首页 > 最新文献

Proceedings of the 5th ACM Computer Science in Cars Symposium最新文献

英文 中文
Analysis of E-Mobility-based Threats to Power Grid Resilience 基于电动交通的电网弹性威胁分析
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493385
Dustin Kern, C. Krauß
The increasing complexity of the e-mobility infrastructure leads to an increasing risk of security threats, which may negatively affect any connected infrastructures such as the power grid. The grid is one of the most important critical infrastructures, making it a valuable target for cyber attacks. This situation gives rise to the potential of e-mobility-based attacks to the grid, e.g., causing large-scale black outs based on a sudden increase in charging demand. In this paper, we propose a framework for simulating and analyzing the impact of e-mobility-based attacks on grid resilience. We derive e-mobility-specific attacks, based on an analysis of adversaries and threats, and combine these attacks in our framework with models for grid and e-mobility as well as simulation-based outage analysis. In different case studies, the effects of e-mobility-based attacks on grid resilience are evaluated. The results show, e.g., the scope of increased vulnerability during peak load hours, enabling attacks even at low levels of e-mobility compromise, the increased impact of combined attack strategies, and the time from attack to outage, which may decrease to sub-second ranges for high levels of e-mobility growth and compromise. We further discuss potential protection mechanisms for different resilience objectives including approaches for detection, prevention, and response. This work thus provides the basis for comprehensive resilience research regarding the interconnection of e-mobility and grid.
电动交通基础设施的日益复杂导致安全威胁的风险增加,这可能会对任何连接的基础设施(如电网)产生负面影响。电网是最重要的关键基础设施之一,使其成为网络攻击的重要目标。这种情况导致了基于电动交通的电网攻击的可能性,例如,由于充电需求的突然增加而导致大规模停电。在本文中,我们提出了一个框架来模拟和分析基于电动交通的攻击对电网弹性的影响。基于对对手和威胁的分析,我们推导出针对电动汽车的攻击,并将这些攻击与电网和电动汽车模型以及基于模拟的中断分析结合在我们的框架中。在不同的案例研究中,评估了基于电动交通的攻击对电网弹性的影响。结果表明,例如,在高峰负荷时段,漏洞增加的范围,即使在低水平的电动交通入侵时也能进行攻击,组合攻击策略的影响增加,从攻击到中断的时间可能会减少到亚秒范围,对于高水平的电动交通增长和入侵。我们进一步讨论了针对不同弹性目标的潜在保护机制,包括检测、预防和响应方法。因此,这项工作为电动汽车与电网互联的综合弹性研究提供了基础。
{"title":"Analysis of E-Mobility-based Threats to Power Grid Resilience","authors":"Dustin Kern, C. Krauß","doi":"10.1145/3488904.3493385","DOIUrl":"https://doi.org/10.1145/3488904.3493385","url":null,"abstract":"The increasing complexity of the e-mobility infrastructure leads to an increasing risk of security threats, which may negatively affect any connected infrastructures such as the power grid. The grid is one of the most important critical infrastructures, making it a valuable target for cyber attacks. This situation gives rise to the potential of e-mobility-based attacks to the grid, e.g., causing large-scale black outs based on a sudden increase in charging demand. In this paper, we propose a framework for simulating and analyzing the impact of e-mobility-based attacks on grid resilience. We derive e-mobility-specific attacks, based on an analysis of adversaries and threats, and combine these attacks in our framework with models for grid and e-mobility as well as simulation-based outage analysis. In different case studies, the effects of e-mobility-based attacks on grid resilience are evaluated. The results show, e.g., the scope of increased vulnerability during peak load hours, enabling attacks even at low levels of e-mobility compromise, the increased impact of combined attack strategies, and the time from attack to outage, which may decrease to sub-second ranges for high levels of e-mobility growth and compromise. We further discuss potential protection mechanisms for different resilience objectives including approaches for detection, prevention, and response. This work thus provides the basis for comprehensive resilience research regarding the interconnection of e-mobility and grid.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monitoring perception reliability in autonomous driving: Distributional shift detection for estimating the impact of input data on prediction accuracy
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493382
F. Hell, Gereon Hinz, Feng Liu, Sakshi Goyal, Ke Pei, T. Lytvynenko, Alois Knoll, Yiqiang Chen
Deep neural networks are at the heart of safety-critical applications such as autonomous driving. Distributional shift is a typical problem in predictive modeling, when the feature distribution of inputs and outputs varies between the training and test stages. When used on data different from the training distribution, neural networks provide little or no performance guarantees on such out-of-distribution (OOD) inputs. Monitoring distributional shift can help assess reliability of neural network predictions with the purpose of predicting potential safety-critical contexts. With our research, we evaluate state of the art OOD detection methods on autonomous driving camera data, while also demonstrating the influence of OOD data on the prediction reliability of neural networks. We evaluate three different OOD detection methods: As a baseline method we employ a variational autoencoder (VAE) trained on the similar data as the perception network (depth estimation) and use a reconstruction error based out of distribution measure. As a second approach, we choose to evaluate a method termed Likelihood Regret, which has been shown to be an efficient likelihood based OOD measure for VAEs. As a third approach, we evaluate another recently introduced method based on generative modelling termed SSD, which uses self-supervised representation learning followed by a distance based detection in the feature space, to calculate the outlier score. We compare all 3 methods and evaluate them concurrently with the error of an depth estimation network. Results show that while the reconstruction error based OOD metric is not able to differentiate between in and out of distribution data across all scenarios, the likelihood regret based OOD metric as well as the SSD outlier score perform fairly well in OOD detection. Their metrics are also highly correlated with perception error, rendering them promising candidates for an autonomous driving system reliability monitor.
深度神经网络是自动驾驶等安全关键应用的核心。分布移位是预测建模中的一个典型问题,当输入和输出的特征分布在训练和测试阶段之间发生变化时。当用于与训练分布不同的数据时,神经网络对这种偏离分布(OOD)的输入提供很少或根本没有性能保证。监测分布位移可以帮助评估神经网络预测的可靠性,从而预测潜在的安全关键环境。通过我们的研究,我们评估了自动驾驶摄像头数据上最先进的OOD检测方法,同时也证明了OOD数据对神经网络预测可靠性的影响。我们评估了三种不同的OOD检测方法:作为基线方法,我们使用与感知网络(深度估计)相似的数据训练的变分自编码器(VAE),并使用基于分布度量的重建误差。作为第二种方法,我们选择评估一种称为可能性后悔的方法,该方法已被证明是一种有效的基于可能性的面向对象评价方法。作为第三种方法,我们评估了另一种最近引入的基于生成建模的方法,称为SSD,它使用自监督表示学习,然后在特征空间中进行基于距离的检测,来计算异常值得分。我们比较了这三种方法,并结合深度估计网络的误差对它们进行了评价。结果表明,虽然基于重建误差的OOD度量不能在所有场景中区分分布内和分布外数据,但基于可能性后悔的OOD度量以及SSD异常值得分在OOD检测中表现相当好。它们的指标也与感知误差高度相关,使它们成为自动驾驶系统可靠性监测器的有希望的候选者。
{"title":"Monitoring perception reliability in autonomous driving: Distributional shift detection for estimating the impact of input data on prediction accuracy","authors":"F. Hell, Gereon Hinz, Feng Liu, Sakshi Goyal, Ke Pei, T. Lytvynenko, Alois Knoll, Yiqiang Chen","doi":"10.1145/3488904.3493382","DOIUrl":"https://doi.org/10.1145/3488904.3493382","url":null,"abstract":"Deep neural networks are at the heart of safety-critical applications such as autonomous driving. Distributional shift is a typical problem in predictive modeling, when the feature distribution of inputs and outputs varies between the training and test stages. When used on data different from the training distribution, neural networks provide little or no performance guarantees on such out-of-distribution (OOD) inputs. Monitoring distributional shift can help assess reliability of neural network predictions with the purpose of predicting potential safety-critical contexts. With our research, we evaluate state of the art OOD detection methods on autonomous driving camera data, while also demonstrating the influence of OOD data on the prediction reliability of neural networks. We evaluate three different OOD detection methods: As a baseline method we employ a variational autoencoder (VAE) trained on the similar data as the perception network (depth estimation) and use a reconstruction error based out of distribution measure. As a second approach, we choose to evaluate a method termed Likelihood Regret, which has been shown to be an efficient likelihood based OOD measure for VAEs. As a third approach, we evaluate another recently introduced method based on generative modelling termed SSD, which uses self-supervised representation learning followed by a distance based detection in the feature space, to calculate the outlier score. We compare all 3 methods and evaluate them concurrently with the error of an depth estimation network. Results show that while the reconstruction error based OOD metric is not able to differentiate between in and out of distribution data across all scenarios, the likelihood regret based OOD metric as well as the SSD outlier score perform fairly well in OOD detection. Their metrics are also highly correlated with perception error, rendering them promising candidates for an autonomous driving system reliability monitor.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Leveraging Interpretability: Concept-based Pedestrian Detection with Deep Neural Networks 利用可解释性:基于概念的深度神经网络行人检测
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493379
P. Feifel, Frank Bonarens, F. Köster
The automation of driving systems relies on proof of the correct functioning of perception. Arguing the safety of deep neural networks (DNNs) must involve quantifiable evidence. Currently, the application of DNNs suffers from an incomprehensible behavior. It is still an open question if post-hoc methods mitigate the safety concerns of trained DNNs. Our work proposes a method for inherently interpretable and concept-based pedestrian detection (CPD). CPD explicitly structures the latent space with concept vectors that learn features for body parts as predefined concepts. The distance-based clustering and separation of latent representations build an interpretable reasoning process. Hence, CPD predicts a body part segmentation based on distances of latent representations to concept vectors. A non-interpretable 2d bounding box prediction for pedestrians complements the segmentation. The proposed CPD generates additional information that can be of great value in a safety argumentation of a DNN for pedestrian detection. We report competitive performance for the task of pedestrian detection. Finally, CPD enables concept-based tests to quantify evidence of a safe perception in automated driving systems.
驾驶系统的自动化依赖于对感知功能正确运作的证明。论证深度神经网络(dnn)的安全性必须包含可量化的证据。目前,深度神经网络的应用存在一种不可理解的行为。这仍然是一个悬而未决的问题,如果事后方法减轻安全问题的训练dnn。我们的工作提出了一种固有可解释和基于概念的行人检测(CPD)方法。CPD明确地用概念向量来构建潜在空间,这些概念向量学习身体部位的特征作为预定义的概念。基于距离的聚类和潜在表征的分离构建了一个可解释的推理过程。因此,CPD基于潜在表示到概念向量的距离来预测身体部位分割。行人不可解释的2d边界框预测补充了分割。建议的CPD产生额外的信息,这些信息在深度神经网络用于行人检测的安全论证中具有很大的价值。我们报告了行人检测任务的竞争性表现。最后,CPD使基于概念的测试能够量化自动驾驶系统中安全感知的证据。
{"title":"Leveraging Interpretability: Concept-based Pedestrian Detection with Deep Neural Networks","authors":"P. Feifel, Frank Bonarens, F. Köster","doi":"10.1145/3488904.3493379","DOIUrl":"https://doi.org/10.1145/3488904.3493379","url":null,"abstract":"The automation of driving systems relies on proof of the correct functioning of perception. Arguing the safety of deep neural networks (DNNs) must involve quantifiable evidence. Currently, the application of DNNs suffers from an incomprehensible behavior. It is still an open question if post-hoc methods mitigate the safety concerns of trained DNNs. Our work proposes a method for inherently interpretable and concept-based pedestrian detection (CPD). CPD explicitly structures the latent space with concept vectors that learn features for body parts as predefined concepts. The distance-based clustering and separation of latent representations build an interpretable reasoning process. Hence, CPD predicts a body part segmentation based on distances of latent representations to concept vectors. A non-interpretable 2d bounding box prediction for pedestrians complements the segmentation. The proposed CPD generates additional information that can be of great value in a safety argumentation of a DNN for pedestrian detection. We report competitive performance for the task of pedestrian detection. Finally, CPD enables concept-based tests to quantify evidence of a safe perception in automated driving systems.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133241165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time Uncertainty Estimation Based On Intermediate Layer Variational Inference 基于中间层变分推理的实时不确定性估计
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493381
A. Hammam, S. E. Ghobadi, Frank Bonarens, C. Stiller
Deep neural networks have been the prominent approach for many computer vision tasks, excelling in solving many critical tasks. However, estimating the uncertainty of the network’s predictions has still been an open research question with various approaches, adding an edge to a deep neural network by providing more information about the predictions it is generating. Uncertainty estimation is deemed to be an important enabler for the future of automated driving systems, as its information could be needed for processing the vehicle’s next maneuver based on the uncertainty estimates of its perception module. In this paper, we propose a new approach by adding intermediate multivariate layers within a deep neural network aiming to provide much faster uncertainty estimations than the top two state-of-art approaches, MC Dropout and Deep Ensembles. A thorough comparison between the proposed approach and the two state-of-art approaches is presented to evaluate the new technique, assessing its speed, performance and calibration. Results show that the proposed uncertainty estimation method is significantly faster with the potential for real-time applications whilst exhibiting comparable performance to the state-of-art approaches.
深度神经网络已经成为许多计算机视觉任务的主要方法,在解决许多关键任务方面表现出色。然而,估计网络预测的不确定性仍然是一个开放的研究问题,有各种各样的方法,通过提供更多关于它正在生成的预测的信息来增加深度神经网络的优势。不确定性估计被认为是未来自动驾驶系统的重要推动因素,因为根据感知模块的不确定性估计,可能需要它的信息来处理车辆的下一次机动。在本文中,我们提出了一种新的方法,通过在深度神经网络中添加中间多元层,旨在提供比最先进的两种方法(MC Dropout和deep Ensembles)更快的不确定性估计。将所提出的方法与两种最先进的方法进行了全面的比较,以评估新技术,评估其速度,性能和校准。结果表明,所提出的不确定性估计方法明显更快,具有实时应用的潜力,同时表现出与最先进方法相当的性能。
{"title":"Real-time Uncertainty Estimation Based On Intermediate Layer Variational Inference","authors":"A. Hammam, S. E. Ghobadi, Frank Bonarens, C. Stiller","doi":"10.1145/3488904.3493381","DOIUrl":"https://doi.org/10.1145/3488904.3493381","url":null,"abstract":"Deep neural networks have been the prominent approach for many computer vision tasks, excelling in solving many critical tasks. However, estimating the uncertainty of the network’s predictions has still been an open research question with various approaches, adding an edge to a deep neural network by providing more information about the predictions it is generating. Uncertainty estimation is deemed to be an important enabler for the future of automated driving systems, as its information could be needed for processing the vehicle’s next maneuver based on the uncertainty estimates of its perception module. In this paper, we propose a new approach by adding intermediate multivariate layers within a deep neural network aiming to provide much faster uncertainty estimations than the top two state-of-art approaches, MC Dropout and Deep Ensembles. A thorough comparison between the proposed approach and the two state-of-art approaches is presented to evaluate the new technique, assessing its speed, performance and calibration. Results show that the proposed uncertainty estimation method is significantly faster with the potential for real-time applications whilst exhibiting comparable performance to the state-of-art approaches.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of electric mobility authentication approaches 电动汽车认证方法的评估
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493384
Henry Gadacz
For the public charging of Electric Vehicles (EVs), ISO 15118 specifies the Plug and Charge (PnC) approach. Unfortunately, PnC requires a quite complex Public Key Infrastructure (PKI) and completely lacks privacy-preserving measures. This work shows that other approaches from the literature and a novel introduced approach outperform PnC. All thirteen approaches were rated based on a developed evaluation methodology, regarding their security, usability, offered features and interoperability. For the best approaches recommendations regarding a more detailed analysis and comparison are given. These promising approaches should be further analyzed and more detailed specified, in order to mitigate current security flaws and offer the user a great and easy charging experience.
对于电动汽车(ev)的公共充电,ISO 15118规定了即插即用(PnC)方法。不幸的是,PnC需要相当复杂的公钥基础设施(PKI),并且完全缺乏隐私保护措施。这项工作表明,文献中的其他方法和一种新引入的方法优于PnC。所有13种方法都是根据开发的评估方法对其安全性、可用性、提供的功能和互操作性进行评级的。对于最佳方法,给出了有关更详细的分析和比较的建议。这些有前途的方法应该进一步分析和更详细地指定,以减轻当前的安全漏洞,并为用户提供一个伟大而简单的充电体验。
{"title":"Evaluation of electric mobility authentication approaches","authors":"Henry Gadacz","doi":"10.1145/3488904.3493384","DOIUrl":"https://doi.org/10.1145/3488904.3493384","url":null,"abstract":"For the public charging of Electric Vehicles (EVs), ISO 15118 specifies the Plug and Charge (PnC) approach. Unfortunately, PnC requires a quite complex Public Key Infrastructure (PKI) and completely lacks privacy-preserving measures. This work shows that other approaches from the literature and a novel introduced approach outperform PnC. All thirteen approaches were rated based on a developed evaluation methodology, regarding their security, usability, offered features and interoperability. For the best approaches recommendations regarding a more detailed analysis and comparison are given. These promising approaches should be further analyzed and more detailed specified, in order to mitigate current security flaws and offer the user a great and easy charging experience.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134065869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Following the White Rabbit: Integrity Verification Based on Risk Analysis Results 跟随大白兔:基于风险分析结果的完整性验证
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493377
Christine Jakobs, Matthias Werner, Karsten Schmidt, Gerhard Hansch
Security is a cross-cutting issue in the automotive development process. The nature of cross-cutting issues demands constant coordination between different stakeholders. Changes in the vehicle functionalities lead to reoccurring security analysis steps, rising the complexity of progress tracking. While those process steps are typically done on function level, the vehicle architecture has to be verified as a composite, too. This is mostly done late in the development process by testing. Thus, architectural mismatches between functionalities security demands are often revealed too late. Starting from the definition of integrity as a system property in the information flow, we present the link from the MoRA approach to the architectural modeling and analysis approach. Verifying the no command-up policy is transferred to the temporal logic TLA+ allowing an early and fast architecture verification.
安全是汽车开发过程中的一个交叉问题。跨领域问题的性质要求不同利益相关者之间不断协调。车辆功能的变化导致重复出现安全分析步骤,增加了进度跟踪的复杂性。虽然这些流程步骤通常是在功能级别上完成的,但车辆架构也必须作为一个组合进行验证。这主要是在开发过程的后期通过测试完成的。因此,功能和安全需求之间的体系结构不匹配往往发现得太晚了。从完整性作为信息流中的系统属性的定义开始,我们提出了从MoRA方法到体系结构建模和分析方法的链接。验证无命令启动策略被转移到临时逻辑TLA+,从而允许早期和快速的体系结构验证。
{"title":"Following the White Rabbit: Integrity Verification Based on Risk Analysis Results","authors":"Christine Jakobs, Matthias Werner, Karsten Schmidt, Gerhard Hansch","doi":"10.1145/3488904.3493377","DOIUrl":"https://doi.org/10.1145/3488904.3493377","url":null,"abstract":"Security is a cross-cutting issue in the automotive development process. The nature of cross-cutting issues demands constant coordination between different stakeholders. Changes in the vehicle functionalities lead to reoccurring security analysis steps, rising the complexity of progress tracking. While those process steps are typically done on function level, the vehicle architecture has to be verified as a composite, too. This is mostly done late in the development process by testing. Thus, architectural mismatches between functionalities security demands are often revealed too late. Starting from the definition of integrity as a system property in the information flow, we present the link from the MoRA approach to the architectural modeling and analysis approach. Verifying the no command-up policy is transferred to the temporal logic TLA+ allowing an early and fast architecture verification.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposing HEAVENS 2.0 – an automotive risk assessment model 提出 HEAVENS 2.0--汽车风险评估模型
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493378
Aljoscha Lautenbach, M. Almgren, T. Olovsson
Risk-based security models have seen a steady rise in popularity over the last decades, and several security risk assessment models have been proposed for the automotive industry. The new UN vehicle regulation 155 on cybersecurity provisions for vehicle type approval, as part of the 1958 agreement on vehicle harmonization, mandates the use of risk assessment to mitigate cybersecurity risks and is expected to be adopted into national laws in 54 countries within 1 to 3 years. This new legislation will also apply to autonomous vehicles. The automotive cybersecurity engineering standard ISO/SAE 21434 is seen as a way to fulfill the new UN legislation, so we can expect quick and wide industry adoption. One risk assessment model that has gained some popularity and is in active use in several companies is the HEAVENS model, but since ISO/SAE 21434 introduces additional requirements on the risk assessment process, the original HEAVENS model does not fulfill the standard. In this paper, we investigate the gap between the HEAVENS risk assessment model and ISO/SAE 21434, and we identify and propose 12 model updates to HEAVENS to close this gap. We also discuss identified weaknesses of the HEAVENS risk assessment model and propose 5 additional model updates to overcome them. In accordance with these 17 identified model updates, we propose HEAVENS 2.0, a new risk assessment model based on HEAVENS which is fully compliant with ISO/SAE 21434.
过去几十年来,基于风险的安全模型逐渐流行起来,并为汽车行业提出了多个安全风险评估模型。作为 1958 年车辆协调协议的一部分,新的联合国车辆法规 155 涉及车辆类型批准的网络安全规定,强制要求使用风险评估来降低网络安全风险,预计将在 1 到 3 年内被 54 个国家的国家法律所采纳。这项新立法也将适用于自动驾驶汽车。汽车网络安全工程标准 ISO/SAE 21434 被认为是履行联合国新立法的一种方式,因此我们可以期待行业快速、广泛地采用这一标准。HEAVENS 模型是一种风险评估模型,该模型已在一些公司得到广泛应用,但由于 ISO/SAE 21434 对风险评估流程提出了额外要求,因此最初的 HEAVENS 模型并不符合标准。在本文中,我们研究了 HEAVENS 风险评估模型与 ISO/SAE 21434 之间的差距,并确定和提出了 12 项 HEAVENS 模型更新,以弥补这一差距。我们还讨论了 HEAVENS 风险评估模型的不足之处,并提出了 5 项额外的模型更新以克服这些不足之处。根据这 17 项已确定的模型更新,我们提出了 HEAVENS 2.0,这是一个基于 HEAVENS 的新风险评估模型,完全符合 ISO/SAE 21434 标准。
{"title":"Proposing HEAVENS 2.0 – an automotive risk assessment model","authors":"Aljoscha Lautenbach, M. Almgren, T. Olovsson","doi":"10.1145/3488904.3493378","DOIUrl":"https://doi.org/10.1145/3488904.3493378","url":null,"abstract":"Risk-based security models have seen a steady rise in popularity over the last decades, and several security risk assessment models have been proposed for the automotive industry. The new UN vehicle regulation 155 on cybersecurity provisions for vehicle type approval, as part of the 1958 agreement on vehicle harmonization, mandates the use of risk assessment to mitigate cybersecurity risks and is expected to be adopted into national laws in 54 countries within 1 to 3 years. This new legislation will also apply to autonomous vehicles. The automotive cybersecurity engineering standard ISO/SAE 21434 is seen as a way to fulfill the new UN legislation, so we can expect quick and wide industry adoption. One risk assessment model that has gained some popularity and is in active use in several companies is the HEAVENS model, but since ISO/SAE 21434 introduces additional requirements on the risk assessment process, the original HEAVENS model does not fulfill the standard. In this paper, we investigate the gap between the HEAVENS risk assessment model and ISO/SAE 21434, and we identify and propose 12 model updates to HEAVENS to close this gap. We also discuss identified weaknesses of the HEAVENS risk assessment model and propose 5 additional model updates to overcome them. In accordance with these 17 identified model updates, we propose HEAVENS 2.0, a new risk assessment model based on HEAVENS which is fully compliant with ISO/SAE 21434.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126310265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing 车辆数据共享中隐私保护数据分析的去识别技术比较
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493380
Sascha Löbner, Frédéric Tronnier, Sebastian Pape, Kai Rannenberg
Vehicles are becoming interconnected and autonomous while collecting, sharing and processing large amounts of personal, and private data. When developing a service that relies on such data, ensuring privacy preserving data sharing and processing is one of the main challenges. Often several entities are involved in these steps and the interested parties are manifold. To ensure data privacy, a variety of different de-identification techniques exist that all exhibit unique peculiarities to be considered. In this paper, we show at the example of a location-based service for weather prediction of an energy grid operator, how the different de-identification techniques can be evaluated. With this, we aim to provide a better understanding of state-of-the-art de-identification techniques and the pitfalls to consider by implementation. Finally, we find that the optimal technique for a specific service depends highly on the scenario specifications and requirements.
车辆在收集、共享和处理大量个人和私人数据的同时,正在变得互联和自动。在开发依赖此类数据的服务时,确保隐私、保护数据共享和处理是主要挑战之一。这些步骤通常涉及几个实体,而有关各方是多方面的。为了确保数据隐私,存在各种不同的去识别技术,它们都表现出需要考虑的独特特性。在本文中,我们以能源电网运营商的基于位置的天气预报服务为例,展示了如何评估不同的去识别技术。因此,我们的目标是更好地理解最先进的去识别技术和实现时要考虑的陷阱。最后,我们发现针对特定服务的最佳技术高度依赖于场景规范和需求。
{"title":"Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing","authors":"Sascha Löbner, Frédéric Tronnier, Sebastian Pape, Kai Rannenberg","doi":"10.1145/3488904.3493380","DOIUrl":"https://doi.org/10.1145/3488904.3493380","url":null,"abstract":"Vehicles are becoming interconnected and autonomous while collecting, sharing and processing large amounts of personal, and private data. When developing a service that relies on such data, ensuring privacy preserving data sharing and processing is one of the main challenges. Often several entities are involved in these steps and the interested parties are manifold. To ensure data privacy, a variety of different de-identification techniques exist that all exhibit unique peculiarities to be considered. In this paper, we show at the example of a location-based service for weather prediction of an energy grid operator, how the different de-identification techniques can be evaluated. With this, we aim to provide a better understanding of state-of-the-art de-identification techniques and the pitfalls to consider by implementation. Finally, we find that the optimal technique for a specific service depends highly on the scenario specifications and requirements.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improved Sensor Model for Realistic Synthetic Data Generation 面向真实合成数据生成的改进传感器模型
Pub Date : 2021-11-30 DOI: 10.1145/3488904.3493383
Korbinian Hagn, O. Grau
Synthetic, i.e., computer generated-imagery (CGI) data is a key component for training and validating deep-learning-based perceptive functions due to its ability to simulate rare cases, avoidance of privacy issues and easy generation of huge datasets with pixel accurate ground-truth data. Recent simulation and rendering engines simulate already a wealth of realistic optical effects, but are mainly focused on the human perception system. But, perceptive functions require realistic images modeled with sensor artifacts as close as possible towards the sensor the training data has been recorded with. In this paper we propose a method to improve the data synthesis by introducing a more realistic sensor model that implements a number of sensor and lens artifacts. We further propose a Wasserstein distance (earth mover’s distance, EMD) based domain divergence measure and use it as minimization criterion to adapt the parameters of our sensor artifact simulation from synthetic to real images. With the optimized sensor parameters applied to the synthetic images for training, the mIoU of a semantic segmentation network (DeeplabV3+) solely trained on synthetic images is increased from 40.36% to 47.63%.
合成数据,即计算机生成图像(CGI)数据是训练和验证基于深度学习的感知函数的关键组成部分,因为它能够模拟罕见情况,避免隐私问题,并且易于生成具有像素精确的地面真实数据的大型数据集。最近的模拟和渲染引擎已经模拟了丰富的现实光学效果,但主要集中在人类感知系统。但是,感知函数要求用传感器伪影建模的逼真图像尽可能接近记录训练数据的传感器。在本文中,我们提出了一种改进数据合成的方法,通过引入一个更现实的传感器模型来实现许多传感器和镜头伪影。我们进一步提出了一种基于Wasserstein距离(土动器距离,EMD)的域散度度量,并将其作为最小化准则,使我们的传感器伪影仿真参数从合成图像适应真实图像。将优化后的传感器参数应用于合成图像进行训练后,仅对合成图像进行训练的语义分割网络(DeeplabV3+)的mIoU由40.36%提高到47.63%。
{"title":"Improved Sensor Model for Realistic Synthetic Data Generation","authors":"Korbinian Hagn, O. Grau","doi":"10.1145/3488904.3493383","DOIUrl":"https://doi.org/10.1145/3488904.3493383","url":null,"abstract":"Synthetic, i.e., computer generated-imagery (CGI) data is a key component for training and validating deep-learning-based perceptive functions due to its ability to simulate rare cases, avoidance of privacy issues and easy generation of huge datasets with pixel accurate ground-truth data. Recent simulation and rendering engines simulate already a wealth of realistic optical effects, but are mainly focused on the human perception system. But, perceptive functions require realistic images modeled with sensor artifacts as close as possible towards the sensor the training data has been recorded with. In this paper we propose a method to improve the data synthesis by introducing a more realistic sensor model that implements a number of sensor and lens artifacts. We further propose a Wasserstein distance (earth mover’s distance, EMD) based domain divergence measure and use it as minimization criterion to adapt the parameters of our sensor artifact simulation from synthetic to real images. With the optimized sensor parameters applied to the synthetic images for training, the mIoU of a semantic segmentation network (DeeplabV3+) solely trained on synthetic images is increased from 40.36% to 47.63%.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-scale Iterative Residuals for Fast and Scalable Stereo Matching 快速可扩展立体匹配的多尺度迭代残差
Pub Date : 2021-10-25 DOI: 10.1145/3488904.3493376
Kumail Raza, René Schuster, D. Stricker
Despite the remarkable progress of deep learning in stereo matching, there exists a gap in accuracy between real-time models and slower state-of-the-art models which are suitable for practical applications. This paper presents an iterative multi-scale coarse-to-fine refinement (iCFR) framework to bridge this gap by allowing it to adopt any stereo matching network to make it fast, more efficient and scalable while keeping comparable accuracy. To reduce the computational cost of matching, we use multi-scale warped features to estimate disparity residuals and push the disparity search range in the cost volume to a minimum limit. Finally, we apply a refinement network to recover the loss of precision which is inherent in multi-scale approaches. We test our iCFR framework by adopting the matching networks from state-of-the art GANet and AANet. The result is 49 × faster inference time compared to GANet-deep and 4 × less memory consumption, with comparable error. Our best performing network, which we call FRSNet is scalable even up to an input resolution of 6K on a GTX 1080Ti, with inference time still below one second and comparable accuracy to AANet+. It out-performs all real-time stereo methods and achieves competitive accuracy on the KITTI benchmark.
尽管深度学习在立体匹配方面取得了显著进展,但实时模型与适合实际应用的较慢的最先进模型在精度上存在差距。本文提出了一种迭代的多尺度粗到细细化(iCFR)框架,通过允许它采用任何立体匹配网络,使其快速,更高效和可扩展,同时保持相当的精度,从而弥补了这一差距。为了降低匹配的计算成本,我们使用多尺度扭曲特征来估计视差残差,并将代价体积中的视差搜索范围推至最小。最后,我们应用一个改进网络来恢复多尺度方法固有的精度损失。我们通过采用最先进的GANet和AANet的匹配网络来测试我们的iCFR框架。结果是推理时间比GANet-deep快49倍,内存消耗减少4倍,误差相当。我们表现最好的网络,我们称之为FRSNet,在GTX 1080Ti上甚至可以扩展到6K的输入分辨率,推理时间仍然低于一秒,精度与AANet+相当。它优于所有实时立体方法,并在KITTI基准上达到具有竞争力的精度。
{"title":"Multi-scale Iterative Residuals for Fast and Scalable Stereo Matching","authors":"Kumail Raza, René Schuster, D. Stricker","doi":"10.1145/3488904.3493376","DOIUrl":"https://doi.org/10.1145/3488904.3493376","url":null,"abstract":"Despite the remarkable progress of deep learning in stereo matching, there exists a gap in accuracy between real-time models and slower state-of-the-art models which are suitable for practical applications. This paper presents an iterative multi-scale coarse-to-fine refinement (iCFR) framework to bridge this gap by allowing it to adopt any stereo matching network to make it fast, more efficient and scalable while keeping comparable accuracy. To reduce the computational cost of matching, we use multi-scale warped features to estimate disparity residuals and push the disparity search range in the cost volume to a minimum limit. Finally, we apply a refinement network to recover the loss of precision which is inherent in multi-scale approaches. We test our iCFR framework by adopting the matching networks from state-of-the art GANet and AANet. The result is 49 × faster inference time compared to GANet-deep and 4 × less memory consumption, with comparable error. Our best performing network, which we call FRSNet is scalable even up to an input resolution of 6K on a GTX 1080Ti, with inference time still below one second and comparable accuracy to AANet+. It out-performs all real-time stereo methods and achieves competitive accuracy on the KITTI benchmark.","PeriodicalId":332312,"journal":{"name":"Proceedings of the 5th ACM Computer Science in Cars Symposium","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 5th ACM Computer Science in Cars Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1