首页 > 最新文献

2021 10th Latin-American Symposium on Dependable Computing (LADC)最新文献

英文 中文
Bitvector Support in the Theta Formal Verification Framework Theta正式验证框架中的位向量支持
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672595
M. Dobos-Kovács, Á. Hajdu, András Vörös
The verification of safety-critical software systems has many challenges, such as the complex language constructs in embedded software. This paper addresses the verification problem of software systems using bitwise operations, and we present an extension to the Theta open-source formal verification framework. Our goal is to integrate bitvectors and bitwise operations in the abstraction-refinement-based formal verification methods in Theta. Supporting bitvectors is a step towards the verification of industrial embedded software systems. We extended the language support in Theta with formal semantics. In addition, the new language constructs and operators are transformed into the formal language inside Theta. We also need new algorithms to solve the verification problem: we implemented Newton-style refinement algorithms in Theta to verify software with bitvectors and bitwise operators efficiently.
安全关键型软件系统的验证面临着许多挑战,例如嵌入式软件中复杂的语言结构。本文讨论了使用位运算的软件系统的验证问题,并提出了Theta开源正式验证框架的扩展。我们的目标是在Theta中基于抽象精化的形式化验证方法中集成位向量和位运算。支持位向量是向工业嵌入式软件系统验证迈出的一步。我们用形式语义扩展了Theta中的语言支持。此外,新的语言结构和运算符被转换成Theta内部的形式语言。我们还需要新的算法来解决验证问题:我们在Theta中实现了牛顿式的改进算法,以有效地使用位向量和位运算符验证软件。
{"title":"Bitvector Support in the Theta Formal Verification Framework","authors":"M. Dobos-Kovács, Á. Hajdu, András Vörös","doi":"10.1109/ladc53747.2021.9672595","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672595","url":null,"abstract":"The verification of safety-critical software systems has many challenges, such as the complex language constructs in embedded software. This paper addresses the verification problem of software systems using bitwise operations, and we present an extension to the Theta open-source formal verification framework. Our goal is to integrate bitvectors and bitwise operations in the abstraction-refinement-based formal verification methods in Theta. Supporting bitvectors is a step towards the verification of industrial embedded software systems. We extended the language support in Theta with formal semantics. In addition, the new language constructs and operators are transformed into the formal language inside Theta. We also need new algorithms to solve the verification problem: we implemented Newton-style refinement algorithms in Theta to verify software with bitvectors and bitwise operators efficiently.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122893972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Down-to-Earth Scheduling Strategy for Dense SINR Wireless Networks 密集SINR无线网络的实用化调度策略
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672559
Fábio Engel De Camargo, E. P. Duarte
This work presents a scheduling strategy for wireless networks under the Signal-to-Interference-plus-Noise Ratio (SINR) model. This model employs the signal-to-noise ratio and the cumulative interference of simultaneous communications as a criterion to determine whether a transmission can be correctly received at the destination. As an advantage, the SINR model allows spatial reuse, i.e., given certain conditions, concurrent communication between multiple devices is possible, even if they are all within the coverage areas of one other. The strategy proposed in this work estimates the interference at the receivers, to determine which sets of devices can transmit simultaneously. The strategy assumes that devices know their positions on the plane and is based on a heuristic according to which transmissions only occur to the closest device. The cumulative interference at receivers is determined based on the analysis of the communications between pairs of devices. The output is a schedule that determines which devices can communicate on consecutive time slots. The strategy was evaluated through simulation, for networks of different densities. Results attest to the effectiveness of the schedules obtained.
提出了一种基于信噪比(SINR)模型的无线网络调度策略。该模型采用信噪比和同步通信的累积干扰作为判断传输是否能在目的地正确接收的标准。作为一个优势,SINR模型允许空间重用,即,在特定条件下,多个设备之间的并发通信是可能的,即使它们都在另一个设备的覆盖范围内。本文提出的策略是估计接收端的干扰,以确定哪组设备可以同时传输。该策略假设设备知道它们在平面上的位置,并基于启发式,根据启发式,传输只发生在最近的设备上。接收机的累积干扰是通过分析设备对之间的通信来确定的。输出是一个调度,它确定哪些设备可以在连续的时隙上通信。针对不同密度的网络,对该策略进行了仿真评估。结果证明了所获得的时间表的有效性。
{"title":"A Down-to-Earth Scheduling Strategy for Dense SINR Wireless Networks","authors":"Fábio Engel De Camargo, E. P. Duarte","doi":"10.1109/ladc53747.2021.9672559","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672559","url":null,"abstract":"This work presents a scheduling strategy for wireless networks under the Signal-to-Interference-plus-Noise Ratio (SINR) model. This model employs the signal-to-noise ratio and the cumulative interference of simultaneous communications as a criterion to determine whether a transmission can be correctly received at the destination. As an advantage, the SINR model allows spatial reuse, i.e., given certain conditions, concurrent communication between multiple devices is possible, even if they are all within the coverage areas of one other. The strategy proposed in this work estimates the interference at the receivers, to determine which sets of devices can transmit simultaneously. The strategy assumes that devices know their positions on the plane and is based on a heuristic according to which transmissions only occur to the closest device. The cumulative interference at receivers is determined based on the analysis of the communications between pairs of devices. The output is a schedule that determines which devices can communicate on consecutive time slots. The strategy was evaluated through simulation, for networks of different densities. Results attest to the effectiveness of the schedules obtained.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"34 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
STAMP: Organization 邮票:组织
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672571
{"title":"STAMP: Organization","authors":"","doi":"10.1109/ladc53747.2021.9672571","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672571","url":null,"abstract":"","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130644138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WAFERS: Welcome Message 晶圆饼:欢迎辞
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672553
{"title":"WAFERS: Welcome Message","authors":"","doi":"10.1109/ladc53747.2021.9672553","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672553","url":null,"abstract":"","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127708955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Performance of Using Parallel State Machine Replication to Implement Blockchains 利用并行状态机复制实现区块链的性能研究
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672588
Aldenio Burgos, E. Alchieri, F. Dotti
State Machine Replication (SMR) and blockchains share the same goal of keeping a consistent state replicated across a set of replicas. However, there are some subtle differences between these techniques. In particular, using a SMR framework as a building block to implement blockchains significantly impacts performance due to the sequential execution model of traditional SMRs, i.e., all transactions are sequentially executed. This work presents a case study about the use of a parallel SMR (PSMR) to implement blockchains. In a PSMR, some transactions can be executed in parallel, for instance those addressed to different accounts. More specifically, we implemented a payment system and conducted a set of experiments to show that, by using a PSMR, it is possible to circumvent the previously described performance limitation, i.e., the performance of the resulting system increases substantially, i.e., up to 22×, when compared to a traditional sequential SMR.
状态机复制(SMR)和区块链具有相同的目标,即在一组副本中保持一致的状态复制。然而,这些技术之间存在一些微妙的差异。特别是,使用SMR框架作为构建块来实现区块链,由于传统SMR的顺序执行模型,即所有事务都是顺序执行的,因此会显著影响性能。这项工作提出了一个关于使用并行SMR (PSMR)来实现区块链的案例研究。在PSMR中,一些事务可以并行执行,例如那些发送到不同帐户的事务。更具体地说,我们实现了一个支付系统,并进行了一组实验,以表明,通过使用PSMR,有可能绕过前面描述的性能限制,即,与传统的顺序SMR相比,最终系统的性能大幅提高,即高达22倍。
{"title":"On the Performance of Using Parallel State Machine Replication to Implement Blockchains","authors":"Aldenio Burgos, E. Alchieri, F. Dotti","doi":"10.1109/ladc53747.2021.9672588","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672588","url":null,"abstract":"State Machine Replication (SMR) and blockchains share the same goal of keeping a consistent state replicated across a set of replicas. However, there are some subtle differences between these techniques. In particular, using a SMR framework as a building block to implement blockchains significantly impacts performance due to the sequential execution model of traditional SMRs, i.e., all transactions are sequentially executed. This work presents a case study about the use of a parallel SMR (PSMR) to implement blockchains. In a PSMR, some transactions can be executed in parallel, for instance those addressed to different accounts. More specifically, we implemented a payment system and conducted a set of experiments to show that, by using a PSMR, it is possible to circumvent the previously described performance limitation, i.e., the performance of the resulting system increases substantially, i.e., up to 22×, when compared to a traditional sequential SMR.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133742487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feature Rankers to Predict Classification Performance of Unsupervised Intrusion Detectors 特征秩预测无监督入侵检测器的分类性能
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672586
T. Zoppi, A. Ceccarelli, A. Bondavalli
An anomaly-based Intrusion Detection System (IDS) consists of a monitor and a binary classifier, in which monitored system indicators are fed into a Machine Learning (ML) algorithm that detects anomalies due to attacks. Building such an IDS for a target system requires first to define a strategy to monitor features, then to select and evaluate many ML algorithms to find the most suitable candidate. Noticeably, features that do not fluctuate enough when attacks happen will negatively affect detection performance. In this paper we propose a strategy to predict the classification performance of unsupervised anomaly-based intrusion detectors without any knowledge or execution of the ML algorithm. We experimentally verify that individual scores assigned to features by filter and wrapper-based feature rankers can be used to predict the classification performance of anomaly detectors. Particularly, we detail, explain and motivate how feeding scores of feature rankers into a Random Forest regressor allows predicting the value of common evaluation metrics for anomaly detectors as F1 or MCC with average of relative residuals lower than 15%, and how to take advantage of our prediction strategy in different scenarios.
基于异常的入侵检测系统(IDS)由监视器和二元分类器组成,其中被监控的系统指标被馈送到机器学习(ML)算法中,该算法检测由攻击引起的异常。为目标系统构建这样的IDS需要首先定义一个监视特征的策略,然后选择和评估许多ML算法,以找到最合适的候选算法。值得注意的是,当攻击发生时,特征波动不够大会对检测性能产生负面影响。在本文中,我们提出了一种策略来预测无监督的基于异常的入侵检测器的分类性能,而不需要任何知识或执行ML算法。我们通过实验验证了由过滤器和基于包装的特征排序器分配给特征的个体分数可以用来预测异常检测器的分类性能。特别是,我们详细说明,解释和激励如何将特征排序器的分数输入随机森林回归器,以便预测异常检测器的常见评估指标的值,如F1或MCC,平均相对残差低于15%,以及如何在不同场景中利用我们的预测策略。
{"title":"Feature Rankers to Predict Classification Performance of Unsupervised Intrusion Detectors","authors":"T. Zoppi, A. Ceccarelli, A. Bondavalli","doi":"10.1109/ladc53747.2021.9672586","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672586","url":null,"abstract":"An anomaly-based Intrusion Detection System (IDS) consists of a monitor and a binary classifier, in which monitored system indicators are fed into a Machine Learning (ML) algorithm that detects anomalies due to attacks. Building such an IDS for a target system requires first to define a strategy to monitor features, then to select and evaluate many ML algorithms to find the most suitable candidate. Noticeably, features that do not fluctuate enough when attacks happen will negatively affect detection performance. In this paper we propose a strategy to predict the classification performance of unsupervised anomaly-based intrusion detectors without any knowledge or execution of the ML algorithm. We experimentally verify that individual scores assigned to features by filter and wrapper-based feature rankers can be used to predict the classification performance of anomaly detectors. Particularly, we detail, explain and motivate how feeding scores of feature rankers into a Random Forest regressor allows predicting the value of common evaluation metrics for anomaly detectors as F1 or MCC with average of relative residuals lower than 15%, and how to take advantage of our prediction strategy in different scenarios.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116786721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WSENSING: Welcome Message WSENSING:欢迎留言
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672560
{"title":"WSENSING: Welcome Message","authors":"","doi":"10.1109/ladc53747.2021.9672560","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672560","url":null,"abstract":"","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117212129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstrator for dependable edge-based cyber-physical systems 可靠的边缘网络物理系统演示器
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672569
S. Nagy, Richárd Szabó, Máté Levente Vajda, András Vörös
Dependable cyber-physical systems (CPS) are increasingly used in various application fields, such as urban mobility, smart city, industrial IoT and telecommunication. Beside functional requirements, dependable CPS systems have to meet several extra-functional requirements such as reliability, availability, fault-tolerance and performance. The complexity of modern CPS systems significantly increased since the extensive use of distributed services, redundant architectures and advanced safety mechanisms. In addition, several new technologies have emerged in the edge, such as embedded GPU-s, AI acceleration and virtualisation tools, which enhance the extra-functional properties, such as latency and performance of dependable CPS systems. Because of the increased complexity and the cutting edge technologies, evaluating the extra-functional requirements becomes difficult for modern CPS systems. Consequently, several new analysis techniques have also been developed. We developed an open-source demonstrator for dependable edge-based CPS systems in the field of smart city and urban mobility. With the demonstrator, the researchers can compare and evaluate different technologies, safety mechanisms and analysis techniques. The demonstrator consists of several emerging technologies such as hardware accelerators, load-balance mechanisms, containerisation and container deployment tools. The architecture of the demonstrator was developed following the edge computing paradigm and model-driven engineering approach. The demonstrator contains distributed redundant and fault-tolerant services. We also developed a hardware-in-the-loop (HIL) test environment to simulate various environmental scenarios and evaluate extra-functional properties.
可靠的网络物理系统(CPS)越来越多地应用于城市交通、智慧城市、工业物联网和电信等各个应用领域。除了功能需求,可靠的CPS系统还必须满足一些额外的功能需求,如可靠性、可用性、容错性和性能。由于广泛使用分布式服务、冗余架构和先进的安全机制,现代CPS系统的复杂性大大增加。此外,一些新技术已经出现在边缘,如嵌入式gpu、人工智能加速和虚拟化工具,它们增强了额外的功能属性,如可靠的CPS系统的延迟和性能。由于复杂性和尖端技术的增加,评估现代CPS系统的额外功能需求变得困难。因此,一些新的分析技术也被开发出来。我们为智慧城市和城市交通领域可靠的基于边缘的CPS系统开发了一个开源演示器。通过该演示器,研究人员可以比较和评估不同的技术、安全机制和分析技术。该演示由几种新兴技术组成,如硬件加速器、负载平衡机制、容器化和容器部署工具。演示器的架构是根据边缘计算范式和模型驱动工程方法开发的。演示器包含分布式冗余和容错服务。我们还开发了一个硬件在环(HIL)测试环境来模拟各种环境场景并评估额外的功能特性。
{"title":"Demonstrator for dependable edge-based cyber-physical systems","authors":"S. Nagy, Richárd Szabó, Máté Levente Vajda, András Vörös","doi":"10.1109/ladc53747.2021.9672569","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672569","url":null,"abstract":"Dependable cyber-physical systems (CPS) are increasingly used in various application fields, such as urban mobility, smart city, industrial IoT and telecommunication. Beside functional requirements, dependable CPS systems have to meet several extra-functional requirements such as reliability, availability, fault-tolerance and performance. The complexity of modern CPS systems significantly increased since the extensive use of distributed services, redundant architectures and advanced safety mechanisms. In addition, several new technologies have emerged in the edge, such as embedded GPU-s, AI acceleration and virtualisation tools, which enhance the extra-functional properties, such as latency and performance of dependable CPS systems. Because of the increased complexity and the cutting edge technologies, evaluating the extra-functional requirements becomes difficult for modern CPS systems. Consequently, several new analysis techniques have also been developed. We developed an open-source demonstrator for dependable edge-based CPS systems in the field of smart city and urban mobility. With the demonstrator, the researchers can compare and evaluate different technologies, safety mechanisms and analysis techniques. The demonstrator consists of several emerging technologies such as hardware accelerators, load-balance mechanisms, containerisation and container deployment tools. The architecture of the demonstrator was developed following the edge computing paradigm and model-driven engineering approach. The demonstrator contains distributed redundant and fault-tolerant services. We also developed a hardware-in-the-loop (HIL) test environment to simulate various environmental scenarios and evaluate extra-functional properties.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120845431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Home Care: Towards Supporting Elderlies in the Comfort and Safety of their (Smart) Homes 智能家居护理:为长者提供舒适及安全的(智能)家居服务
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672565
Igor Zavalyshyn, Axel Legay, A. Rath, E. Rivière
The aging of the population will be a major challenge in the coming years and will lead to massive changes related to aging peoples' safety, social inclusion, and well-being. The nature of the aid provided to elderly people is already changing, with a shift towards home care (assisted living) as compared to traditional care homes. In this position paper, we highlight the need for appropriate home automation and support systems that ensure the safety and well-being of aging occupants and maintain their social links with various people around them. Existing smart home systems do not meet all the requirements and safety features required for this purpose, in particular in terms of usability, privacy, and security. We describe the challenges the research community and the industry will need to address when designing smart home care systems and lay out a research agenda that we hope will stir more work in this important emerging area.
人口老龄化将是未来几年的一项重大挑战,并将导致与老年人的安全、社会包容和福祉相关的巨大变化。向老年人提供的援助的性质已经发生了变化,与传统的养老院相比,家庭护理(辅助生活)正在转变。在这份立场文件中,我们强调需要适当的家庭自动化和支持系统,以确保老年居住者的安全和福祉,并保持他们与周围各种人的社会联系。现有的智能家居系统并不能满足这一目的所需的所有要求和安全功能,特别是在可用性、隐私性和安全性方面。我们描述了研究界和行业在设计智能家居护理系统时需要解决的挑战,并制定了一个研究议程,我们希望能在这个重要的新兴领域激发更多的工作。
{"title":"Smart Home Care: Towards Supporting Elderlies in the Comfort and Safety of their (Smart) Homes","authors":"Igor Zavalyshyn, Axel Legay, A. Rath, E. Rivière","doi":"10.1109/ladc53747.2021.9672565","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672565","url":null,"abstract":"The aging of the population will be a major challenge in the coming years and will lead to massive changes related to aging peoples' safety, social inclusion, and well-being. The nature of the aid provided to elderly people is already changing, with a shift towards home care (assisted living) as compared to traditional care homes. In this position paper, we highlight the need for appropriate home automation and support systems that ensure the safety and well-being of aging occupants and maintain their social links with various people around them. Existing smart home systems do not meet all the requirements and safety features required for this purpose, in particular in terms of usability, privacy, and security. We describe the challenges the research community and the industry will need to address when designing smart home care systems and lay out a research agenda that we hope will stir more work in this important emerging area.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cybersecurity in Aviation: the STPA-Sec Method Applied to the TCAS Security 航空网络安全:STPA-Sec方法在TCAS安全中的应用
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672578
Mayara Lopes Salgado, M. Sousa
This work presents the cybersecurity theme in the aviation ecosystem and a case study for the application of the STPA-Sec method, in the TCAS (Traffic Collision Avoidance System). The aviation community is benefiting from new levels of digitization and connectivity, but the effectiveness gained by increased digitization has led to increased levels of system vulnerabilities. Therefore, the work is focused on the application of the STPA method, aiming to increase security from the point of view of planned attacks, that is, intentional attacks, sabotage, malicious aircraft interference and how these attacks relate to events unplanned or unintended ralated to the “ghost aircraft” vulnerability of the TCAS. The STPA applied to neutralize the TCAS ghost aircraft attacks pointed out that the air collision avoidance system is a critical system as it involves loss of life or human injury, loss of critical data, damage to the aircraft, inability to complete primary missions, loss of customer satisfaction and loss of airline reputation. In this sense, the work highlights the importance of the role of STPA-Sec method in improving aircraft security and motivates redesign and updates to TCAS.
这项工作提出了航空生态系统中的网络安全主题,以及在TCAS(交通避碰系统)中应用STPA-Sec方法的案例研究。航空界正受益于数字化和连通性的新水平,但数字化提高所带来的有效性也导致了系统脆弱性的增加。因此,工作重点是STPA方法的应用,旨在从计划攻击的角度增加安全性,即故意攻击,破坏,恶意飞机干扰以及这些攻击如何与计划外或无意中与TCAS“幽灵飞机”漏洞相关的事件联系起来。针对TCAS“鬼机”攻击的STPA指出,空中避碰系统是一个涉及人员伤亡、关键数据丢失、飞机损坏、无法完成主要任务、客户满意度下降和航空公司声誉损失的关键系统。从这个意义上说,这项工作强调了STPA-Sec方法在提高飞机安全性方面的重要性,并激励了TCAS的重新设计和更新。
{"title":"Cybersecurity in Aviation: the STPA-Sec Method Applied to the TCAS Security","authors":"Mayara Lopes Salgado, M. Sousa","doi":"10.1109/ladc53747.2021.9672578","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672578","url":null,"abstract":"This work presents the cybersecurity theme in the aviation ecosystem and a case study for the application of the STPA-Sec method, in the TCAS (Traffic Collision Avoidance System). The aviation community is benefiting from new levels of digitization and connectivity, but the effectiveness gained by increased digitization has led to increased levels of system vulnerabilities. Therefore, the work is focused on the application of the STPA method, aiming to increase security from the point of view of planned attacks, that is, intentional attacks, sabotage, malicious aircraft interference and how these attacks relate to events unplanned or unintended ralated to the “ghost aircraft” vulnerability of the TCAS. The STPA applied to neutralize the TCAS ghost aircraft attacks pointed out that the air collision avoidance system is a critical system as it involves loss of life or human injury, loss of critical data, damage to the aircraft, inability to complete primary missions, loss of customer satisfaction and loss of airline reputation. In this sense, the work highlights the importance of the role of STPA-Sec method in improving aircraft security and motivates redesign and updates to TCAS.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 10th Latin-American Symposium on Dependable Computing (LADC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1