作成者別アーカイブ: washizaki_lab.

Prioritization in Automotive Software Testing: Systematic Literature Review accepted for QuASoQ 2018 collocated with APSEC

Ankush Dadwal, Hironori Washizaki, Yoshiaki Fukazawa, Takahiro Iida, Masashi Mizoguchi and Kentaro Yoshimura, “Prioritization in Automotive Software Testing: Systematic Literature Review,” 6th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2018), in conjunction with the 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, 4th December 2018

Automotive Software Testing is a vital part of the automotive systems development process. Not identifying the critical safety issues and failures of such systems can have serious or even fatal consequences. As the number of embedded systems and technologies increases, testing all components becomes more challenging. Although testing is expensive, it is important to reduce bugs in an early stage to maintain safety and to avoid recalls. Hence, the testing time should be reduced without impacting the reliability. Several studies and surveys have prioritized Automotive Software Testing to increase its effectiveness. The main goals of this study are to identify: (i) the publication trends of prioritization in Automotive Software Testing, (ii) which methods are used to prioritize Automotive Software Testing, (iii) the distribution of studies based on the quality evaluation, and (iv) how existing research on prioritization helps optimize Automotive Software Testing.

Taxonomy and Literature Survey of Security Pattern Research accepted for IEEE AINS 2018

Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Dan Yamaoto, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Takehisa Kato, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G Priyalakshmi, “Taxonomy and Literature Survey of Security Pattern Research,” IEEE Conference on Applications, Information and Network Security (AINS), Langkawi, Malaysia, November 21-22, 2018

Security patterns encapsulate security-related problems and solutions that recur in certain contexts for secure software system development and operations. Almost 500 security patterns have been proposed since the late 1990s. Technical investigations on their applications have advanced implementation, but the direction, overall picture, and significant technical challenges remain unclear. In this study, we propose a taxonomy for security pattern research by conducting a systematic literature review. The taxonomy is expected to guide practitioners to choose existing security pattern methods and tools. In addition, the taxonomy should support communication among practitioners and researchers, and improve security pattern research and the effectiveness of security patterns. Over 200 papers are categorized based on the taxonomy. The survey result should further improve security pattern research and the effectiveness of security patterns.

総務省「地域におけるIoTの学び推進事業」こどものミライ協議会ICTクラブ活動が狭山市で開始

総務省「地域におけるIoTの学び推進事業」こどものミライ協議会ICTクラブ活動が11月3日に狭山市で始まりました。子ども達が自ら考え、協力し創造的にプログラミングやICTを学ぶ地域主体の場づくりを支援してまいります。狭山市役所、メンターの皆様、D2C・アイ電機ほか運営各位に感謝です。来週は大田区でも始まります。早稲田大学からは齋藤講師、レクチャー 坂本氏、TA李君・三浦君が参画しています。

Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes accepted for WESPr-18 collocated at APSEC2018

Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka, “Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes,” The International Workshop on Evidence-based Security and Privacy in the Wild 2018 (WESPr-18), December 4, 2018 in conjunction with APEC 2018 in Nara, Japan

Attack trees are often used to analyze a system or detect application programs vulnerable to attack. To aid in software design, a method to create safe and stable systems should be created. An attack tree has multiple levels and is composed of different nodes, including root nodes, sub nodes, and leaf nodes. These nodes can be separated into parent nodes and child nodes when discussing their relationship. Child nodes are defined as conditions that must be satisfied to make their direct parent nodes true. Although an attack tree can express vertical relationships between nodes well, it usually ignores parallel relationships of different branch nodes. Moreover, the relationship between parent-child nodes may be inaccurate due to a poorly designed attack tree. To solve these problems, we present a new way to derive an attack tree system in which the initial attack tree is reconstructed into a new attack tree using Interpretive Structural Modeling (abbr. ISM). The proposed method can easily repair the relationship between parent nodes and child nodes by removing parallel relationships. Finally, the proposed method derives a clear attack tree for more precise system’s threat analysis and better defensive measures.

【参加募集】enPiT-Pro スマートエスイ― 2018年度 修了式・シンポジウム/懇親会

enPiT-Pro スマートエスイーシンポジウムを12月10日(月)開催。AI・IoT×ビジネス社会人教育成果報告と共に、演習で取り上げている機械学習システムのテストに有効なメタモルフィックテストについて発明者TY Chen教授直々に解説いただきます(同時通訳)。ぜひご参加ください。

Prof. Washizaki co-edited JSS Special Issue on Software Engineering Education and Training

Prof. Washizaki co-edited special issue of Software Engineering Education and Training at Journal of Systems and Software (JSS).

鷲崎教授がアプリ甲子園2018決勝にて審査員を担当 10月14日

鷲崎教授が10月14日D2Cホール開催のアプリ甲子園2018決勝にて審査員を担当しました。アイディアをプログラミングで形にして誰かの体験や社会を変えていこうとする若い皆さんの熱い取り組みに感動しました。優勝者の「競技プログラミングやってて良かった❗️」とのコメントが印象的です。プログラミングとアイディアを繋げることの良さが評価され、育っていくこの機会は今後も続いて欲しいと思います。参加、協賛、運営の皆様に感謝です。