehniques to analyze delierately inseure appliations and to ompute a haraterization of inputs that an exploit a given type of vulneraility. In order to generate the vulneraility signature for an appliation, we need an attak pattern (speified as a regular expression) that haraterizes a partiular vulneraility. An attak pattern represents the set of attak strings that an exploit a partiular vulneraility if they reah a sink (i.e., a seurity sensitive funtion). Attak patterns for different types of vulnerailities are pulily availale and an e used for vulneraility analysis. Given an attak pattern and a delierately inseure we appliation, we use automata-ased stati string analysis tehniques to generate a vulneraility signature automaton that haraterizes all the inputs for that appliation that an result in an exploit for the vulneraility haraterized y the given attak pattern. I.e., the vulneraility signature automaton only aepts the strings that are in the vulneraility signature. In the next phase of our approah we automatially generate test ases from the vulneraility signature automaton.

3 C. Automated Test Generation from Vulneraility Signatures Given a vulneraility signature automaton, any string aepted y the automaton an e used as a test ase. Hene, any path from the start state of the vulneraility signature automaton to an aepting state haraterizes a string whih an e used as a test ase. However, a vulneraility signature automaton typially aepts an infinite numer of strings sine, typially, there are an infinite ways one an exploit a vulneraility. In order to use vulneraility signature automata for testing, we need to somehow prune this infinite searh spae. Our overall goal is to minimize the numer of test ases while making sure that we over all possile ways of exploiting a vulneraility. The mehanism that allows an automaton to represent an infinite numer of strings is the loops in the automaton. So, in order to minimize the numer of test ases, we have to minimize the way the loops are traversed. We do this y identifying all the strongly-onneted omponents (SCCs) in an automaton and then ollapsing them to onstrut a direted ayli graph (DAG) that only ontains the transitions of the automaton that are not part of an SCC and represents eah SCC as a single node. Using this DAG struture, we do test generation for three overage riteria: 1) state overage where the goal is to over all states of the automaton (inluding the ones in an SCC), ) transition overage, where the goal is to over all transitions of the automaton (inluding the ones in an SCC), ) path overage, where the goal is to over all the paths in the DAG that is onstruted from the automaton, while also overing all possile ways to enter and exit from an SCC. We implement the state and transition overage using the min-over paths algorithm that we exeute on the DAG representation followed y a phase where we ensure the overage of the states and transitions inside the SCC nodes. We implement the path overage using depth-first-traversal, where, when an SCC node is enountered, we ensure that all entry and exit ominations are overed in the generated test ases. D. A Sanitization Example One of the well-known XSS attak strings is the following: <sript>alert( XSS )</sript> The sript-tag indiates exeutale ode and a maliious user might e trying to store a maliious sript to e exeuted on another user s mahine later on. Now, onsider the example ode in Figure extrated from a delierately inseure we appliation. This ode is sanitizing the input provided y the user for the name field in line 7 y deleting all appearanes of the string <sript> (it deletes it y replaing eah appearane of the string <sript> with the empty string). Later on in the program, the variale $html is used as an input for a seurity sensitive funtion, so if the sanitization is not done properly this appliation would have a vulneraility. We an try to hek if the appliation is vulnerale y testing it with the aove attak string. As expeted the sanitization ode will orretly remove the sript-tag and sanitized input will e alert( XSS )</sript>. So, this test input does not detet a vulneraility. However, this appliation has a vulneraility and the sanitization used in Figure is inorret. 1 <?php if(!array_key_exists ("name", $_GET) $_GET["name"] == NULL $_GET["name"] == ""){ $isempty = true; 4 } else { 5 $html.= "<pre>"; 6 $html.= "Hello "; 7 $html.= str_replae( "<sript>", "", $_GET["name"]); 8 $html.= "</pre>"; 9 } 10?> Figure. A Sanitization Example One an generalize the attak strings for the XSS vulneraility as an attak pattern using the following regular expression: /.*<sript.*>.*/ When we run the automata-ased string analysis on the example shown in Figure, we find out that the intersetion of the set of strings that an reah the sink and the aove attak pattern is not empty, i.e., there are some inputs that will ause a string ontaining the sript-tag reah the sink. So, we generate the vulneraility signature for this appliation whih results in an automaton that ontains 59 states and 850 transitions. Note that, this vulneraility signature automaton aptures the fat that the string-replae operation in line 7 will delete all appearanes of the string <sript> from the input. The reason that there are thousands of transitions is due to the fat that there is a transition for eah ASCII harater from eah state. When we use our automated test generation tehnique to generate a test string from the vulneraility signature automaton, we otain the following test input: <srip<sript>t> When we run the appliation with this input we disover an attak, i.e., the sink funtion reeives an input that ontains the string <sript>. This is due to the fat that the inorret sanitization funtion in Figure deletes the sustring <sript> from the aove test input and reates the attak string. In our framework, we use the test strings generated from vulneraility signatures of delierately inseure we appliations to test other appliations. If the appliations we test ontain sanitization errors similar to the errors in delierately inseure we appliations or if they do not use proper sanitization, then the generated test ases an disover their vulnerailities without analyzing them statially. Note that the test inputs generated from vulneraility signatures an also e used for appliations that are statially analyzale in order to eliminate false positives and onstrut exploits (i.e., to generate onrete inputs that demonstrate how a vulneraility an e exploited). III. VULNERABILITY SIGNATURE GENERATION We use an automata-ased string analysis to generate the vulneraility signature from an appliation [], [1]. This analysis takes as input a dependeny graph for the input program. A dependeny graph is a direted graph that speifies how the values of user inputs flow to the seurity sensitive funtions

4 (sinks). The analysis onsists of two phases. In the first phase, we perform a forward symoli reahaility analysis starting from nodes assoiated with input to ompute all possile values that eah node in the dependeny graph an take. We use this information to ollet vulnerale program points, as well as the reahale attak strings for those vulnerale program points. If the program is vulnerale, i.e., if there exists some vulnerale program points, we proeed to the seond phase. In the seond phase, we perform a akward symoli reahaility analysis from the vulnerale program points to ompute all possile values of their predeessors that will result in attak strings at these vulnerale program points. Figure shows the algorithm used in our analysis. The algorithm takes three inputs: a dependeny graph (denoted as G), a set of sink nodes (denoted as Sink), and an attak pattern (denoted as Attk). G is a direted dependeny graph that speifies how the values of user inputs flow to the seurity sensitive funtions. Sink denotes the nodes that are assoiated with seurity sensitive funtions that might lead to vulnerailities. Attk is a regular expression represented as an automaton that aepts the set of attak strings. At eah node, the set of reahale string values is approximated as a regular language and represented symolially as an automaton that aepts the language. To assoiate eah node with its automaton, we reate two automata vetors POST and PRE. The size of oth is ounded y the numer of nodes in G. POST[n] is the automaton aepting all possile string values that an reah node n. PRE[n] is the automaton aepting all possile string values that node n an take to exploit the vulneraility. Initially, all these automata aept nothing, i.e., their language is empty. Vul Sink is the set of vulnerale program points, and initially it is set to an empty set. At line 4, we first ompute POST y alling the forward analysis. At line 5, for eah node n Sink, we generate an automaton tmp y interseting the attak pattern and the possile values of n. If the language of tmp, i.e., L(tmp), is not empty, we identify that n is a vulnerale program point and add it to Vul at line 8. In fat, tmp aepts the set of reahale attak strings at node n that an e used to exploit the vulneraility. Hene, we assign tmp to PRE[n] at line 9. If Vul is not empty, we ompute PRE y alling our akward analysis at line 1. Note that for n Vul, PRE[n] has een assigned. We report vulneraility signatures for eah input node ased on PRE at line If Vul is an empty set, we report that the program is seure with respet to the attak pattern. The forward symoli reahaility analysis is ased on a standard work queue algorithm. We iteratively update the automata vetor POST until a fixpoint is reahed []. Bakward analysis uses the results of the forward analysis. Partiularly, it omputes all possile values of eah node n that an exploit the identified vulneraility. The hallenge in oth forward and akward analyses is omputing pre and post-onditions of string manipulation funtions suh as onatenation, stringreplae et., where the inputs and outputs of the pre and post-ondition operations are automata. We use the tehniques desried in [] for pre and post-ondition operations and the details of the symoli automata-ased forward and akward analyses an e found in [1]. The output of the vulneraility signature generation algo- 1: proedure VULSIGGENERATION(G, Sink, Attk) : INIT(POST, PRE) : Vul {} 4: FWDANALYSIS(G, POST) 5: for all n Sink do 6: tmp POST[n] Attk 7: if L(tmp) then 8: Vul Vul {n} 9: PRE[n] tmp 10: end if 11: end for 1: if Vul then 1: BWDANALYSIS(G, POST, PRE, Vul) 14: for all n Input do 15: REPORTVULNERABILITYSIGNATURE(PRE[n]) 16: end for 17: return Vulnerale 18: else 19: return Seure 0: end if 1: end proedure Figure. Figure 4. Vulneraility Signature Generation u 0 1 a... X Y Z... Large Numer of Paths rithm is a set of vulneraility signature automata. A vulneraility signature automaton is a tuple V = (Q, Σ, δ, q 0, F ), where Q is the set of states, Σ is the input alphaet, δ Q Σ Q is the transition relation, q 0 Q is the initial state, and F Q is the set of final states. The alphaet Σ is the set of ASCII haraters. Eah transition t δ is a tuple t = (q,, q ) where q = soure(t), q = target(t) and Σ. The vulneraility signature automata are deterministi, i.e., there is a single transition for eah soure state and alphaet symol. IV. a... X Y Z... CONVERTING VULNERABILITY SIGNATURE AUTOMATA TO DAGS Some features of the vulneraility signature automata make test generation diffiult. One feature is that there are large numer of transitions in δ where soure(t 0 ) = soure(t 1 ) = soure(t ) =... = soure(t n ) and target(t 0 ) = target(t 1 ) = target(t ) =... = target(t n ). Suh transitions ause an exponential low up in the numer of aepting paths in the automaton, and this leads to a large searh spae for test generation. As an example onsider state q in Figure 4. For this relatively small automaton there are aepting paths. Our solution to this prolem is to ollapse the transitions that have the same soure and target states into one transition as shown in Figure 5. The lael of the ollapsed transition is a range of haraters orresponding to eah transition that it represents. During test generation we only pik one harater from the range representing the all orresponding transitions. 4

5 u 0 1 {a,,,..,x,y,z...} {a,,,..,x,y,z...} 4 SCC 1 Figure 5. Collapsed Transitions SCC 0 a 1 g d e f h SCC o 6 5 i 4 m k n f h o 6 0 SCC 4 m 5 i k n e d g 1 Figure 7. High Level DAG Representation Figure 6. 0 Cyles in Automata a This allows us to avoid exponential low up in the numer of aepting paths. For the rest of the paper we assume that all transitions with the same soure and target states are ollapsed. Another feature of vulneraility signature automata is that they an ontain yles whih results in an infinite numer of aepting paths, i.e., an infinite searh spae for test generation. As an example, in Figure 6, states {q 1, q, q } and {q 4, q 5 } form yles. In order to ound the numer of aepting paths and, therefore the searh spae for test generation, we extrat a high level representation of the given vulneraility signature automaton y identifying its strongly onneted omponents (SCC). The high level representation we otain is a direted ayli graph DAG = (N, E) where N is the set of SCCs and E is the set of edges etween SCCs. At the automaton level eah edge e E is a transition suh that soure(e) s x, target(e) s y and s x s y. We use Tarjan s strongly onneted omponents algorithm to identify the yles in the vulneraility signature automata []. The worst ase time omplexity of this algorithm is O( Q + δ ) for a given vulneraility signature automaton V = (Q, Σ, δ, q 0, F ). High-level DAG representation for the automaton in Figure 6 is shown in Figure 7. It onsists of four strongly onneted omponents N = {SCC 0, SCC 1, SCC, SCC }, and six edges among them E = {e a, e, e k, e n, e f, e h }. V. STATE AND TRANSITION COVERAGE FOR VULNERABILITY SIGNATURE AUTOMATA USING MIN-COVER PATHS ALGORITHM In this setion we disuss generating test ases from vulneraility signature automata ased on state and transition overage riteria. Given a vulneraility signature automaton V = (Q, Σ, δ, q 0, F ), let L(V ) denote the set of strings aepted y V. Our aim is to find two sets of strings S s, S t L(V ) that ahieve state and transition overage, respetively. The state and transition overage definitions are as follows: For eah state in q Q there must e at least one string in S s suh that the aepting path for that strings visits q. For eah (ollapsed) transition t δ there must e at least one string in S t suh that the aepting path for that string inludes t. Finally, we want to generate the sets S s and S t in suh a way that S s and S t are minimized. The prolem of finding minimum numer of strings ased on state and transition overage riteria is very similar to a well-known graph prolem alled minimum over paths. Given a direted ayli graph, minimum over paths is the least numer of paths that visits eah edge of the graph at least one. Minimum over paths prolem has een studied in different researh areas and there are well known solutions to this prolem [4], [5]. One known solution is to redue minimum over paths prolem to the minimum flow prolem [4], [6], [5]. We follow this asi approah with some modifiations. We an divide the state and transition overage algorithms into five main steps: 1) Initialization of DAG, ) Converting DAG into a flow network, ) Minimum flow algorithm, 4) Finding minimum overing paths, 5) Extending paths with SCC Coverage. A. Initialization of DAG Vulneraility signature automaton V = (Q, Σ, δ, q 0, F ) has one start state q 0 and a set of final states F. In order to apply flow algorithms and minimum overing paths algorithm, one virtual final state q v is added to Q, for eah q F, a virtual transition t v = (q, λ, q ) is added to the transition relation δ where λ is a new symol added to the alphaet Σ. The modified automaton has one start state q 0 and one final state q v. A DAG representation DAG = (N, E) is onstruted from the modified automaton as desried in the previous setion. We use n 0 N to denote the start node of the DAG where n 0 = SCC 0 and q 0 SCC 0. Similarly, we use n v N to denote the as final node of the DAG suh that n v = SCC v and q v SCC v. A vulneraility signature automaton always has a sink state that terminates non-aepting paths orresponding to nonaepting strings. As a result, orresponding DAG representation has a sink node that does not have any outgoing edges. We generate only the strings that are aepted y vulneraility signature automaton. To do so we remove the sink node and

6 1: proedure PREPROCESSRIGTHSC(node, queue) : updated False : for all edge outgoingedges(node) do 4: nextnode targetnode(edge) 5: if flow(edge) = 0 then 6: if #inomingedges(nextnode) = 1 or #outgoingedges(nextnode) = 1 then 7: flow(edge) 1 8: updated True 9: else 10: REMOVEFROMDAG(edge) 11: end if 1: end if 1: end for 14: if not updated or alaned(node) = 0 then 15: return 16: end if 17: if updated and alaned(node) < 0 then 18: queue.enqueue(node) 19: else if updated and alaned(node) > 0 then 0: DISTRIBUTEFLOWSEVENLY(node) 1: end if : for all edge outgoingedges(node) do : nextnode targetnode(edge) 4: PREPROCESSRIGTH(nextNode, queue) 5: end for 6: end proedure Figure 8. Phase 1 for Pre-Proessing of State Coverage all inoming edges to the sink node from the DAG using a depth first traversal with a worst ase omplexity of O( E ). edges at different runs. However, this does not affet the state overage. We an define the flow funtion flow(e) as numer of visits for an edge e E. The alaned() funtion ompares the total input flow and total output flow for a node n N ased on flows for eah inoming and outgoing edges. A positive alane means that the total input flow is larger than the total output flow. In that ase line 0 distriutes the input flows to the the output flows y updating the flow values of outgoing edges. For the ase of a negative alane value, distriution is done in the reverse diretion after Phase 1 finishes as desried in [4]. Figure 9 also shows the initial flow values that are assigned to the example DAG. For the example shown in Figure 9, reverse pre-proessing (Phase ) is not neessary sine in the first phase flows are already distriuted orretly. SCC 0 0 a(1) (1) 1 SCC SCC 1 g d 4 m 5 i e n(1) h(1) SCC o 6 () SCC V v B. Converting DAG into a Flow Network A flow network is a DAG where eah edge has a apaity and eah edge reeives a flow. Capaity for eah edge e E is a non-negative real value (e) 0. Flow is a funtion f : E R that satisfies the following properties: For all e E, f(e) (e). For all e E, e E where, soure(e) = target(e ) and target(e) = soure(e ), f(e) = f(e ). For all n N, f(e) + e inoming(n) e outgoing(n) f(e ) = 0. Min-over paths algorithm does not require an upper ound for the apaity of an edge, and we assume that eah edge has infinite apaity. We define a flow as the numer of required visits to an edge in order to take eah path from the start node to the final node. To apply the min-flow algorithm, we need an initial flow assignment for eah edge in the DAG. We use a pre-proessing algorithm [4] to assign an initial flow to eah edge ased on the numer of input and output edges for eah node. This is a two phase algorithm that onsists of a depth first traversal starting from start node (Phase 1) followed y a reverse depth first traversal (Phase ) if neessary. The first phase of the initialization for state overage is shown in Figure 8. The statement at line 6 heks for the edges that an e removed safely. For example edges laeled with f and k an e safely removed from Figure 7. The resulting high level DAG is shown in Figure 9. Depending on the order that for loop retrieves the edges at line, algorithm may remove different Figure 9. Initialized DAG for State Coverage Phase 1 of the pre-proessing algorithm for transition overage is shown in Figure 10. The only modifiation ompared to the algorithm shown in Figure 8 is inside the if lok at line 5. The resulting flows for transition overage are shown in Figure 11. Starting from the initial node, the algorithm first assigns a flow value of 1 to the edges a and. When it omes to SCC during depth first traversal, it first assigns a flow of 1 to the edges k and n. As a result alane value of SCC eomes 1 and that SCC is queued for reverse pre-proessing. Similarly when algorithm first visits the SCC 1 using edges a or k, alane value for SCC 1 eomes negative and SCC 1 is also queued for reverse pre-proessing. However, when the algorithm visits SCC 1 for the seond time, alane value eomes 0 and reverse pre-proessing on SCC 1 does not have any effet. C. Minimum Flow Algorithm After we have initial flows alulated, Ford-Fulkerson algorithm is applied to the flow network with some modifiations [7], [4]. Modified Ford-Fulkerson algorithm omputes the minimum flows to visit eah transition at least one. The algorithm finds paths from the start node to the final node and removes the maximum amount of flow from eah path without reahing 0. Assume that our initialization phase alulated the flow for the path kh in Figure 11 as (4)k()h() instead of ()k(1)h(1). We an take away flows from all the edges in the path kh. Time omplexity of the algorithm for a DAG is O( p max (f 0 f min )) where p max is the maximum length path from start node to final node, f 0 is initial flow set and f min is the minimum flow [4].

7 1: proedure PREPROCESSRIGTHTC(node, queue) : updated False : for all edge outgoingedges(node) do 4: nextnode targetnode(edge) 5: if flow(edge) = 0 then 6: flow(edge) 1 7: updated True 8: end if 9: end for 10: if not updated or alaned(node) = 0 then 11: return 1: end if 1: if updated and alaned(node) < 0 then 14: queue.enqueue(node) 15: else if updated and alaned(node) > 0 then 16: DISTRIBUTEFLOWSEVENLY(node) 17: end if 18: for all edge outgoingedges(node) do 19: nextnode targetnode(edge) 0: PREPROCESSRIGTH(nextNode, queue) 1: end for : end proedure Figure 10. Phase 1 for Pre-Proessing of Transition Coverage SCC 1 e f(1) SCC o SCC V 1: list minp aths NULL : loop : path FINDMINPATH(node start) 4: if path = NULL then 5: reak 6: else 7: minp aths.add(path) 8: end if 9: end loop 10: proedure FINDMINPATH(node) 11: if node = node final then 1: path {} 1: return path 14: end if 15: for all edge outgoingedges(node) do 16: if flow(edge) = 0 then 17: ontinue 18: end if 19: DECREASEFLOWBYONE(edge) 0: nextnode targetnode(edge) 1: path = FINDMINPATH(nextNode) : if path = NULL then : ontinue 4: end if 5: path.add(edge) 6: return path 7: end for 8: return NULL 9: end proedure Figure 1. Minimum Covering Paths Algorithm Figure 11. SCC 0 0 a(1) () 1 SCC g d 4 m 5 i k(1) n(1) Initialized DAG for Transition Coverage D. Finding Minimum Covering Paths After running Minimum Flow Algorithm we an start looking for minimum overing paths. Minimum Covering Paths algorithm finds the edges that have flow(e) > 0 and forms a path that ends at the final node (i.e., the virtual node). Figure 1 shows the general loop and the reursive path finding funtion. For example, given the DAG shown in Figure 11, the minimum overing paths for transition overage are omputed as: afe v, khe v, and ne v where e v is the virtual edge. Let N k e the set of nodes that are k edges away from the start node. Let E k e the set of edges etween N k and N k+1. Let E max e the edge set with maximum size among the sets E 0, E 1, E,...E n. Finally, let P max e the maximum length path from start node to final node. Then, worst ase time omplexity for state and transition overage is O( P max E max ) and the maximum size test set size for oth overage riteria is O( E max ) whih is equal to the numer of minimum overing paths. For the DAGs that are extrated from the same vulneraility signature automaton let E max s denote the size of E max for the DAG generated for state overage and E max t denote the size of E max for the DAG generated for transition overage. Then, we have E max s E max t. For the sets of test ases generated for state and transition overage (S s and S t, respetively) we h(1) 6 () v have S s S t. E. Extending Paths with SCC Coverage One we have the results for minimum overing paths we do a pass on eah path and extend the SCC nodes n N that represent yles. We an define a strongly onneted omponent as SCC = (Q SCC, Σ, δ SCC ) where Q SCC Q and δ SCC δ. Assume there is a state q x Q SCC and a transition t δ. If q ( x) = target(t) and soure(t) / Q SCC, we say state q x is an entry point. Similarly, assume there is an edge q y Q SCC and a transition t δ. If q ( x) = soure(t) and target(t) / Q SCC, we say state q x is an exit point. There are two different strategies for SCC overage ased on DAG overage algorithm in progress. Strategy for the state overage algorithm is the following: Starting from an entry point visit all states q Q SCC at least one and end up in an exit point. Similarly, for transition overage starting from an entry point visit all transitions t δ SCC at least one and end up at an exit point. If δ SCC is greater than zero, then SCC must ontain a yle like SCC 1, SCC, and SCC in Figure 7. To terminate the algorithm we keep a queue for unvisited states or unvisited transitions and use depth first searh whenever neessary. Figure 1 shows the algorithm we use for state overage. DF S funtion at line 7 starts a depth first searh from the state given as its first argument and searhes for the state given as its seond argument without eing trapped in a yle. One it finds the state given as its seond argument, it returns a path that inludes all the states it visited. Algorithm for visiting all transitions t δ SCC is the same exept we keep a queue for unvisited transitions instead of unvisited states. Both algorithms have a worst ase omplexity of O( δ SCC ) whih depends on the overlapping yles within a SCC. Worst ase omplexity of length of the returned path is also the same as the time omplexity.

8 1: proedure VISITSTATES(SCC, q entry, q exit ) : list path NULL : queue notv isited getallstates(scc) 4: q q entry 5: notv isited.remove(q) 6: while size(notv isited) 0 do 7: visited DFS(q, notv isited.dequeue()) 8: notv isited.removeall(visited) 9: path.addall(visited) 10: q visited.last() 11: end while 1: if q q exit then 1: path.addall(dfs(q, q exit )) 14: end if 15: return path 16: end proedure Figure 1. SCC Coverage Consider the example vulneraility signature automaton shown in Figure 9. Based on state overage algorithm it an produe a path.a.h. where eah dot orresponds to a node in the DAG. Starting from the first dot whih is atually SCC 0 we extend the path. SCC 0 returns an empty path and algorithm ontinues with next SCC in the path a.h.. SCC 1 returns e for entry point q 1 and exit point q and algorithm extends the path as aeh.. At the end the algorithm returns the extended path aeh. VI. PATH COVERAGE FOR FOR VULNERABILITY SIGNATURE AUTOMATA USING DEPTH FIRST TRAVERSAL A straight forward definition of path overage would result in an infinite set of test ases due to loops in automata. So, given a vulneraility signature automaton V, we define S p L(V ) as follows: For eah path p in the DAG generated from V there must e a set of strings in S p suh that the aepting paths for those strings must orrespond to p (i.e. they must visit the same set of SCCs in the same order), and there must e an aepting path for eah omination of entry and exit nodes for all the SCCs in the path p. Path Coverage algorithm traverses DAG representation of vulneraility signature automata using a depth-first traversal (DFT). It does not have any initialization phase. It handles SCC entry-exit point overage during path exploration. Assume urrent node in the DFT is n and n orresponds to a SCC. Again assume q x is the entry point for the SCC orresponding to node n. Path overage algorithm alulates paths for all possile ominations of q x with all exit points using the SCC overage algorithm we have for transition overage. Then, it ontinues to explore paths in the high level DAG representation y following exit points in a DFT manner. By doing so, path overage algorithm alulates all possile ominations of all entry and exit points of a SCC. The path overage algorithm generates 5 paths for the example shown in Figure 11. Based on definitions we have in previous setion the time omplexity for path overage is O( E kmax Pmax ). Test size omplexity is the same as the time omplexity whih is asially all paths from start node to final nodes. As a result we have the following test set size omparison for the three overage riteria for the same vulneraility signature S s S t S p. VII. IMPLEMENTATION AND EXPERIMENTS In order to evaluate our automated testing framework, we used a delierately inseure we appliation alled Damn Vulnerale We Appliation (DVWA) to generate vulneraility signatures. DVWA is listed in OWASP Broken We Appliations Projet whih lists delierately inseure we appliations. DVWA has several SQL injetion, stored XSS and refleted XSS attaks with different seurity levels provided y the appliation. Seurity levels are no sanitization, ustom sanitization, and inorret use of uilt-in sanitization funtions. We generated vulneraility signatures for eah attak type onsidering different seurity levels. We used the Stranger stati string analysis tool [8] to generate vulneraility signatures. We ran all the experiments on an Intel I5 mahine with.5ghz X 4 proessors and GB of memory running Uuntu Tale I shows the properties of 5 vulneraility signatures generated from DVWA. We used the following well known attak patterns for vulneraility signature generation. Attak pattern /.*<sript.*>.*/ is used for vulneraility signatures XSS 1, XSS, and XSS. Attak pattern /.* or 1 = 1.*/ is used for vulneraility signature SQLI 1 and attak pattern /.* or 1 = 1.*/ is used for vulneraility signature SQLI. The sizes of the vulneraility signature automata depend on the omplexity and numer of string operations that appliation has on user inputs. We an see that vulneraility signatures SQLI 1 and XSS 1 are larger than the other three vulneraility signature automata. That is eause the orresponding appliation ode has more sanitization on user input. The appliation ode that orresponds to vulneraility signature SQLI has no sanitization at all and the generated vulneraility signature is similar to the attak pattern. For eah vulneraility signature, we an see that there is a ig differene etween the atual numer of transitions that an automaton has and the orresponding numer of ollapsed transitions whih allows us to redue the sizes of the generated test sets. For a given vulneraility signature, the relation etween the sizes of the test sets for different overage riteria follows the ordering we expet where S s S t S p. For larger vulneraility signatures, path overage algorithm produes a large numer of strings as expeted. For a given vulneraility signature, average length of the strings generated for state overage is the smallest. Sine the numer of states are smaller than the numer of transitions this is not surprising. The SCC overage algorithm for state overage produes strings with smaller lengths for most of the ases. In order to evaluate the effetiveness of our automated test generation tehniques we experimented on five open-soure appliations 1) PHP-Fusion v (ontent management system), ) RuuikCMS v1.1.1 (wesite ontent management tool), ) UL Forum v1.1.7 (forum appliation), 4) Snipe Gallery v.1.5 (image management system), 5) PHP Server Monitor v.0.1 (server management sript). We implemented a we appliation driver to automatially exeute the appliations with the automatially generated test strings. We exeuted eah appliation y assigning the automatially generated test strings to the seleted vulnerale input fields. We enaled xdeug tool to reord the server-side funtion all traes for eah request that our we appliation driver sends. After eah request, the we appliation driver extrats the sink funtion

9 Tale I. VULNERABILITY SIGNATURE AUTOMATA Vulneraility Signature Automaton Size Avr. Len. for Coverage # of Strings # of States # of Transitions # of Collapsed Transitions # of SCCs Generated Strings SQLI SQLI XSS XSS XSS State 8 9 Transition Path Cov 1 47 State Cov 1 15 Transition Cov 1 10 Path Cov 1 10 State Cov 8 1 Transition Cov 44 1 Path Cov 9 99 State Cov Transition Cov 8 1,717 Path Cov 8 1,68 State Cov 1 10 Transition Cov 7 Path Cov 7 alls with values of parameters from the trae file. For the SQL injetion attaks, eah all to mysql_query funtion is treated as a sink funtion all. For the XSS attaks, eah all to mysql_query funtion that exeutes INSERT or UPDATE statements is treated as sink funtion all. If the we appliation driver finds a sink funtion all, it heks the value of the query parameter of the sink funtion to onfirm if it ontains any type of attak. Tale II shows the effetiveness of the test sets generated using different overage riteria on different appliations. The sum of the third olumn and the fourth olumn shows the total numer of test strings in a test set generated from all vulneraility signatures for a given overage riteria. For example, there are a total of 19 test strings in the test set generated from all vulneraility signatures using the state overage riteria. Third olumn shows the numer of test strings that deteted the vulneraility in the given appliation (stated in the first olumn), and the fourth olumn shows the numer of test strings that missed the vulneraility. We an learly say that path overage and transition overage have etter detetion rates than state overage. The vulneraility detetion rates for the appliations php fusion and ruuik are lower ompared to other three appliations for eah overage riteria. This is due to the fat that these appliations have more string manipulation operations than the other three. For the fields seleted from other three appliations we oserve the same detetion rates. This is due to the fat that these appliations all have the same type of vulneraility. Tale III shows the vulneraility detetion rates of test sets generated using different overage riteria for eah vulneraility signature. It shows the distriution of the test sets in tale II to different vulneraility signatures and different overage riteria. Path overage riteria has etter detetion rates for vulneraility signatures XSS 1 and SQLI 1 whih are the larger vulneraility signature. For relatively small vulneraility signatures, path overage and transition overage detetion rates are the same. Vulneraility signature SQLI has the worst detetion rate. As we desried previously in this setion, that vulneraility signature is generated from a ode that has no sanitization operations, whih is not good enough for deteting attaks for appliations that have some string operations. One interesting result is that state overage for all XSS vulneraility signatures has a detetion rate 0%. The appliation that we used to generate the vulneraility sig- Tale II. VULNERABILITY DETECTION PERFORMANCE PER APPLICATION Appliation Coverage # Deteted # Missed Detetion Type Rate ulforum ruuik php fusion snipe phpservermon State % Transition % Path % State % Transition % Path % State 17 11% Transition % Path 5 6 4% State % Transition % Path % State % Transition % Path % natures onatenates HTML tags to the user inputs. Resulting vulneraility signature may inlude attak strings that has no losing tag >. State overage generates only strings that do not have losing tags, ut path and transition overage riteria are ale to handle that situation y visiting more transitions. Tale III. VULNERABILITY DETECTION PERFORMANCE PER VULNERABILITY SIGNATURE Appliation Coverage # Deteted # Missed Detetion Type Rate SQLI 1 SQLI XSS 1 XSS XSS State % Transition % Path % State 0 5 0% Transition 0 5 0% Path 0 5 0% State % Transition % Path % State 0 5 0% Transition % Path % State 0 5 0% Transition % Path % Overall, path overage has etter detetion rates as expeted. Transition overage detetion rates are very lose to path overage detetion rates, and transition overage generates smaller test sets. State overage is not effetive in generating attak strings for the vulneraility signatures we used.

10 VIII. RELATED WORK Stati string analysis has een an ative researh area, with the goal of finding and eliminating seurity vulnerailities aused y misuse of string manipulation operations [9], [10], [11], [1], [], [1]. String analysis fouses on statially identifying all possile values of a string expression at a program point, and this knowledge an e leveraged to eliminate vulnerailities suh as SQL injetion and XSS attaks. Due to undeidaility of string analysis prolem stati string analysis approahes use onservative approximations suh as widening [14], [15], [], that an result in false positives. Moreover stati modeling of all string manipulation funtions is hallenging and typially limits the appliaility of stati string analysis tehniques. We are not aware of any prior work that omines stati string analysis and vulneraility signatures with automated test generation. In [16], [17], [18] dynami symoli exeution has een used for automati testing of a we appliation. First, string onstraints are generated using symoli exeution. Then, these onstraints are solved to generate vulnerale input strings. In [17], [18] authors use a ounded string onstraint solver that ounds the length of the strings efore solving the onstraint. In [16] string onstraints are represented using finite state transduers. Unlike dynami symoli exeution, whih is a white ox testing approah, our approah is a lakox speifiation-ased testing approah. Dynami symoli exeution tries to inrease exeution path overage while in our ase we try to inrease overage of the vulneraility signature automaton that we use as a speifiation. In [19] a lak ox SQLI/XSS we vulneraility sanner is developed utilizing manually written attak strings with no speifi riteria. In XSS Analyzer [0], a lak ox testing approah is used where a very large dataase of attak strings is utilized to attak a we appliation. A learning algorithm is used to pik only a suset of this dataase. We use stati analysis to automatially generate vulneraility signatures from whih the attak strings are generated. Also, sine we generate attak strings from an automaton, the original size of the attak string dataase ould e infinite whereas in XSS analyzer the size of the attak string dataase is finite. In [1] state mahine ased test generation using UML state harts is disussed. They define overage riteria suh as single UML transition overage, full prediate overage, transition-pair overage, and omplete sequene overage. These overage riteria are speifi for UML diagrams. In [] authors generate test ases from finite state mahines that orrespond to a software system speifiation. State mahine ased test generation has een used for different areas suh as ontrol systems, protools, iruit design, data proessing, navigation analyses. Minimum over paths algorithm has een studied for program testing [5] in order to generate minimum numer of paths for ertain features and to generate test data for those paths. IX. CONCLUSION We presented an automated testing framework for testing input validation and sanitization operations in we appliations. In our framework the tests are generated from vulneraility signatures that are haraterized as automata. Our experiments show that vulneraility signatures generated from delierately inseure we appliations an e used to generate effetive tests for identifying vulnerailities in other appliations. REFERENCES [1] F. Yu, M. Alkhalaf, and T. Bultan, Generating vulneraility signatures for string manipulating programs using automata-ased forward and akward symoli analyses, in ASE, 009, pp [] F. Yu, T. Bultan, M. Cova, and O. H. Iarra, Symoli string verifiation: An automata-ased approah, in Pro. of SPIN, 008, pp [] R. E. Tarjan, Depth-first searh and linear graph algorithms, SIAM J. Comput., vol. 1, no., pp , 197. [4] M. Brandizi, N. Kuratova, U. Sarkans, and P. Roa-Serra, graphta, a lirary to onvert experimental workflow graphs into taular formats, Bioinformatis, vol. 8, no. 1, pp , 01. [5] S. C. Ntafos and S. L. Hakimi, On path over prolems in digraphs and appliations to program testing, IEEE Trans. Software Eng., vol. 5, no. 5, pp , [6] E. Ciurea and L. Ciupal, Sequential and parallel algorithms for minimum flows, Journal of Applied Mathematis and Computing, vol. 15, no. 1-, pp. 5 75, 004. [7] L. Ford Jr and D. Fulkerson, Maximal flow through a network, in Classi papers in ominatoris. Springer, 1987, pp [8] F. Yu, M. Alkhalaf, and T. Bultan, Stranger: An automata-ased string analysis tool for php, in TACAS, 010, pp [9] A. S. Christensen, A. Møller, and M. I. Shwartzah, Preise analysis of string expressions, in Pro. 10th International Stati Analysis Symposium, SAS 0, ser. LNCS, vol Springer-Verlag, June 00, pp [10] Y. Minamide, Stati approximation of dynamially generated we pages, in Proeedings of the 14th International World Wide We Conferene, 005, pp [11] G. Wassermann and Z. Su, Sound and preise analysis of we appliations for injetion vulnerailities, in Proeedings of the ACM SIGPLAN 007 Conferene on Programming Language Design and Implementation, 007, pp. 41. [1] G.Wassermann and Z. Su, Stati detetion of ross-site sripting vulnerailities, in ICSE, 008, pp [1] P. Hooimeijer, B. Livshits, D. Molnar, P. Saxena, and M. Veanes, Fast and Preise Sanitizer Analysis with Bek, in Usenix Seurity Symposium, 011. [14] T.-H. Choi, O. Lee, H. Kim, and K.-G. Doh, A pratial string analyzer y the widening approah, in APLAS, 006, pp [15] C. Bartzis and T. Bultan, Widening arithmeti automata, in Proeedings of the 16th International Conferene on Computer Aided Verifiation, 004, pp. 1. [16] G. Wassermann, D. Yu, A. Chander, D. Dhurjati, H. Inamura, and Z. Su, Dynami test input generation for we appliations, in Proeedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 008), 008, pp [17] A. Kiezun, V. Ganesh, P. J. Guo, P. Hooimeijer, and M. D. Ernst, Hampi: a solver for string onstraints, in ISSTA, 009, pp [18] P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. MCamant, and D. Song, A symoli exeution framework for javasript, in Pro. of the 1st IEEE Symposium on Seurity and Privay (Oakland 010), 010. [19] S. Kals, E. Kirda, C. Krügel, and N. Jovanovi, Seuat: a we vulneraility sanner, in WWW, 006, pp [0] O. Tripp, O. Weisman, and L. Guy, Finding your way in the testing jungle: a learning approah to we seurity testing, in ISSTA, 01, pp [1] A. J. Offutt and A. Adurazik, Generating tests from uml speifiations, in UML, 1999, pp [] G. Friedman, A. Hartman, K. Nagin, and T. Shiran, Projeted state mahine overage for software testing, in ISSTA, 00, pp

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypassing Spae Explosion in Regular Expression Mathing for Network Intrusion Detetion and Prevention Systems Jignesh Patel Alex X. Liu Eri Torng Department of Computer Siene and Engineering Mihigan State

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD Ghada F.Elkaany,

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

CIS570 Lecture 4 Introduction to Data-flow Analysis 3 Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

ECONOMICS OF SECURITY PATCH MANAGEMENT

ECONOMICS OF SECURITY PATCH MANAGEMENT ECONOMCS OF SECURTY PATCH MANAGEMENT Huseyin Cavusoglu * Hasan Cavusoglu Jun Zhang AB Freeman Shool o Business, Tulane University 7 MAlister Drive, New Orleans, LA 70118, USA Sauder Shool o Business, The

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

5.2 The Master Theorem

5.2 The Master Theorem 170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended

More information

the machine and check the components

the machine and check the components Quik Setup Guide Start Here MFC-7860DW Please read the Safety and Legal ooklet first efore you set up your mahine. Then, please read this Quik Setup Guide for the orret setup and installation. To view

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

In this chapter, we ll see state diagrams, an example of a different way to use directed graphs.

In this chapter, we ll see state diagrams, an example of a different way to use directed graphs. Chapter 19 State Diagrams In this hapter, we ll see state diagrams, an example of a different way to use direted graphs. 19.1 Introdution State diagrams are a type of direted graph, in whih the graph nodes

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

The Price of Uncertainty in Security Games

The Price of Uncertainty in Security Games The Prie of Unertainty in Seurity Games Tehnial Report Jens Grossklags a Benjamin Johnson iolas Christin a Shool of Information University of California, Berkeley Berkeley, CA 947 jensg@ishool.erkeley.edu

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

SOFTWARE ENGINEERING I

SOFTWARE ENGINEERING I SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

VOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR. A Thesis by. Hong-Tuan Nguyen Vu

VOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR. A Thesis by. Hong-Tuan Nguyen Vu VOLTAGE CONTROL WITH SHUNT CAPACITANCE ON RADIAL DISTRIBUTION LINE WITH HIGH R/X FACTOR A Thesis by Hong-Tuan Nguyen Vu Eletrial Engineer, Polytehni University of HCMC, 1993 Submitted to the College of

More information

1.3 Complex Numbers; Quadratic Equations in the Complex Number System*

1.3 Complex Numbers; Quadratic Equations in the Complex Number System* 04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

Income Protection CLAIM FORM

Income Protection CLAIM FORM Inome Protetion CLAIM FORM PLEASE COMPLETE THIS APPLICATION IN BLACK PEN ONLY USING BLOCK LETTERS 1 PERSONAL DETAILS Poliy numer Important notes: a This form must e ompleted in full and returned to PO

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

Traitor Tracing Schemes for Protected Software Implementations

Traitor Tracing Schemes for Protected Software Implementations Published in S. Katzenbeisser and A.-R. Sadeghi, Eds, 11th ACM Workshop on Digital Rights Management (ACM DRM 2011), pp. 15-21, ACM Press, 2011. Traitor Traing Shemes for Proteted Software Implementations

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

BENEFICIARY CHANGE REQUEST

BENEFICIARY CHANGE REQUEST Poliy/Certifiate Number(s) BENEFICIARY CHANGE REQUEST *L2402* *L2402* Setion 1: Insured First Name Middle Name Last Name Permanent Address: City, State, Zip Code Please hek if you would like the address

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

protection p1ann1ng report

protection p1ann1ng report f1re~~ protetion p1ann1ng report BUILDING CONSTRUCTION INFORMATION FROM THE CONCRETE AND MASONRY INDUSTRIES Signifiane of Fire Ratings for Building Constrution NO. 3 OF A SERIES The use of fire-resistive

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association Petri nets for the verifiation of Ubiquitous Systems with Transient Seure Assoiation Fernando Rosa-Velardo Tehnial Report 2/07 Dpto. de Sistemas Informátios y Computaión Universidad Complutense de Madrid

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors SUDOKU: Seure and Usable Deployment of Keys on Wireless Sensors Matthias Wilhelm, Ivan Martinovi, Ersin Uzun, and Jens B. Shmitt diso Distributed Computer Systems Lab, TU Kaiserslautern, Germany {wilhelm,

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

Active Load Balancing in a Three-Phase Network by Reactive Power Compensation

Active Load Balancing in a Three-Phase Network by Reactive Power Compensation Ative Load Balaning in a hree-phase Network by eative Power Compensation Adrian Pană Politehnia University of imisoara omania. ntrodution. Brief overview of the auses, effets and methods to redue voltage

More information

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS HENRI COANDA AIR FORCE ACADEMY ROMANIA INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 015 Brasov, 8-30 May 015 GENERAL M.R. STEFANIK ARMED FORCES ACADEMY SLOVAK REPUBLIC GABOR AND WEBER LOCAL DESCRIPTORS

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

Integrating Parallel File I/O and Database Support for High-Performance Scientific Data Management

Integrating Parallel File I/O and Database Support for High-Performance Scientific Data Management In Pro of SC: High Performane Networking and Computing, Novemer Integrating Parallel File I/O and Dataase Support for High-Performane Sientifi Data Management Jaehun No Rajeev Thakur Alok Choudhary Math

More information

A Design Environment for Migrating Relational to Object Oriented Database Systems

A Design Environment for Migrating Relational to Object Oriented Database Systems To appear in: 1996 International Conferene on Software Maintenane (ICSM 96); IEEE Computer Soiety, 1996 A Design Environment for Migrating Relational to Objet Oriented Database Systems Jens Jahnke, Wilhelm

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain Produtivity Marketpla e Software as a Servie Invoiing Ordering Domains Customer Reporting for SaaS Appliations Domain Basis Managing my Domain Managing Domains Helpful Resoures Managing my Domain If you

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

The analysis of brushing tool characteristics

The analysis of brushing tool characteristics ARCHIVES OF CIVIL AND MECHANICAL ENGINEERING Vol. IV 004 No. 4 The analysis of rushing tool harateristis Kiele University of Tehnology, al. Tysiąleia P. P. 7, 5-34 Kiele In this paper, an analytial proedure

More information

Account Contract for Card Acceptance

Account Contract for Card Acceptance Aount Contrat for Card Aeptane This is an Aount Contrat for the aeptane of debit ards and redit ards via payment terminals, on the website and/or by telephone, mail or fax. You enter into this ontrat with

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

Recommending Questions Using the MDL-based Tree Cut Model

Recommending Questions Using the MDL-based Tree Cut Model WWW 2008 / Refereed Trak: Data Mining - Learning April 2-25, 2008 Beijing, China Reommending Questions Using the MDL-based Tree Cut Model Yunbo Cao,2, Huizhong Duan, Chin-Yew Lin 2, Yong Yu, and Hsiao-Wuen

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

F220 Series. Installation Instructions. Photoelectric Smoke/Heat Detectors

F220 Series. Installation Instructions. Photoelectric Smoke/Heat Detectors F0 Series EN Installation Instrutions Photoeletri Smoke/Heat Detetors F0 Series Installation Instrutions.0 General Information EN.0 General Information. F0-B6 Series Bases Use with the F0 Series Heat and

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

TS150 Visible (exposed) fixing with screws on a timber sub-frame

TS150 Visible (exposed) fixing with screws on a timber sub-frame TS150 Visile (exposed) fixing with srews on a timer su-frame This system offers a ost effetive solution for installing Trespa Meteon panels in a large variety of panel dimensions. Trespa Meteon panels

More information

HEAT EXCHANGERS-2. Associate Professor. IIT Delhi E-mail: prabal@mech.iitd.ac.in. P.Talukdar/ Mech-IITD

HEAT EXCHANGERS-2. Associate Professor. IIT Delhi E-mail: prabal@mech.iitd.ac.in. P.Talukdar/ Mech-IITD HEA EXHANGERS-2 Prabal alukdar Assoiate Professor Department of Mehanial Engineering II Delhi E-mail: prabal@meh.iitd.a.in Multipass and rossflow he subsripts 1 and 2 represent the inlet and outlet, respetively..

More information