Adding in DMCA Takedown content
This commit is contained in:
parent
3233e713ab
commit
25aba84df1
@ -210,3 +210,29 @@ pages = {},
|
||||
title = {Analysis of Attack Graph Representations for Ranking Vulnerability Fixes},
|
||||
doi = {10.29007/2c1q}
|
||||
}
|
||||
|
||||
@misc{DMCA,
|
||||
title = {H.R.2281 - {Digital {Millennium} {Copyright} {Act}}},
|
||||
note = {Pub. L. No. 105-304. 1998 [Online]. Available: https://www.govinfo.gov/content/pkg/PLAW-105publ304/html/PLAW-105publ304.htm},
|
||||
}
|
||||
|
||||
@inproceedings{Piracy,
|
||||
author={Kim, Yesol and Moon, Jeongoh and Cho, Seong Je and Park, Minkyu and Han, Sangchul},
|
||||
booktitle={2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing},
|
||||
title={Efficient Identification of Windows Executable Programs to Prevent Software Piracy},
|
||||
year={2014},
|
||||
volume={},
|
||||
number={},
|
||||
pages={236-240},
|
||||
doi={10.1109/IMIS.2014.29}
|
||||
}
|
||||
|
||||
@inproceedings{Android_Piracy,
|
||||
author={Kumari, Neha and Chen, Min},
|
||||
booktitle={2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)},
|
||||
title={Malware and Piracy Detection in Android Applications},
|
||||
year={2022},
|
||||
volume={},
|
||||
number={},
|
||||
pages={306-311},
|
||||
doi={10.1109/MIPR54900.2022.00061}}
|
||||
@ -0,0 +1,103 @@
|
||||
\relax
|
||||
\citation{phillips_graph-based_1998}
|
||||
\citation{schneier_modeling_1999}
|
||||
\citation{ou_scalable_2006}
|
||||
\citation{CPSIOT,ming_jo}
|
||||
\citation{10.1145/3105760}
|
||||
\citation{8290918}
|
||||
\citation{centrality_based}
|
||||
\citation{j_hale_compliance_nodate,baloyi_guidelines_2019,allman_complying_2006}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {I}INTRODUCTION}{1}{}\protected@file@percent }
|
||||
\citation{sheyner_automated_2002}
|
||||
\citation{ou_scalable_2006}
|
||||
\citation{zhang_boosting_2017}
|
||||
\citation{Monotonicity}
|
||||
\citation{TVA}
|
||||
\citation{ou_scalable_2006}
|
||||
\citation{louthan_hybrid_2011}
|
||||
\citation{louthan_hybrid_2011}
|
||||
\citation{louthan_hybrid_2011}
|
||||
\citation{louthan_hybrid_2011}
|
||||
\citation{louthan_hybrid_2011}
|
||||
\citation{cook_rage_2018}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Work}{2}{}\protected@file@percent }
|
||||
\newlabel{sec:sync-lit}{{II}{2}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {III}Inseparable Features}{2}{}\protected@file@percent }
|
||||
\newlabel{sec:inseparable}{{III}{2}}
|
||||
\citation{cook_rage_2018}
|
||||
\citation{louthan_hybrid_2011}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces A network without Synchronous Firing generating infeasible states}}{3}{}\protected@file@percent }
|
||||
\newlabel{fig:non-sync_ex}{{1}{3}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {IV}Implementing Synchronous Firing}{3}{}\protected@file@percent }
|
||||
\newlabel{sec:implementing}{{IV}{3}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {A}GNU Bison and Flex}{3}{}\protected@file@percent }
|
||||
\citation{nichols_2018}
|
||||
\citation{cook_rage_2018}
|
||||
\citation{cook_rage_2018}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program}}{4}{}\protected@file@percent }
|
||||
\newlabel{fig:bison-flex}{{2}{4}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {B}PostgreSQL}{4}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {C}Compound Operators}{4}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {D}Graph Generation}{5}{}\protected@file@percent }
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Synchronous Firing in the Graph Generation Process}}{5}{}\protected@file@percent }
|
||||
\newlabel{fig:sync-fire}{{3}{5}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {V}Results}{5}{}\protected@file@percent }
|
||||
\newlabel{sec:Results}{{V}{5}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {A}Experimental Networks and Computing Platform}{5}{}\protected@file@percent }
|
||||
\newlabel{sec:test-platform}{{A}{5}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1}Automobile Maintenance}{5}{}\protected@file@percent }
|
||||
\citation{DMCA}
|
||||
\citation{Piracy}
|
||||
\citation{Android_Piracy}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2}DMCA Takedown}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {B}Results and Analysis}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1}Results for the Theoretical Automobile Environment}{6}{}\protected@file@percent }
|
||||
\newlabel{sec:theo_res}{{1}{6}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Results for the Non-Synchronous Firing Testing}}{6}{}\protected@file@percent }
|
||||
\newlabel{table:NS-Table}{{1}{6}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Synchronous Firing on Runtime}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-RT}{{4}{7}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on State Space}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-State}{{5}{7}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Speedup (Amdahl's) Obtained When Using Synchronous Firing}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-Spd}{{6}{7}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Results for the Synchronous Firing Testing}}{7}{}\protected@file@percent }
|
||||
\newlabel{table:S-Table}{{2}{7}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2}Results for a Grouped Automobile Environment}{7}{}\protected@file@percent }
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Results for the Comprehensive Services without Synchronous Firing}}{8}{}\protected@file@percent }
|
||||
\newlabel{table:Non-Sync-Comp-Table}{{3}{8}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {4}{\ignorespaces Results for the Comprehensive Services with Synchronous Firing}}{8}{}\protected@file@percent }
|
||||
\newlabel{table:Sync-Comp-Table}{{4}{8}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3}Results for the DMCA Takedown Environment}{8}{}\protected@file@percent }
|
||||
\newlabel{sec:dmca_res}{{3}{8}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VI}Future Works}{8}{}\protected@file@percent }
|
||||
\newlabel{sec:fw}{{VI}{8}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Synchronous Firing on Runtime}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:Comp-Sync-RT}{{7}{8}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing with Comprehensive Services on State Space}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:Comp-Sync-State}{{8}{8}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Speedup (Amdahl's) Obtained When Using Synchronous Firing with Comprehensive Services}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:Comp-Sync-Spd}{{9}{8}}
|
||||
\bibdata{Bibliography}
|
||||
\bibcite{phillips_graph-based_1998}{1}
|
||||
\bibcite{schneier_modeling_1999}{2}
|
||||
\bibcite{ou_scalable_2006}{3}
|
||||
\bibcite{CPSIOT}{4}
|
||||
\bibcite{ming_jo}{5}
|
||||
\bibcite{10.1145/3105760}{6}
|
||||
\bibcite{8290918}{7}
|
||||
\bibcite{centrality_based}{8}
|
||||
\bibcite{j_hale_compliance_nodate}{9}
|
||||
\bibcite{baloyi_guidelines_2019}{10}
|
||||
\bibcite{allman_complying_2006}{11}
|
||||
\bibcite{sheyner_automated_2002}{12}
|
||||
\bibcite{zhang_boosting_2017}{13}
|
||||
\bibcite{Monotonicity}{14}
|
||||
\bibcite{TVA}{15}
|
||||
\bibcite{louthan_hybrid_2011}{16}
|
||||
\bibcite{cook_rage_2018}{17}
|
||||
\bibcite{nichols_2018}{18}
|
||||
\bibstyle{ieeetr}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VII}Conclusion}{9}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{REFERENCES}{9}{}\protected@file@percent }
|
||||
\gdef \@abspage@last{9}
|
||||
@ -0,0 +1,95 @@
|
||||
\begin{thebibliography}{10}
|
||||
|
||||
\bibitem{phillips_graph-based_1998}
|
||||
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
||||
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
|
||||
F1292, pp.~71--79, 1998.
|
||||
\newblock doi: 10.1145/310889.310919.
|
||||
|
||||
\bibitem{schneier_modeling_1999}
|
||||
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
|
||||
\newblock vol. 24, no.12.
|
||||
|
||||
\bibitem{ou_scalable_2006}
|
||||
X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack}
|
||||
{Graph} {Generation},'' {\em CCS '06: Proceedings of the 13th ACM conference
|
||||
on Computer and communications security}, pp.~336--345, 2006.
|
||||
|
||||
\bibitem{CPSIOT}
|
||||
A.~T. Al~Ghazo, M.~Ibrahim, H.~Ren, and R.~Kumar, ``A2g2v: Automated attack
|
||||
graph generator and visualizer,'' in {\em Proceedings of the 1st ACM MobiHoc
|
||||
Workshop on Mobile IoT Sensing, Security, and Privacy}, Mobile IoT SSP'18,
|
||||
(New York, NY, USA), Association for Computing Machinery, 2018.
|
||||
|
||||
\bibitem{ming_jo}
|
||||
M.~Li, P.~Hawrylak, and J.~Hale, ``Strategies for practical hybrid attack graph
|
||||
generation and analysis,'' {\em Digital Threats}, oct 2021.
|
||||
\newblock Just Accepted.
|
||||
|
||||
\bibitem{10.1145/3105760}
|
||||
L.~Mu\~{n}oz Gonz\'{a}lez, D.~Sgandurra, A.~Paudice, and E.~C. Lupu,
|
||||
``Efficient attack graph analysis through approximate inference,'' {\em ACM
|
||||
Trans. Priv. Secur.}, vol.~20, jul 2017.
|
||||
|
||||
\bibitem{8290918}
|
||||
H.~Wang, Z.~Chen, J.~Zhao, X.~Di, and D.~Liu, ``A vulnerability assessment
|
||||
method in industrial internet of things based on attack graph and maximum
|
||||
flow,'' {\em IEEE Access}, vol.~6, pp.~8599--8609, 2018.
|
||||
|
||||
\bibitem{centrality_based}
|
||||
T.~Gonda, T.~Pascal, R.~Puzis, G.~Shani, and B.~Shapira, ``Analysis of attack
|
||||
graph representations for ranking vulnerability fixes,'' 09 2018.
|
||||
|
||||
\bibitem{j_hale_compliance_nodate}
|
||||
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
||||
{Cyber}-{Physical} {System}.''
|
||||
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
|
||||
|
||||
\bibitem{baloyi_guidelines_2019}
|
||||
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
|
||||
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
|
||||
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
|
||||
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
|
||||
South Africa), Association for Computing Machinery, 2019.
|
||||
|
||||
\bibitem{allman_complying_2006}
|
||||
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
|
||||
{\em ACM Queue}, vol.~4, no.~7, 2006.
|
||||
|
||||
\bibitem{sheyner_automated_2002}
|
||||
O.~Sheyner, J.~Haines, S.~Jha, R.~Lippmann, and J.~Wing, ``Automated
|
||||
{Generation} and {Analysis} of {Attack} {Graphs},'' {\em Proceeding of 2002
|
||||
IEEE Symposium on Security and Privacy}, pp.~254--265, 2002.
|
||||
|
||||
\bibitem{zhang_boosting_2017}
|
||||
J.~Zhang, S.~Khoram, and J.~Li, ``Boosting the performance of {FPGA}-based
|
||||
graph processor using hybrid memory cube: {A} case for breadth first
|
||||
search,'' {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International
|
||||
Symposium on Field-Programmable Gate Arrays}, pp.~207--216, 2017.
|
||||
|
||||
\bibitem{Monotonicity}
|
||||
P.~Ammann, D.~Wijesekera, and S.~Kaushik, ``Scalable, graph-based network
|
||||
vulnerability analysis,'' in {\em Proceedings of the 9th ACM Conference on
|
||||
Computer and Communications Security}, CCS '02, (New York, NY, USA),
|
||||
p.~217–224, Association for Computing Machinery, 2002.
|
||||
|
||||
\bibitem{TVA}
|
||||
S.~Jajodia and S.~Noel, {\em Topological Vulnerability Analysis}, vol.~46,
|
||||
pp.~139--154.
|
||||
\newblock 09 2010.
|
||||
|
||||
\bibitem{louthan_hybrid_2011}
|
||||
G.~Louthan, {\em Hybrid {Attack} {Graphs} for {Modeling} {Cyber}-{Physical}
|
||||
{Systems}}.
|
||||
\newblock PhD thesis, The {University} of {Tulsa}, 2011.
|
||||
|
||||
\bibitem{cook_rage_2018}
|
||||
K.~Cook, {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}.
|
||||
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
|
||||
|
||||
\bibitem{nichols_2018}
|
||||
W.~M. Nichols, {\em {Hybrid} {Attack} {Graphs} for {Use} with a {Simulation} of
|
||||
a {Cyber-Physical} {System}}.
|
||||
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
|
||||
|
||||
\end{thebibliography}
|
||||
@ -0,0 +1,52 @@
|
||||
This is BibTeX, Version 0.99d (TeX Live 2022/Arch Linux)
|
||||
Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
|
||||
The top-level auxiliary file: Schrick-Noah_AG-CG-SyncFire_Revised.aux
|
||||
The style file: ieeetr.bst
|
||||
Database file #1: Bibliography.bib
|
||||
Warning--I didn't find a database entry for "DMCA"
|
||||
Warning--I didn't find a database entry for "Piracy"
|
||||
Warning--I didn't find a database entry for "Android_Piracy"
|
||||
Warning--empty booktitle in centrality_based
|
||||
Warning--empty publisher in TVA
|
||||
You've used 18 entries,
|
||||
1876 wiz_defined-function locations,
|
||||
587 strings with 6994 characters,
|
||||
and the built_in function-call counts, 4246 in all, are:
|
||||
= -- 415
|
||||
> -- 178
|
||||
< -- 0
|
||||
+ -- 67
|
||||
- -- 49
|
||||
* -- 286
|
||||
:= -- 624
|
||||
add.period$ -- 25
|
||||
call.type$ -- 18
|
||||
change.case$ -- 14
|
||||
chr.to.int$ -- 0
|
||||
cite$ -- 20
|
||||
duplicate$ -- 230
|
||||
empty$ -- 405
|
||||
format.name$ -- 49
|
||||
if$ -- 1028
|
||||
int.to.chr$ -- 0
|
||||
int.to.str$ -- 18
|
||||
missing$ -- 15
|
||||
newline$ -- 65
|
||||
num.names$ -- 18
|
||||
pop$ -- 64
|
||||
preamble$ -- 1
|
||||
purify$ -- 0
|
||||
quote$ -- 0
|
||||
skip$ -- 138
|
||||
stack$ -- 0
|
||||
substring$ -- 202
|
||||
swap$ -- 82
|
||||
text.length$ -- 0
|
||||
text.prefix$ -- 0
|
||||
top$ -- 0
|
||||
type$ -- 0
|
||||
warning$ -- 2
|
||||
while$ -- 35
|
||||
width$ -- 20
|
||||
write$ -- 178
|
||||
(There were 5 warnings)
|
||||
@ -0,0 +1,600 @@
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2023.2.27) 22 MAR 2023 18:18
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
%&-line parsing enabled.
|
||||
**Schrick-Noah_AG-CG-SyncFire_Revised.tex
|
||||
(./Schrick-Noah_AG-CG-SyncFire_Revised.tex
|
||||
LaTeX2e <2021-11-15> patch level 1
|
||||
L3 programming layer <2022-04-10> (./ieeeoj.cls
|
||||
|
||||
LaTeX Warning: You have requested document class `IEEEoj',
|
||||
but the document class provides `IEEEphot'.
|
||||
|
||||
Document Class: IEEEphot 2009/06/23 V1.2
|
||||
-- See the "IEEEphot_HOWTO" manual for usage information.
|
||||
\@IEEEtrantmpdimenA=\dimen138
|
||||
\@IEEEtrantmpdimenB=\dimen139
|
||||
\@IEEEtrantmpcountA=\count185
|
||||
\@IEEEtrantmpcountB=\count186
|
||||
\@IEEEtrantmptoksA=\toks16
|
||||
LaTeX Font Info: Trying to load font information for OT1+ptm on input line 3
|
||||
98.
|
||||
(/usr/share/texmf-dist/tex/latex/psnfss/ot1ptm.fd
|
||||
File: ot1ptm.fd 2001/06/04 font definitions for OT1/ptm.
|
||||
)
|
||||
-- Using 8.25in x 10.75in (IEEE Photonics PaperSize) paper.
|
||||
-- Using PDF output.
|
||||
\@IEEEnormalsizeunitybaselineskip=\dimen140
|
||||
-- This is a 10 point document.
|
||||
\CLASSINFOnormalsizebaselineskip=\dimen141
|
||||
\CLASSINFOnormalsizeunitybaselineskip=\dimen142
|
||||
\IEEEnormaljot=\dimen143
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <5> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <5> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <7> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <7> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <8> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <8> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <10.03749> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <10.03749> not available
|
||||
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <10> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <10> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <12> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <12> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <17> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <17> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <20> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <20> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/n' in size <18> not available
|
||||
(Font) Font shape `OT1/ptm/b/n' tried instead on input line 756.
|
||||
LaTeX Font Info: Font shape `OT1/ptm/bx/it' in size <18> not available
|
||||
(Font) Font shape `OT1/ptm/b/it' tried instead on input line 756.
|
||||
\IEEEilabelindentA=\dimen144
|
||||
\IEEEilabelindentB=\dimen145
|
||||
\IEEEilabelindent=\dimen146
|
||||
\IEEEelabelindent=\dimen147
|
||||
\IEEEdlabelindent=\dimen148
|
||||
\IEEElabelindent=\dimen149
|
||||
\IEEEiednormlabelsep=\dimen150
|
||||
\IEEEiedmathlabelsep=\dimen151
|
||||
\IEEEiedtopsep=\skip47
|
||||
\c@section=\count187
|
||||
\c@subsection=\count188
|
||||
\c@subsubsection=\count189
|
||||
\c@paragraph=\count190
|
||||
\c@IEEEsubequation=\count191
|
||||
\abovecaptionskip=\skip48
|
||||
\belowcaptionskip=\skip49
|
||||
\c@figure=\count192
|
||||
\marginfigbox=\box50
|
||||
\c@table=\count193
|
||||
\margintabbox=\box51
|
||||
\@IEEEeqnnumcols=\count194
|
||||
\@IEEEeqncolcnt=\count195
|
||||
(/usr/share/texmf-dist/tex/latex/graphics/color.sty
|
||||
Package: color 2021/12/07 v1.3c Standard LaTeX Color (DPC)
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/graphics-cfg/color.cfg
|
||||
File: color.cfg 2016/01/02 v1.6 sample color configuration
|
||||
)
|
||||
Package color Info: Driver file: pdftex.def on input line 149.
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def
|
||||
File: pdftex.def 2020/10/05 v1.2a Graphics/color driver for pdftex
|
||||
))
|
||||
(/usr/share/texmf-dist/tex/generic/iftex/ifpdf.sty
|
||||
Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
|
||||
|
||||
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
|
||||
Package: iftex 2022/02/03 v1.0f TeX engine tests
|
||||
))
|
||||
(/usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||
Package: ifthen 2020/11/24 v1.1c Standard LaTeX ifthen package (DPC)
|
||||
)
|
||||
Package color Info: Redefining color white on input line 3384.
|
||||
\tempbox=\box52
|
||||
\abstractbox=\box53
|
||||
\keybox=\box54
|
||||
\@IEEEtmpitemindent=\dimen152
|
||||
\c@IEEEbiography=\count196
|
||||
\@IEEEtranrubishbin=\box55
|
||||
\footheight=\dimen153
|
||||
\typeheight=\dimen154
|
||||
\typewidth=\dimen155
|
||||
\authorcount=\count197
|
||||
\chkaucount=\count198
|
||||
\tempcount=\count199
|
||||
\affcount=\count266
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/wrapfig/wrapfig.sty
|
||||
\wrapoverhang=\dimen156
|
||||
\WF@size=\dimen157
|
||||
\c@WF@wrappedlines=\count267
|
||||
\WF@box=\box56
|
||||
\WF@everypar=\toks17
|
||||
Package: wrapfig 2003/01/31 v 3.6
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/tools/array.sty
|
||||
Package: array 2021/10/04 v2.5f Tabular extension package (FMi)
|
||||
\col@sep=\dimen158
|
||||
\ar@mcellbox=\box57
|
||||
\extrarowheight=\dimen159
|
||||
\NC@list=\toks18
|
||||
\extratabsurround=\skip50
|
||||
\backup@length=\skip51
|
||||
\ar@cellbox=\box58
|
||||
)
|
||||
\quotebox=\box59
|
||||
\quoteskp=\skip52
|
||||
\sdquoteskp=\skip53
|
||||
\quotecnt=\count268
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/cite/cite.sty
|
||||
LaTeX Info: Redefining \cite on input line 302.
|
||||
LaTeX Info: Redefining \nocite on input line 332.
|
||||
Package: cite 2015/02/27 v 5.5
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/spverbatim/spverbatim.sty
|
||||
Package: spverbatim 2009/08/10 v1.0 Verbatim with breakable spaces
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amsmath.sty
|
||||
Package: amsmath 2021/10/15 v2.17l AMS math features
|
||||
\@mathmargin=\skip54
|
||||
|
||||
For additional information on amsmath, use the `?' option.
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amstext.sty
|
||||
Package: amstext 2021/08/26 v2.01 AMS text
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amsgen.sty
|
||||
File: amsgen.sty 1999/11/30 v2.0 generic functions
|
||||
\@emptytoks=\toks19
|
||||
\ex@=\dimen160
|
||||
))
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty
|
||||
Package: amsbsy 1999/11/29 v1.2d Bold Symbols
|
||||
\pmbraise@=\dimen161
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty
|
||||
Package: amsopn 2021/08/26 v2.02 operator names
|
||||
)
|
||||
\inf@bad=\count269
|
||||
LaTeX Info: Redefining \frac on input line 234.
|
||||
\uproot@=\count270
|
||||
\leftroot@=\count271
|
||||
LaTeX Info: Redefining \overline on input line 399.
|
||||
\classnum@=\count272
|
||||
\DOTSCASE@=\count273
|
||||
LaTeX Info: Redefining \ldots on input line 496.
|
||||
LaTeX Info: Redefining \dots on input line 499.
|
||||
LaTeX Info: Redefining \cdots on input line 620.
|
||||
\Mathstrutbox@=\box60
|
||||
\strutbox@=\box61
|
||||
\big@size=\dimen162
|
||||
LaTeX Font Info: Redeclaring font encoding OML on input line 743.
|
||||
LaTeX Font Info: Redeclaring font encoding OMS on input line 744.
|
||||
\macc@depth=\count274
|
||||
\c@MaxMatrixCols=\count275
|
||||
\dotsspace@=\muskip16
|
||||
\c@parentequation=\count276
|
||||
\dspbrk@lvl=\count277
|
||||
\tag@help=\toks20
|
||||
\row@=\count278
|
||||
\column@=\count279
|
||||
\maxfields@=\count280
|
||||
\andhelp@=\toks21
|
||||
\eqnshift@=\dimen163
|
||||
\alignsep@=\dimen164
|
||||
\tagshift@=\dimen165
|
||||
\tagwidth@=\dimen166
|
||||
\totwidth@=\dimen167
|
||||
\lineht@=\dimen168
|
||||
\@envbody=\toks22
|
||||
\multlinegap=\skip55
|
||||
\multlinetaggap=\skip56
|
||||
\mathdisplay@stack=\toks23
|
||||
LaTeX Info: Redefining \[ on input line 2938.
|
||||
LaTeX Info: Redefining \] on input line 2939.
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty
|
||||
Package: amssymb 2013/01/14 v3.01 AMS font symbols
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
|
||||
Package: amsfonts 2013/01/14 v3.01 Basic AMSFonts support
|
||||
\symAMSa=\mathgroup4
|
||||
\symAMSb=\mathgroup5
|
||||
LaTeX Font Info: Redeclaring math symbol \hbar on input line 98.
|
||||
LaTeX Font Info: Overwriting math alphabet `\mathfrak' in version `bold'
|
||||
(Font) U/euf/m/n --> U/euf/b/n on input line 106.
|
||||
))
|
||||
(/usr/share/texmf-dist/tex/latex/algorithms/algorithmic.sty
|
||||
Package: algorithmic 2009/08/24 v0.1 Document Style `algorithmic'
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
|
||||
Package: keyval 2014/10/28 v1.15 key=value parser (DPC)
|
||||
\KV@toks@=\toks24
|
||||
)
|
||||
\c@ALC@unique=\count281
|
||||
\c@ALC@line=\count282
|
||||
\c@ALC@rem=\count283
|
||||
\c@ALC@depth=\count284
|
||||
\ALC@tlm=\skip57
|
||||
\algorithmicindent=\skip58
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
|
||||
Package: graphicx 2021/09/16 v1.2d Enhanced LaTeX Graphics (DPC,SPQR)
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/graphics/graphics.sty
|
||||
Package: graphics 2021/03/04 v1.4d Standard LaTeX Graphics (DPC,SPQR)
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/graphics/trig.sty
|
||||
Package: trig 2021/08/11 v1.11 sin cos tan (DPC)
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg
|
||||
File: graphics.cfg 2016/06/04 v1.11 sample graphics configuration
|
||||
)
|
||||
Package graphics Info: Driver file: pdftex.def on input line 107.
|
||||
)
|
||||
\Gin@req@height=\dimen169
|
||||
\Gin@req@width=\dimen170
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/base/textcomp.sty
|
||||
Package: textcomp 2020/02/02 v2.0n Standard LaTeX package
|
||||
)
|
||||
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
|
||||
File: l3backend-pdftex.def 2022-04-14 L3 backend support: PDF output (pdfTeX)
|
||||
\l__color_backend_stack_int=\count285
|
||||
\l__pdf_internal_box=\box62
|
||||
)
|
||||
(./Schrick-Noah_AG-CG-SyncFire_Revised.aux)
|
||||
\openout1 = `Schrick-Noah_AG-CG-SyncFire_Revised.aux'.
|
||||
|
||||
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 13.
|
||||
LaTeX Font Info: ... okay on input line 13.
|
||||
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 13.
|
||||
LaTeX Font Info: ... okay on input line 13.
|
||||
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 13.
|
||||
LaTeX Font Info: ... okay on input line 13.
|
||||
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 13.
|
||||
LaTeX Font Info: ... okay on input line 13.
|
||||
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 13.
|
||||
LaTeX Font Info: ... okay on input line 13.
|
||||
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 13.
|
||||
LaTeX Font Info: ... okay on input line 13.
|
||||
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 13.
|
||||
LaTeX Font Info: ... okay on input line 13.
|
||||
|
||||
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
|
||||
[Loading MPS to PDF converter (version 2006.09.02).]
|
||||
\scratchcounter=\count286
|
||||
\scratchdimen=\dimen171
|
||||
\scratchbox=\box63
|
||||
\nofMPsegments=\count287
|
||||
\nofMParguments=\count288
|
||||
\everyMPshowfont=\toks25
|
||||
\MPscratchCnt=\count289
|
||||
\MPscratchDim=\dimen172
|
||||
\MPnumerator=\count290
|
||||
\makeMPintoPDFobject=\count291
|
||||
\everyMPtoPDFconversion=\toks26
|
||||
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
|
||||
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 4
|
||||
85.
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
|
||||
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
|
||||
e
|
||||
))
|
||||
Package color Info: Redefining color ojcolor on input line 13.
|
||||
LaTeX Font Info: Trying to load font information for OT1+phv on input line 2
|
||||
8.
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/psnfss/ot1phv.fd
|
||||
File: ot1phv.fd 2020/03/25 scalable font definitions for OT1/phv.
|
||||
)
|
||||
** ATTENTION: \authorrefmark is deprecated (line 48). Use \IEEEauthorrefmark in
|
||||
stead.
|
||||
LaTeX Font Info: Trying to load font information for U+msa on input line 48.
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
|
||||
File: umsa.fd 2013/01/14 v3.01 AMS symbols A
|
||||
)
|
||||
LaTeX Font Info: Trying to load font information for U+msb on input line 48.
|
||||
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
|
||||
File: umsb.fd 2013/01/14 v3.01 AMS symbols B
|
||||
)
|
||||
** ATTENTION: \authorrefmark is deprecated (line 48). Use \IEEEauthorrefmark in
|
||||
stead.
|
||||
LaTeX Font Info: Calculating math sizes for size <6.6> on input line 48.
|
||||
|
||||
LaTeX Font Warning: Font shape `OT1/cmr/m/n' in size <3.3> not available
|
||||
(Font) size <5> substituted on input line 48.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OML/cmm/m/it' in size <3.3> not available
|
||||
(Font) size <5> substituted on input line 48.
|
||||
|
||||
|
||||
LaTeX Font Warning: Font shape `OMS/cmsy/m/n' in size <3.3> not available
|
||||
(Font) size <5> substituted on input line 48.
|
||||
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
<OJIM.png, id=1, 6269.4225pt x 2336.73pt>
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 60.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (8.922pt too high) has occurred while \output is active []
|
||||
|
||||
[1{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}
|
||||
|
||||
|
||||
<./ojim.png>]
|
||||
LaTeX Font Info: Calculating math sizes for size <10.03749> on input line 67
|
||||
.
|
||||
|
||||
Underfull \vbox (badness 2990) has occurred while \output is active []
|
||||
|
||||
|
||||
Underfull \vbox (badness 2990) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.34346pt too high) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.2pt too high) has occurred while \output is active []
|
||||
|
||||
[2]
|
||||
<./images/schri1.png, id=21, 1014.79124pt x 400.49625pt>
|
||||
File: ./images/schri1.png Graphic file (type png)
|
||||
<use ./images/schri1.png>
|
||||
Package pdftex.def Info: ./images/schri1.png used on input line 85.
|
||||
(pdftex.def) Requested size: 221.3985pt x 87.37611pt.
|
||||
|
||||
|
||||
LaTeX Warning: Reference `fig:non-sync-ex' on page 3 undefined on input line 94
|
||||
.
|
||||
|
||||
LaTeX Font Info: Font shape `OT1/phv/b/it' in size <9> not available
|
||||
(Font) Font shape `OT1/phv/b/sl' tried instead on input line 97.
|
||||
LaTeX Font Info: Trying to load font information for OT1+pcr on input line 1
|
||||
01.
|
||||
(/usr/share/texmf-dist/tex/latex/psnfss/ot1pcr.fd
|
||||
File: ot1pcr.fd 2001/06/04 font definitions for OT1/pcr.
|
||||
)
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 103--107
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 6032) in paragraph at lines 103--107
|
||||
[]\OT1/ptm/m/n/10.03749 where the ``$\OML/cmm/m/it/10 <$\OT1/ptm/m/n/10.03749 g
|
||||
roup name$\OML/cmm/m/it/10 >$\OT1/ptm/m/n/10.03749 " iden-ti-fier and ``group"
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 108--112
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 113--119
|
||||
|
||||
[]
|
||||
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 119.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
[3 <./images/schri1.png>]
|
||||
<./images/schri2.png, id=28, 551.05875pt x 720.6925pt>
|
||||
File: ./images/schri2.png Graphic file (type png)
|
||||
<use ./images/schri2.png>
|
||||
Package pdftex.def Info: ./images/schri2.png used on input line 122.
|
||||
(pdftex.def) Requested size: 180.67499pt x 236.2897pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.34346pt too high) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.2pt too high) has occurred while \output is active []
|
||||
|
||||
[4 <./images/schri2.png>]
|
||||
<./images/schri3.png, id=34, 489.83pt x 1053.9375pt>
|
||||
File: ./images/schri3.png Graphic file (type png)
|
||||
<use ./images/schri3.png>
|
||||
Package pdftex.def Info: ./images/schri3.png used on input line 150.
|
||||
(pdftex.def) Requested size: 244.9144pt x 526.96747pt.
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 189.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
[5 <./images/schri3.png>]
|
||||
|
||||
LaTeX Warning: Citation `DMCA' on page 6 undefined on input line 198.
|
||||
|
||||
|
||||
LaTeX Warning: Citation `Piracy' on page 6 undefined on input line 198.
|
||||
|
||||
|
||||
LaTeX Warning: Citation `Android_Piracy' on page 6 undefined on input line 198.
|
||||
|
||||
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
<./images/schri4.png, id=39, 602.25pt x 238.491pt>
|
||||
File: ./images/schri4.png Graphic file (type png)
|
||||
<use ./images/schri4.png>
|
||||
Package pdftex.def Info: ./images/schri4.png used on input line 228.
|
||||
(pdftex.def) Requested size: 238.49121pt x 94.44125pt.
|
||||
<./images/schri5.png, id=40, 549.69pt x 236.301pt>
|
||||
File: ./images/schri5.png Graphic file (type png)
|
||||
<use ./images/schri5.png>
|
||||
Package pdftex.def Info: ./images/schri5.png used on input line 229.
|
||||
(pdftex.def) Requested size: 238.49121pt x 102.51967pt.
|
||||
<./images/schri6.png, id=41, 608.163pt x 223.38pt>
|
||||
File: ./images/schri6.png Graphic file (type png)
|
||||
<use ./images/schri6.png>
|
||||
Package pdftex.def Info: ./images/schri6.png used on input line 236.
|
||||
(pdftex.def) Requested size: 238.49121pt x 87.59843pt.
|
||||
<./images/schri7.png, id=42, 532.827pt x 236.739pt>
|
||||
File: ./images/schri7.png Graphic file (type png)
|
||||
<use ./images/schri7.png>
|
||||
Package pdftex.def Info: ./images/schri7.png used on input line 237.
|
||||
(pdftex.def) Requested size: 238.49121pt x 105.96442pt.
|
||||
<./images/schri8.png, id=43, 533.265pt x 236.301pt>
|
||||
File: ./images/schri8.png Graphic file (type png)
|
||||
<use ./images/schri8.png>
|
||||
Package pdftex.def Info: ./images/schri8.png used on input line 244.
|
||||
(pdftex.def) Requested size: 238.49121pt x 105.68184pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.34346pt too high) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.2pt too high) has occurred while \output is active []
|
||||
|
||||
[6]
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 304.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
[7 <./images/schri4.png> <./images/schri5.png> <./images/schri6.png> <./images
|
||||
/schri7.png> <./images/schri8.png>]
|
||||
<./images/schri9.png, id=56, 602.25pt x 238.491pt>
|
||||
File: ./images/schri9.png Graphic file (type png)
|
||||
<use ./images/schri9.png>
|
||||
Package pdftex.def Info: ./images/schri9.png used on input line 356.
|
||||
(pdftex.def) Requested size: 238.49121pt x 94.44125pt.
|
||||
<./images/schri10.png, id=57, 549.69pt x 236.301pt>
|
||||
File: ./images/schri10.png Graphic file (type png)
|
||||
<use ./images/schri10.png>
|
||||
Package pdftex.def Info: ./images/schri10.png used on input line 357.
|
||||
(pdftex.def) Requested size: 238.49121pt x 102.51967pt.
|
||||
<./images/schri11.png, id=58, 600.717pt x 230.607pt>
|
||||
File: ./images/schri11.png Graphic file (type png)
|
||||
<use ./images/schri11.png>
|
||||
Package pdftex.def Info: ./images/schri11.png used on input line 364.
|
||||
(pdftex.def) Requested size: 238.49121pt x 91.555pt.
|
||||
<./images/schri12.png, id=59, 532.389pt x 236.739pt>
|
||||
File: ./images/schri12.png Graphic file (type png)
|
||||
<use ./images/schri12.png>
|
||||
Package pdftex.def Info: ./images/schri12.png used on input line 365.
|
||||
(pdftex.def) Requested size: 238.49121pt x 106.05112pt.
|
||||
<./images/schri13.png, id=60, 533.265pt x 236.301pt>
|
||||
File: ./images/schri13.png Graphic file (type png)
|
||||
<use ./images/schri13.png>
|
||||
Package pdftex.def Info: ./images/schri13.png used on input line 372.
|
||||
(pdftex.def) Requested size: 238.49121pt x 105.68184pt.
|
||||
|
||||
Overfull \vbox (11.34346pt too high) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.2pt too high) has occurred while \output is active []
|
||||
|
||||
[8 <./images/schri9.png> <./images/schri10.png> <./images/schri11.png> <./imag
|
||||
es/schri12.png> <./images/schri13.png>]
|
||||
Underfull \vbox (badness 2990) has occurred while \output is active []
|
||||
|
||||
|
||||
(./Schrick-Noah_AG-CG-SyncFire_Revised.bbl)
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 393.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
[9]
|
||||
(./Schrick-Noah_AG-CG-SyncFire_Revised.aux)
|
||||
|
||||
LaTeX Font Warning: Size substitutions with differences
|
||||
(Font) up to 1.7pt have occurred.
|
||||
|
||||
|
||||
LaTeX Warning: There were undefined references.
|
||||
|
||||
)
|
||||
Here is how much of TeX's memory you used:
|
||||
4289 strings out of 478238
|
||||
68042 string characters out of 5850456
|
||||
376168 words of memory out of 5000000
|
||||
22443 multiletter control sequences out of 15000+600000
|
||||
528290 words of font info for 140 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
55i,14n,62p,1478b,335s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/base/8r.enc}</usr/share/texmf-dist/fon
|
||||
ts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/publi
|
||||
c/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
|
||||
mr7.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/
|
||||
share/texmf-dist/fonts/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texmf-dis
|
||||
t/fonts/type1/urw/courier/ucrr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/hel
|
||||
vetic/uhvb8a.pfb></usr/share/texmf-dist/fonts/type1/urw/helvetic/uhvbo8a.pfb></
|
||||
usr/share/texmf-dist/fonts/type1/urw/helvetic/uhvr8a.pfb></usr/share/texmf-dist
|
||||
/fonts/type1/urw/times/utmb8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/
|
||||
utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
|
||||
Output written on Schrick-Noah_AG-CG-SyncFire_Revised.pdf (9 pages, 2371409 byt
|
||||
es).
|
||||
PDF statistics:
|
||||
124 PDF objects out of 1000 (max. 8388607)
|
||||
60 compressed objects within 1 object stream
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
71 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
Binary file not shown.
@ -169,6 +169,7 @@ All data was collected on a 13 node cluster, with 12 nodes serving as dedicated
|
||||
\end{itemize}
|
||||
All nodes are connected with a 10Gbps Infiniband interconnect.
|
||||
|
||||
\subsubsection{Automobile Maintenance}
|
||||
The example networks for testing the effectiveness of synchronous firing follow the compliance graph generation approach. These networks analyze two assets, both of which are identical 2006 Toyota Corolla cars with identical qualities. The generation examines both cars at their current states, and proceeds to advance in time by a pre-determined amount, up to a pre-determined limit. Each time increment updates each car by an identical amount of mileage. During the generation process, it is determined if a car is out of compliance either through mileage or time since its last maintenance in accordance with the Toyota Corolla Maintenance Schedule manual.
|
||||
|
||||
In addition, the tests employ the use of ``services", where if a car is out of compliance, it will go through a correction process and reset the mileage and time since last service. Each test varies in the number of services used. The 1 Service case only employs one service, and it is dedicated to brake pads. The 2-Service case employs two services, where the first service is dedicated to the brake pads, and the second is for exhaust pipes. This process extends to the 3-, 4-, 5-, and 6-Service cases.
|
||||
@ -193,8 +194,29 @@ The compliance checks are as follows:
|
||||
\item{Driveshaft boots: to be checked every 12,000 miles}
|
||||
\end{itemize}
|
||||
|
||||
\subsubsection{DMCA Takedown}
|
||||
A second example of synchronous firing is illustrated through a DMCA Takedown for a fictitious organization \cite{DMCA}. In this example, a DMCA Takedown is issued to an organization after a group of employees were found to be engaging in online piracy with torrenting software on company devices and using company resources. Detection and removal of illicit data, such as through means presented by the authors of \cite{Piracy} for Windows or \cite{Android_Piracy} for company-supplied Android mobile devices, can be incorporated into and represented by a compliance graph.
|
||||
|
||||
Only the subset of the organization's network which contains the illicit data is used for this example. The graph generation process walks through as a system administrator removes the torrenting software and the illicit data from the company devices. When removing torrenting software, the data associated with the torrenting program can be removed at the same time; an administrator does not need to remove the torrenting program and then separately remove the data. This example highlights the capability of synchronous firing by grouping the removal of software and data together, as opposed to traditional attack and compliance graphs requiring at least two separate steps to remove the software and data.
|
||||
|
||||
This experimental setup is as follows:
|
||||
\begin{itemize}
|
||||
\item{Employee A has torrenting software, and is actively uploading and downloading 3 programs.}
|
||||
\item{Employee B has torrenting software, and is actively uploading and downloading 4 programs.}
|
||||
\item{Employee C has torrenting software, and is actively uploading and downloading 7 programs.}
|
||||
\item{If synchronous firing is not enabled, the administrator removes each illicit program one-by-one after the removal of the torrenting software.}
|
||||
\item{If synchronous firing is enabled, the administrator removes the torrenting software and all programs off a single device simultaneously.}
|
||||
\item{Graph visualization was not timed. Only the generation and database operation time was measured.}
|
||||
\end{itemize}
|
||||
|
||||
The compliance checks are as follows:
|
||||
\begin{itemize}
|
||||
\item{Does an employee have torrenting software}
|
||||
\item{Does an employee have illicit data}
|
||||
\end{itemize}
|
||||
|
||||
\subsection{Results and Analysis}
|
||||
\subsubsection{Results for the Theoretical Environment} \label{sec:theo_res}
|
||||
\subsubsection{Results for the Theoretical Automobile Environment} \label{sec:theo_res}
|
||||
Using the experimental setup described in Section \ref{sec:test-platform} on the platform described at the beginning of Section \ref{sec:test-platform}, results were collected in regards to the effect of synchronous firing on both state space and runtime. The graphs' edge to state ratio (E/S Ratio) was computed as well. The inclusion of this ratio allows for a comparison to be drawn regarding the usage of the synchronous firing feature. Examining this ratio can provide additional insight on how the graph's underlying topological structures change when using or not using synchronous firing. The results can be seen in Figures \ref{fig:Sync-RT} and \ref{fig:Sync-State}. The respective tables are seen in Tables \ref{table:NS-Table} and \ref{table:S-Table}. Both figures show a decrease in the number of states and a decrease in the runtime when synchronous firing is utilized. Since synchronous firing prevents the generation of unattainable states, there is no meaningful information loss that occurs in the graphs generated with the synchronous firing feature. Since the resulting number of states was also reduced, there will be increased justification for the synchronous firing approach due to a reduced runtime for the analysis process. Fig. \ref{fig:Sync-Spd} displays the speedup (according to Amdahl's Law) obtained when using synchronous firing instead of non-synchronous firing for identical setups.
|
||||
|
||||
When examining the E/S Ratio for the non-synchronous graphs, it is both expected and observed that the ratio slightly increases as the number of services increases. When more applicable exploits are used during the generation process, the number of permutations increases, which corresponds with the growing number of states and edges. However, the increase in the number of services also increases the relation between states and the new permutations.
|
||||
@ -271,7 +293,7 @@ When comparing the E/S Ratio for the non-synchronous graphs to the E/S Ratio for
|
||||
\end{tabular}
|
||||
\end{table}
|
||||
|
||||
\subsubsection{Results for a Grouped Environment}
|
||||
\subsubsection{Results for a Grouped Automobile Environment}
|
||||
The environment and resulting graphs presented in Section \ref{sec:theo_res} depict the possible states of the two cars in compliance graph formats. While these graphs demonstrated accurate, exhaustive depictions of the cars and their compliance standings, they may not be realistic representations of the most likely outcomes. If a car was due for two compliance checks at the same time, it is unlikely that the car would be taken for one maintenance, returned to its original destination, then driven immediately back for maintenance, and finally to its original destination once more. The more realistic scenario is that the car is taken for maintenance, both services are performed at the same visit, and then the car is returned to its original destination.
|
||||
|
||||
Another set of graphs were generated using only the 3-Service case. These services were for a driveshaft boot check, an AC filter change, and an oil change. This set of graphs used `comprehensive services", where a car would undergo multiple services simultaneously. With three services used, there are a total of three permutations: all three services are done individually, two services are performed simultaneously while the other is performed later, and all three services are performed simultaneously.
|
||||
@ -352,6 +374,8 @@ Leveraging comprehensive services with synchronous firing enables users to signi
|
||||
\label{fig:Comp-Sync-Spd}
|
||||
\end{figure}
|
||||
|
||||
\subsubsection{Results for the DMCA Takedown Environment} \label{sec:dmca_res}
|
||||
Using the experimental setup described in Section \ref{sec:test-platform} on the platform described at the beginning of Section \ref{sec:test-platform}, results were collected in regards to the effect of synchronous firing on both state space and runtime. The graphs' edge to state ratio (E/S Ratio) was computed as well.
|
||||
|
||||
\section{Future Works} \label{sec:fw}
|
||||
As seen and discussed in Section \ref{sec:inseparable}, when unattainable states are generated, there is a compounding effect. Each unattainable state is explored, and is likely to generate additional unattainable states. Future works include examining the effect of synchronous firing when more assets are utilized. It is hypothesized that the synchronous firing approach will lead to an increased runtime reduction and state space reduction due to the increased number of unattainable state permutations. This work had a limited number of assets, but generated upwards of 400,000 states due to repeated applications of the exploit set due to the services corresponding with the compliance graph. Future work could alter the scenario to have a greater number of assets, and a standard set of exploits more akin to an attack graph rather than a compliance graph. Other future works could include measuring the performance of synchronous firing when multiple groups of inseparable features are used. This work used a single group, but multiple groups be added to examine the performance of the feature.
|
||||
|
||||
@ -45,34 +45,49 @@
|
||||
\newlabel{sec:Results}{{V}{5}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {A}Experimental Networks and Computing Platform}{5}{}\protected@file@percent }
|
||||
\newlabel{sec:test-platform}{{A}{5}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1}{\hl {Automobile Maintenance}}}{5}{}\protected@file@percent }
|
||||
\citation{DMCA}
|
||||
\citation{DMCA}
|
||||
\citation{DMCA}
|
||||
\citation{DMCA}
|
||||
\citation{Piracy}
|
||||
\citation{Piracy}
|
||||
\citation{Piracy}
|
||||
\citation{Piracy}
|
||||
\citation{Android_Piracy}
|
||||
\citation{Android_Piracy}
|
||||
\citation{Android_Piracy}
|
||||
\citation{Android_Piracy}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2}{\hl {DMCA Takedown}}}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {B}Results and Analysis}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1}Results for the Theoretical Environment}{6}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {1}Results for the Theoretical \DIFaddbegin {\hl {Automobile }}\DIFaddend Environment}{6}{}\protected@file@percent }
|
||||
\newlabel{sec:theo_res}{{1}{6}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2}Results for a Grouped Environment}{6}{}\protected@file@percent }
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Synchronous Firing on Runtime}}{6}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-RT}{{4}{6}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on State Space}}{6}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-State}{{5}{6}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Speedup (Amdahl's) Obtained When Using Synchronous Firing}}{6}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-Spd}{{6}{6}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Results for the Non-Synchronous Firing Testing}}{7}{}\protected@file@percent }
|
||||
\newlabel{table:NS-Table}{{1}{7}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Results for the Non-Synchronous Firing Testing}}{6}{}\protected@file@percent }
|
||||
\newlabel{table:NS-Table}{{1}{6}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Synchronous Firing on Runtime}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-RT}{{4}{7}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing on State Space}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-State}{{5}{7}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Speedup (Amdahl's) Obtained When Using Synchronous Firing}}{7}{}\protected@file@percent }
|
||||
\newlabel{fig:Sync-Spd}{{6}{7}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Results for the Synchronous Firing Testing}}{7}{}\protected@file@percent }
|
||||
\newlabel{table:S-Table}{{2}{7}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Results for the Comprehensive Services without Synchronous Firing}}{7}{}\protected@file@percent }
|
||||
\newlabel{table:Non-Sync-Comp-Table}{{3}{7}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {4}{\ignorespaces Results for the Comprehensive Services with Synchronous Firing}}{7}{}\protected@file@percent }
|
||||
\newlabel{table:Sync-Comp-Table}{{4}{7}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VI}Future Works}{7}{}\protected@file@percent }
|
||||
\newlabel{sec:fw}{{VI}{7}}
|
||||
\bibdata{Bibliography}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {2}Results for a Grouped \DIFaddbegin {\hl {Automobile }}\DIFaddend Environment}{7}{}\protected@file@percent }
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Results for the Comprehensive Services without Synchronous Firing}}{8}{}\protected@file@percent }
|
||||
\newlabel{table:Non-Sync-Comp-Table}{{3}{8}}
|
||||
\@writefile{lot}{\contentsline {table}{\numberline {4}{\ignorespaces Results for the Comprehensive Services with Synchronous Firing}}{8}{}\protected@file@percent }
|
||||
\newlabel{table:Sync-Comp-Table}{{4}{8}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3}{\hl {Results for the DMCA Takedown Environment}}}{8}{}\protected@file@percent }
|
||||
\newlabel{sec:dmca_res}{{3}{8}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VI}Future Works}{8}{}\protected@file@percent }
|
||||
\newlabel{sec:fw}{{VI}{8}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces Synchronous Firing on Runtime}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:Comp-Sync-RT}{{7}{8}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Bar Graph and Line Graph Representations of Synchronous Firing with Comprehensive Services on State Space}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:Comp-Sync-State}{{8}{8}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Speedup (Amdahl's) Obtained When Using Synchronous Firing with Comprehensive Services}}{8}{}\protected@file@percent }
|
||||
\newlabel{fig:Comp-Sync-Spd}{{9}{8}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VII}Conclusion}{8}{}\protected@file@percent }
|
||||
\bibdata{Bibliography}
|
||||
\bibcite{phillips_graph-based_1998}{1}
|
||||
\bibcite{schneier_modeling_1999}{2}
|
||||
\bibcite{ou_scalable_2006}{3}
|
||||
@ -91,6 +106,10 @@
|
||||
\bibcite{louthan_hybrid_2011}{16}
|
||||
\bibcite{cook_rage_2018}{17}
|
||||
\bibcite{nichols_2018}{18}
|
||||
\bibcite{DMCA}{19}
|
||||
\bibcite{Piracy}{20}
|
||||
\bibcite{Android_Piracy}{21}
|
||||
\bibstyle{ieeetr}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VII}Conclusion}{9}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{REFERENCES}{9}{}\protected@file@percent }
|
||||
\gdef \@abspage@last{9}
|
||||
|
||||
@ -92,4 +92,20 @@ W.~M. Nichols, {\em {Hybrid} {Attack} {Graphs} for {Use} with a {Simulation} of
|
||||
a {Cyber-Physical} {System}}.
|
||||
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
|
||||
|
||||
\bibitem{DMCA}
|
||||
``H.r.2281 - {Digital {Millennium} {Copyright} {Act}}.''
|
||||
\newblock Pub. L. No. 105-304. 1998 [Online]. Available:
|
||||
https://www.govinfo.gov/content/pkg/PLAW-105publ304/html/PLAW-105publ304.htm.
|
||||
|
||||
\bibitem{Piracy}
|
||||
Y.~Kim, J.~Moon, S.~J. Cho, M.~Park, and S.~Han, ``Efficient identification of
|
||||
windows executable programs to prevent software piracy,'' in {\em 2014 Eighth
|
||||
International Conference on Innovative Mobile and Internet Services in
|
||||
Ubiquitous Computing}, pp.~236--240, 2014.
|
||||
|
||||
\bibitem{Android_Piracy}
|
||||
N.~Kumari and M.~Chen, ``Malware and piracy detection in android
|
||||
applications,'' in {\em 2022 IEEE 5th International Conference on Multimedia
|
||||
Information Processing and Retrieval (MIPR)}, pp.~306--311, 2022.
|
||||
|
||||
\end{thebibliography}
|
||||
|
||||
@ -5,45 +5,45 @@ The style file: ieeetr.bst
|
||||
Database file #1: Bibliography.bib
|
||||
Warning--empty booktitle in centrality_based
|
||||
Warning--empty publisher in TVA
|
||||
You've used 18 entries,
|
||||
You've used 21 entries,
|
||||
1876 wiz_defined-function locations,
|
||||
581 strings with 6884 characters,
|
||||
and the built_in function-call counts, 4246 in all, are:
|
||||
= -- 415
|
||||
> -- 178
|
||||
599 strings with 7568 characters,
|
||||
and the built_in function-call counts, 5065 in all, are:
|
||||
= -- 493
|
||||
> -- 204
|
||||
< -- 0
|
||||
+ -- 67
|
||||
- -- 49
|
||||
* -- 286
|
||||
:= -- 624
|
||||
add.period$ -- 25
|
||||
call.type$ -- 18
|
||||
change.case$ -- 14
|
||||
+ -- 77
|
||||
- -- 56
|
||||
* -- 333
|
||||
:= -- 722
|
||||
add.period$ -- 28
|
||||
call.type$ -- 21
|
||||
change.case$ -- 17
|
||||
chr.to.int$ -- 0
|
||||
cite$ -- 20
|
||||
duplicate$ -- 230
|
||||
empty$ -- 405
|
||||
format.name$ -- 49
|
||||
if$ -- 1028
|
||||
cite$ -- 23
|
||||
duplicate$ -- 276
|
||||
empty$ -- 497
|
||||
format.name$ -- 56
|
||||
if$ -- 1242
|
||||
int.to.chr$ -- 0
|
||||
int.to.str$ -- 18
|
||||
missing$ -- 15
|
||||
newline$ -- 65
|
||||
num.names$ -- 18
|
||||
pop$ -- 64
|
||||
int.to.str$ -- 21
|
||||
missing$ -- 17
|
||||
newline$ -- 75
|
||||
num.names$ -- 20
|
||||
pop$ -- 87
|
||||
preamble$ -- 1
|
||||
purify$ -- 0
|
||||
quote$ -- 0
|
||||
skip$ -- 138
|
||||
skip$ -- 172
|
||||
stack$ -- 0
|
||||
substring$ -- 202
|
||||
swap$ -- 82
|
||||
substring$ -- 258
|
||||
swap$ -- 100
|
||||
text.length$ -- 0
|
||||
text.prefix$ -- 0
|
||||
top$ -- 0
|
||||
type$ -- 0
|
||||
warning$ -- 2
|
||||
while$ -- 35
|
||||
width$ -- 20
|
||||
write$ -- 178
|
||||
while$ -- 41
|
||||
width$ -- 23
|
||||
write$ -- 203
|
||||
(There were 2 warnings)
|
||||
|
||||
@ -1,8 +1,8 @@
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2023.2.27) 22 MAR 2023 15:59
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2023.2.27) 22 MAR 2023 18:23
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
%&-line parsing enabled.
|
||||
**diff
|
||||
**diff.tex
|
||||
(./diff.tex
|
||||
LaTeX2e <2021-11-15> patch level 1
|
||||
L3 programming layer <2022-04-10> (./ieeeoj.cls
|
||||
@ -523,7 +523,7 @@ Package pdftex.def Info: ./images/schri3.png used on input line 236.
|
||||
(pdftex.def) Requested size: 244.9144pt x 526.96747pt.
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 276.
|
||||
Package pdftex.def Info: OJIM.png used on input line 275.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
@ -532,67 +532,239 @@ Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
[5 <./images/schri3.png>]
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
\hbox
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
\hbox
|
||||
l.291 }
|
||||
|
||||
?
|
||||
|
||||
! Package soul Error: Reconstruction failed.
|
||||
|
||||
See the soul package documentation for explanation.
|
||||
Type H <return> for immediate help.
|
||||
...
|
||||
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
\hbox
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
\hbox
|
||||
l.291 }
|
||||
|
||||
?
|
||||
|
||||
! Package soul Error: Reconstruction failed.
|
||||
|
||||
See the soul package documentation for explanation.
|
||||
Type H <return> for immediate help.
|
||||
...
|
||||
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
}
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Missing number, treated as zero.
|
||||
<to be read again>
|
||||
\hbox
|
||||
l.291 }
|
||||
|
||||
?
|
||||
! Illegal unit of measure (pt inserted).
|
||||
<to be read again>
|
||||
\hbox
|
||||
l.291 }
|
||||
|
||||
?
|
||||
|
||||
! Package soul Error: Reconstruction failed.
|
||||
|
||||
See the soul package documentation for explanation.
|
||||
Type H <return> for immediate help.
|
||||
...
|
||||
|
||||
l.291 }
|
||||
|
||||
?
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
<./images/schri4.png, id=39, 602.25pt x 238.491pt>
|
||||
File: ./images/schri4.png Graphic file (type png)
|
||||
<use ./images/schri4.png>
|
||||
Package pdftex.def Info: ./images/schri4.png used on input line 292.
|
||||
Package pdftex.def Info: ./images/schri4.png used on input line 322.
|
||||
(pdftex.def) Requested size: 238.49121pt x 94.44125pt.
|
||||
<./images/schri5.png, id=40, 549.69pt x 236.301pt>
|
||||
File: ./images/schri5.png Graphic file (type png)
|
||||
<use ./images/schri5.png>
|
||||
Package pdftex.def Info: ./images/schri5.png used on input line 293.
|
||||
Package pdftex.def Info: ./images/schri5.png used on input line 323.
|
||||
(pdftex.def) Requested size: 238.49121pt x 102.51967pt.
|
||||
<./images/schri6.png, id=41, 608.163pt x 223.38pt>
|
||||
File: ./images/schri6.png Graphic file (type png)
|
||||
<use ./images/schri6.png>
|
||||
Package pdftex.def Info: ./images/schri6.png used on input line 300.
|
||||
Package pdftex.def Info: ./images/schri6.png used on input line 330.
|
||||
(pdftex.def) Requested size: 238.49121pt x 87.59843pt.
|
||||
<./images/schri7.png, id=42, 532.827pt x 236.739pt>
|
||||
File: ./images/schri7.png Graphic file (type png)
|
||||
<use ./images/schri7.png>
|
||||
Package pdftex.def Info: ./images/schri7.png used on input line 301.
|
||||
Package pdftex.def Info: ./images/schri7.png used on input line 331.
|
||||
(pdftex.def) Requested size: 238.49121pt x 105.96442pt.
|
||||
<./images/schri8.png, id=43, 533.265pt x 236.301pt>
|
||||
File: ./images/schri8.png Graphic file (type png)
|
||||
<use ./images/schri8.png>
|
||||
Package pdftex.def Info: ./images/schri8.png used on input line 308.
|
||||
Package pdftex.def Info: ./images/schri8.png used on input line 338.
|
||||
(pdftex.def) Requested size: 238.49121pt x 105.68184pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.34346pt too high) has occurred while \output is active []
|
||||
|
||||
|
||||
Overfull \vbox (11.2pt too high) has occurred while \output is active []
|
||||
|
||||
[6 <./images/schri4.png> <./images/schri5.png> <./images/schri6.png> <./images
|
||||
/schri7.png> <./images/schri8.png>]
|
||||
<./images/schri9.png, id=52, 602.25pt x 238.491pt>
|
||||
File: ./images/schri9.png Graphic file (type png)
|
||||
<use ./images/schri9.png>
|
||||
Package pdftex.def Info: ./images/schri9.png used on input line 420.
|
||||
(pdftex.def) Requested size: 238.49121pt x 94.44125pt.
|
||||
<./images/schri10.png, id=53, 549.69pt x 236.301pt>
|
||||
File: ./images/schri10.png Graphic file (type png)
|
||||
<use ./images/schri10.png>
|
||||
Package pdftex.def Info: ./images/schri10.png used on input line 421.
|
||||
(pdftex.def) Requested size: 238.49121pt x 102.51967pt.
|
||||
<./images/schri11.png, id=54, 600.717pt x 230.607pt>
|
||||
File: ./images/schri11.png Graphic file (type png)
|
||||
<use ./images/schri11.png>
|
||||
Package pdftex.def Info: ./images/schri11.png used on input line 428.
|
||||
(pdftex.def) Requested size: 238.49121pt x 91.555pt.
|
||||
<./images/schri12.png, id=55, 532.389pt x 236.739pt>
|
||||
File: ./images/schri12.png Graphic file (type png)
|
||||
<use ./images/schri12.png>
|
||||
Package pdftex.def Info: ./images/schri12.png used on input line 429.
|
||||
(pdftex.def) Requested size: 238.49121pt x 106.05112pt.
|
||||
<./images/schri13.png, id=56, 533.265pt x 236.301pt>
|
||||
File: ./images/schri13.png Graphic file (type png)
|
||||
<use ./images/schri13.png>
|
||||
Package pdftex.def Info: ./images/schri13.png used on input line 436.
|
||||
(pdftex.def) Requested size: 238.49121pt x 105.68184pt.
|
||||
[6]
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 444.
|
||||
Package pdftex.def Info: OJIM.png used on input line 398.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
@ -600,10 +772,33 @@ Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
[7]
|
||||
(./diff.bbl
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
[7 <./images/schri4.png> <./images/schri5.png> <./images/schri6.png> <./images
|
||||
/schri7.png> <./images/schri8.png>]
|
||||
<./images/schri9.png, id=56, 602.25pt x 238.491pt>
|
||||
File: ./images/schri9.png Graphic file (type png)
|
||||
<use ./images/schri9.png>
|
||||
Package pdftex.def Info: ./images/schri9.png used on input line 450.
|
||||
(pdftex.def) Requested size: 238.49121pt x 94.44125pt.
|
||||
<./images/schri10.png, id=57, 549.69pt x 236.301pt>
|
||||
File: ./images/schri10.png Graphic file (type png)
|
||||
<use ./images/schri10.png>
|
||||
Package pdftex.def Info: ./images/schri10.png used on input line 451.
|
||||
(pdftex.def) Requested size: 238.49121pt x 102.51967pt.
|
||||
<./images/schri11.png, id=58, 600.717pt x 230.607pt>
|
||||
File: ./images/schri11.png Graphic file (type png)
|
||||
<use ./images/schri11.png>
|
||||
Package pdftex.def Info: ./images/schri11.png used on input line 458.
|
||||
(pdftex.def) Requested size: 238.49121pt x 91.555pt.
|
||||
<./images/schri12.png, id=59, 532.389pt x 236.739pt>
|
||||
File: ./images/schri12.png Graphic file (type png)
|
||||
<use ./images/schri12.png>
|
||||
Package pdftex.def Info: ./images/schri12.png used on input line 459.
|
||||
(pdftex.def) Requested size: 238.49121pt x 106.05112pt.
|
||||
<./images/schri13.png, id=60, 533.265pt x 236.301pt>
|
||||
File: ./images/schri13.png Graphic file (type png)
|
||||
<use ./images/schri13.png>
|
||||
Package pdftex.def Info: ./images/schri13.png used on input line 466.
|
||||
(pdftex.def) Requested size: 238.49121pt x 105.68184pt.
|
||||
|
||||
Overfull \vbox (11.34346pt too high) has occurred while \output is active []
|
||||
|
||||
@ -611,10 +806,28 @@ Overfull \vbox (11.34346pt too high) has occurred while \output is active []
|
||||
Overfull \vbox (11.2pt too high) has occurred while \output is active []
|
||||
|
||||
[8 <./images/schri9.png> <./images/schri10.png> <./images/schri11.png> <./imag
|
||||
es/schri12.png> <./images/schri13.png>])
|
||||
es/schri12.png> <./images/schri13.png>]
|
||||
Underfull \vbox (badness 2990) has occurred while \output is active []
|
||||
|
||||
(./diff.bbl
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 96--99
|
||||
[]\OT1/ptm/m/n/8 ``H.r.2281 - Dig-i-tal Mil-len-nium Copy-right Act.''
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 96--99
|
||||
\OT1/ptm/m/n/8 Pub. L. No. 105-304. 1998 [On-line]. Avail-able:
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 96--99
|
||||
\OT1/ptm/m/n/8 https://www.govinfo.gov/content/pkg/PLAW-105publ304/html/PLAW-
|
||||
[]
|
||||
|
||||
)
|
||||
File: OJIM.png Graphic file (type png)
|
||||
<use OJIM.png>
|
||||
Package pdftex.def Info: OJIM.png used on input line 455.
|
||||
Package pdftex.def Info: OJIM.png used on input line 489.
|
||||
(pdftex.def) Requested size: 75.09589pt x 28.0pt.
|
||||
|
||||
Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
@ -622,9 +835,7 @@ Underfull \vbox (badness 10000) has occurred while \output is active []
|
||||
|
||||
Overfull \vbox (8.45pt too high) has occurred while \output is active []
|
||||
|
||||
[9
|
||||
|
||||
]
|
||||
[9]
|
||||
(./diff.aux)
|
||||
|
||||
LaTeX Font Warning: Size substitutions with differences
|
||||
@ -635,13 +846,13 @@ LaTeX Warning: There were undefined references.
|
||||
|
||||
)
|
||||
Here is how much of TeX's memory you used:
|
||||
6172 strings out of 478238
|
||||
96328 string characters out of 5850456
|
||||
449816 words of memory out of 5000000
|
||||
24284 multiletter control sequences out of 15000+600000
|
||||
6176 strings out of 478238
|
||||
96372 string characters out of 5850456
|
||||
471532 words of memory out of 5000000
|
||||
24288 multiletter control sequences out of 15000+600000
|
||||
528709 words of font info for 142 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
55i,14n,62p,1443b,468s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
55i,14n,62p,1447b,571s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
{/usr/share/texmf-dist/fonts/enc/dvips/base/8r.enc}</usr/share/texmf-dist/fon
|
||||
ts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/texmf-dist/fonts/type1/publi
|
||||
c/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
|
||||
@ -652,7 +863,7 @@ vetic/uhvb8a.pfb></usr/share/texmf-dist/fonts/type1/urw/helvetic/uhvbo8a.pfb></
|
||||
usr/share/texmf-dist/fonts/type1/urw/helvetic/uhvr8a.pfb></usr/share/texmf-dist
|
||||
/fonts/type1/urw/times/utmb8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/
|
||||
utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
|
||||
Output written on diff.pdf (9 pages, 2380594 bytes).
|
||||
Output written on diff.pdf (9 pages, 2392386 bytes).
|
||||
PDF statistics:
|
||||
124 PDF objects out of 1000 (max. 8388607)
|
||||
60 compressed objects within 1 object stream
|
||||
|
||||
Binary file not shown.
@ -1,7 +1,7 @@
|
||||
\documentclass{IEEEoj}
|
||||
%DIF LATEXDIFF DIFFERENCE FILE
|
||||
%DIF DEL ../Original Submission/Schrick-Noah_AG-CG-SyncFire.tex Mon Dec 12 09:02:11 2022
|
||||
%DIF ADD Schrick-Noah_AG-CG-SyncFire_Revised.tex Tue Feb 28 13:35:09 2023
|
||||
%DIF ADD Schrick-Noah_AG-CG-SyncFire_Revised.tex Wed Mar 22 18:17:56 2023
|
||||
\usepackage{cite}
|
||||
\usepackage{spverbatim}
|
||||
\usepackage{amsmath,amssymb,amsfonts}
|
||||
@ -19,11 +19,11 @@
|
||||
\RequirePackage{color}\definecolor{RED}{rgb}{1,0,0}\definecolor{BLUE}{rgb}{0,0,1} %DIF PREAMBLE
|
||||
%\providecommand{\DIFadd}[1]{{\protect\color{blue}\uwave{#1}}} %DIF PREAMBLE
|
||||
%\providecommand{\DIFdel}[1]{{\protect\color{red}\sout{#1}}} %DIF PREAMBLE
|
||||
%DIF SAFE PREAMBLE %DIF PREAMBLE
|
||||
\usepackage{soulutf8}
|
||||
\providecommand{\DIFadd}[1]{{\protect\hl{#1}}} %highlight
|
||||
\providecommand{\DIFdel}[1]{} %do not show deleted
|
||||
|
||||
%DIF SAFE PREAMBLE %DIF PREAMBLE
|
||||
\providecommand{\DIFaddbegin}{} %DIF PREAMBLE
|
||||
\providecommand{\DIFaddend}{} %DIF PREAMBLE
|
||||
\providecommand{\DIFdelbegin}{} %DIF PREAMBLE
|
||||
@ -255,7 +255,8 @@ All data was collected on a 13 node cluster, with 12 nodes serving as dedicated
|
||||
\end{itemize}
|
||||
All nodes are connected with a 10Gbps Infiniband interconnect.
|
||||
|
||||
The example networks for testing the effectiveness of synchronous firing follow the compliance graph generation approach. These networks analyze two assets, both of which are identical 2006 Toyota Corolla cars with identical qualities. The generation examines both cars at their current states, and proceeds to advance in time by a pre-determined amount, up to a pre-determined limit. Each time increment updates each car by an identical amount of mileage. During the generation process, it is determined if a car is out of compliance either through mileage or time since its last maintenance in accordance with the Toyota Corolla Maintenance Schedule manual.
|
||||
\DIFaddbegin \subsubsection{\DIFadd{Automobile Maintenance}}
|
||||
\DIFaddend The example networks for testing the effectiveness of synchronous firing follow the compliance graph generation approach. These networks analyze two assets, both of which are identical 2006 Toyota Corolla cars with identical qualities. The generation examines both cars at their current states, and proceeds to advance in time by a pre-determined amount, up to a pre-determined limit. Each time increment updates each car by an identical amount of mileage. During the generation process, it is determined if a car is out of compliance either through mileage or time since its last maintenance in accordance with the Toyota Corolla Maintenance Schedule manual.
|
||||
|
||||
In addition, the tests employ the use of ``services", where if a car is out of compliance, it will go through a correction process and reset the mileage and time since last service. Each test varies in the number of services used. The 1 Service case only employs one service, and it is dedicated to brake pads. The 2-Service case employs two services, where the first service is dedicated to the brake pads, and the second is for exhaust pipes. This process extends to the 3-, 4-, 5-, and 6-Service cases.
|
||||
The experimental setup is as follows:
|
||||
@ -279,8 +280,37 @@ The compliance checks are as follows:
|
||||
\item{Driveshaft boots: to be checked every 12,000 miles}
|
||||
\end{itemize}
|
||||
|
||||
\subsection{Results and Analysis}
|
||||
\subsubsection{Results for the Theoretical Environment} \label{sec:theo_res}
|
||||
\DIFaddbegin \subsubsection{\DIFadd{DMCA Takedown}}
|
||||
\DIFadd{A second example of synchronous firing is illustrated through a DMCA Takedown for a fictitious organization \mbox{%DIFAUXCMD
|
||||
\cite{DMCA}}\hskip0pt%DIFAUXCMD
|
||||
. In this example, a DMCA Takedown is issued to an organization after a group of employees were found to be engaging in online piracy with torrenting software on company devices and using company resources. Detection and removal of illicit data, such as through means presented by the authors of \mbox{%DIFAUXCMD
|
||||
\cite{Piracy} }\hskip0pt%DIFAUXCMD
|
||||
for Windows or \mbox{%DIFAUXCMD
|
||||
\cite{Android_Piracy} }\hskip0pt%DIFAUXCMD
|
||||
for company-supplied Android mobile devices, can be incorporated into and represented by a compliance graph.
|
||||
}
|
||||
|
||||
\DIFadd{Only the subset of the organization's network which contains the illicit data is used for this example. The graph generation process walks through as a system administrator removes the torrenting software and the illicit data from the company devices. When removing torrenting software, the data associated with the torrenting program can be removed at the same time; an administrator does not need to remove the torrenting program and then separately remove the data. This example highlights the capability of synchronous firing by grouping the removal of software and data together, as opposed to traditional attack and compliance graphs requiring at least two separate steps to remove the software and data.
|
||||
}
|
||||
|
||||
\DIFadd{This experimental setup is as follows:
|
||||
}\begin{itemize}
|
||||
\item{Employee A has torrenting software, and is actively uploading and downloading 3 programs.}
|
||||
\item{Employee B has torrenting software, and is actively uploading and downloading 4 programs.}
|
||||
\item{Employee C has torrenting software, and is actively uploading and downloading 7 programs.}
|
||||
\item{If synchronous firing is not enabled, the administrator removes each illicit program one-by-one after the removal of the torrenting software.}
|
||||
\item{If synchronous firing is enabled, the administrator removes the torrenting software and all programs off a single device simultaneously.}
|
||||
\item{Graph visualization was not timed. Only the generation and database operation time was measured.}
|
||||
\end{itemize}
|
||||
|
||||
\DIFadd{The compliance checks are as follows:
|
||||
}\begin{itemize}
|
||||
\item{Does an employee have torrenting software}
|
||||
\item{Does an employee have illicit data}
|
||||
\end{itemize}
|
||||
|
||||
\DIFaddend \subsection{Results and Analysis}
|
||||
\subsubsection{Results for the Theoretical \DIFaddbegin \DIFadd{Automobile }\DIFaddend Environment} \label{sec:theo_res}
|
||||
Using the experimental setup described in Section \ref{sec:test-platform} on the platform described at the beginning of Section \ref{sec:test-platform}, results were collected in regards to the effect of synchronous firing on both state space and runtime. The graphs' edge to state ratio (E/S Ratio) was computed as well. The inclusion of this ratio allows for a comparison to be drawn regarding the usage of the synchronous firing feature. Examining this ratio can provide additional insight on how the graph's underlying topological structures change when using or not using synchronous firing. The results can be seen in Figures \ref{fig:Sync-RT} and \ref{fig:Sync-State}. The respective tables are seen in Tables \ref{table:NS-Table} and \ref{table:S-Table}. Both figures show a decrease in the number of states and a decrease in the runtime when synchronous firing is utilized. Since synchronous firing prevents the generation of unattainable states, there is no meaningful information loss that occurs in the graphs generated with the synchronous firing feature. Since the resulting number of states was also reduced, there will be increased justification for the synchronous firing approach due to a reduced runtime for the analysis process. Fig. \ref{fig:Sync-Spd} displays the speedup (according to Amdahl's Law) obtained when using synchronous firing instead of non-synchronous firing for identical setups.
|
||||
|
||||
When examining the E/S Ratio for the non-synchronous graphs, it is both expected and observed that the ratio slightly increases as the number of services increases. When more applicable exploits are used during the generation process, the number of permutations increases, which corresponds with the growing number of states and edges. However, the increase in the number of services also increases the relation between states and the new permutations.
|
||||
@ -357,7 +387,7 @@ When comparing the E/S Ratio for the non-synchronous graphs to the E/S Ratio for
|
||||
\end{tabular}
|
||||
\end{table}
|
||||
|
||||
\subsubsection{Results for a Grouped Environment}
|
||||
\subsubsection{Results for a Grouped \DIFaddbegin \DIFadd{Automobile }\DIFaddend Environment}
|
||||
The environment and resulting graphs presented in Section \ref{sec:theo_res} depict the possible states of the two cars in compliance graph formats. While these graphs demonstrated accurate, exhaustive depictions of the cars and their compliance standings, they may not be realistic representations of the most likely outcomes. If a car was due for two compliance checks at the same time, it is unlikely that the car would be taken for one maintenance, returned to its original destination, then driven immediately back for maintenance, and finally to its original destination once more. The more realistic scenario is that the car is taken for maintenance, both services are performed at the same visit, and then the car is returned to its original destination.
|
||||
|
||||
Another set of graphs were generated using only the 3-Service case. These services were for a driveshaft boot check, an AC filter change, and an oil change. This set of graphs used `comprehensive services", where a car would undergo multiple services simultaneously. With three services used, there are a total of three permutations: all three services are done individually, two services are performed simultaneously while the other is performed later, and all three services are performed simultaneously.
|
||||
@ -437,7 +467,11 @@ Leveraging comprehensive services with synchronous firing enables users to signi
|
||||
\caption{Speedup (Amdahl's) Obtained When Using Synchronous Firing with Comprehensive Services}
|
||||
\label{fig:Comp-Sync-Spd}
|
||||
\end{figure}
|
||||
\DIFaddbegin
|
||||
|
||||
\subsubsection{\DIFadd{Results for the DMCA Takedown Environment}} \label{sec:dmca_res}
|
||||
\DIFadd{Using the experimental setup described in Section }\ref{sec:test-platform} \DIFadd{on the platform described at the beginning of Section }\ref{sec:test-platform}\DIFadd{, results were collected in regards to the effect of synchronous firing on both state space and runtime. The graphs' edge to state ratio (E/S Ratio) was computed as well.
|
||||
}\DIFaddend
|
||||
|
||||
\section{Future Works} \label{sec:fw}
|
||||
As seen and discussed in Section \ref{sec:inseparable}, when unattainable states are generated, there is a compounding effect. Each unattainable state is explored, and is likely to generate additional unattainable states. Future works include examining the effect of synchronous firing when more assets are utilized. It is hypothesized that the synchronous firing approach will lead to an increased runtime reduction and state space reduction due to the increased number of unattainable state permutations. This work had a limited number of assets, but generated upwards of 400,000 states due to repeated applications of the exploit set due to the services corresponding with the compliance graph. Future work could alter the scenario to have a greater number of assets, and a standard set of exploits more akin to an attack graph rather than a compliance graph. Other future works could include measuring the performance of synchronous firing when multiple groups of inseparable features are used. This work used a single group, but multiple groups be added to examine the performance of the feature.
|
||||
|
||||
@ -210,3 +210,31 @@ pages = {},
|
||||
title = {Analysis of Attack Graph Representations for Ranking Vulnerability Fixes},
|
||||
doi = {10.29007/2c1q}
|
||||
}
|
||||
|
||||
@misc{DMCA,
|
||||
title = {H.R.2281 - {Digital {Millennium} {Copyright} {Act}},
|
||||
note = {Pub. L. No. 105-304. 1998 [Online]. Available: https://www.govinfo.gov/content/pkg/PLAW-105publ304/html/PLAW-105publ304.htm},
|
||||
}
|
||||
|
||||
@inproceedings{Piracy,
|
||||
author={Kim, Yesol and Moon, Jeongoh and Cho, Seong Je and Park, Minkyu and Han, Sangchul},
|
||||
booktitle={2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing},
|
||||
title={Efficient Identification of Windows Executable Programs to Prevent Software Piracy},
|
||||
year={2014},
|
||||
volume={},
|
||||
number={},
|
||||
pages={236-240},
|
||||
doi={10.1109/IMIS.2014.29}
|
||||
}
|
||||
|
||||
@inproceedings{Android_Piracy,
|
||||
author={Kumari, Neha and Chen, Min},
|
||||
booktitle={2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)},
|
||||
title={Malware and Piracy Detection in Android Applications},
|
||||
year={2022},
|
||||
volume={},
|
||||
number={},
|
||||
pages={306-311},
|
||||
doi={10.1109/MIPR54900.2022.00061}}
|
||||
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user