首页 > 最新文献

2021 10th Latin-American Symposium on Dependable Computing (LADC)最新文献

英文 中文
Characterizing and Injecting Faults in Executable Models Specified with fUML 在用uml指定的可执行模型中描述和注入错误
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672596
Guilherme W. Lopes, Leonardo Montecchi
Fault Injection (FI) is a well-known system verification technique, in which faults are artificially introduced into a system, to assess its behavior in exceptional conditions. FI can be applied at different levels, including physical, hardware and software. FI has also been applied at model level, although the amount of work in this direction is limited. However, the importance of models in the development of complex systems is growing, pushing towards model-level verification and sim-ulations. The Foundational UML (fUML) is a specific subset of UML, released as an OMG standard, that has a precise execution semantics and can therefore be executed. In this paper we investigate the application of FI to executable models specified with fUML. We first characterize the kind of fault that may be applied to fUML models, and then we realize an injection mechanisms based on automated model transformation. We apply the methodology to a simple example in the space domain, adapted from a real satellite system. We believe this is an important first step for the adoption of FI techniques on fUML models, for an early detection of design flaws. We conclude discussing some challenges and directions for future work.
故障注入(FI)是一种众所周知的系统验证技术,其中人为地将故障引入系统中,以评估其在异常情况下的行为。FI可以应用于不同的层面,包括物理、硬件和软件。FI也被应用于模型级别,尽管在这方面的工作量是有限的。然而,模型在复杂系统开发中的重要性越来越大,推动了模型级验证和仿真。基础UML (fUML)是UML的一个特定子集,作为OMG标准发布,它具有精确的执行语义,因此可以执行。本文研究了FI在用uml指定的可执行模型中的应用。首先描述了可能应用于uml模型的故障类型,然后实现了一种基于自动模型转换的注入机制。我们将该方法应用于空间域的一个简单实例,该实例改编自一个真实的卫星系统。我们相信这是在fUML模型上采用FI技术的重要的第一步,可以早期发现设计缺陷。最后讨论了今后工作的挑战和方向。
{"title":"Characterizing and Injecting Faults in Executable Models Specified with fUML","authors":"Guilherme W. Lopes, Leonardo Montecchi","doi":"10.1109/ladc53747.2021.9672596","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672596","url":null,"abstract":"Fault Injection (FI) is a well-known system verification technique, in which faults are artificially introduced into a system, to assess its behavior in exceptional conditions. FI can be applied at different levels, including physical, hardware and software. FI has also been applied at model level, although the amount of work in this direction is limited. However, the importance of models in the development of complex systems is growing, pushing towards model-level verification and sim-ulations. The Foundational UML (fUML) is a specific subset of UML, released as an OMG standard, that has a precise execution semantics and can therefore be executed. In this paper we investigate the application of FI to executable models specified with fUML. We first characterize the kind of fault that may be applied to fUML models, and then we realize an injection mechanisms based on automated model transformation. We apply the methodology to a simple example in the space domain, adapted from a real satellite system. We believe this is an important first step for the adoption of FI techniques on fUML models, for an early detection of design flaws. We conclude discussing some challenges and directions for future work.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAST Applied to Covid-19 Pandemic in Brazil CAST在巴西Covid-19大流行中的应用
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672568
E. R. Bortoloto, Talitha C. De Oliveira, C. Lahoz, F. Abrahão
This work presents the results of CAST (Causal Analysis using Systems Theory) application, technique initially created to understand the aerospace accidents root causes, to identify the main reasons that may have contributed to the considerable amount of human deaths caused by the Coronavirus pandemic in Brazil. Through the CAST process, it was possible to identify the dangers involved in safety control mechanisms related to the pandemic and its health implications, understanding the events that allowed this occurrence, identifying why the components related to the system's safety were not effective and, suggest mechanisms that reinforce safety controls at national and global levels, in order to avoid or mitigate similar losses related to pandemics in future events. The steps established in the CAST structured approach, allowed to analyze the factors that contributed to the high number of human deaths, obtaining a greater amount of information and details, used in the elaboration of improvement proposals to face the problem, mainly with regard to the health system.
这项工作介绍了CAST(使用系统理论的因果分析)应用程序的结果,该技术最初是为了了解航空航天事故的根本原因而创建的,以确定可能导致巴西冠状病毒大流行造成大量人类死亡的主要原因。通过CAST进程,有可能确定与大流行病及其对健康的影响有关的安全控制机制所涉及的危险,了解导致这种情况发生的事件,确定与系统安全有关的组成部分不有效的原因,并提出加强国家和全球一级安全控制的机制,以避免或减轻未来事件中与大流行病有关的类似损失。CAST结构化方法中确定的步骤允许分析导致大量人类死亡的因素,获得更多的信息和细节,用于制定改进建议,以面对这一问题,主要是关于卫生系统。
{"title":"CAST Applied to Covid-19 Pandemic in Brazil","authors":"E. R. Bortoloto, Talitha C. De Oliveira, C. Lahoz, F. Abrahão","doi":"10.1109/ladc53747.2021.9672568","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672568","url":null,"abstract":"This work presents the results of CAST (Causal Analysis using Systems Theory) application, technique initially created to understand the aerospace accidents root causes, to identify the main reasons that may have contributed to the considerable amount of human deaths caused by the Coronavirus pandemic in Brazil. Through the CAST process, it was possible to identify the dangers involved in safety control mechanisms related to the pandemic and its health implications, understanding the events that allowed this occurrence, identifying why the components related to the system's safety were not effective and, suggest mechanisms that reinforce safety controls at national and global levels, in order to avoid or mitigate similar losses related to pandemics in future events. The steps established in the CAST structured approach, allowed to analyze the factors that contributed to the high number of human deaths, obtaining a greater amount of information and details, used in the elaboration of improvement proposals to face the problem, mainly with regard to the health system.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123858611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Robustness Assessment Methodology for IoT Systems 迈向物联网系统稳健性评估方法
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672573
Bruno A. Jesus, Glauber Leite, Nuno Antunes
Internet-based systems are definitely present in people's daily lives, helping to perform various activities and providing greater comfort and ease in communication. In this context of diversification, every day more devices have access to the network, further increasing the reach and distribution of information around the world, including IoT systems, which are critical in some scenarios. In this context, this paper proposes a methodology to assess the robustness of an IoT System, based on a scenario with an automated system for growing vegetables that was initially designed for residential scale but which can be adapted for industrial scale. We use components commonly used in IoT systems, which facilitates scalability and allows for robustness testing. We aim to test the robustness of these components by creating a test case methodology and performing many test cases for each endpoint. From this analysis we intend to improve security mechanisms in IoT environments with characteristics similar to the proposed scenario. Finally, we will check the behavior of the software components in the presence of errors and problems with the data sent.
基于互联网的系统确实存在于人们的日常生活中,帮助完成各种活动,并提供更大的舒适和方便的交流。在这种多样化的背景下,每天都有更多的设备可以访问网络,进一步增加了世界各地信息的覆盖范围和分布,包括物联网系统,这在某些情况下至关重要。在此背景下,本文提出了一种评估物联网系统稳健性的方法,该方法基于一个自动化蔬菜种植系统的场景,该系统最初是为住宅规模设计的,但可以适应工业规模。我们使用物联网系统中常用的组件,这有助于可扩展性并允许鲁棒性测试。我们的目标是通过创建测试用例方法并为每个端点执行许多测试用例来测试这些组件的健壮性。根据这一分析,我们打算改进物联网环境中的安全机制,其特征与提议的场景相似。最后,我们将在发送的数据存在错误和问题时检查软件组件的行为。
{"title":"Towards a Robustness Assessment Methodology for IoT Systems","authors":"Bruno A. Jesus, Glauber Leite, Nuno Antunes","doi":"10.1109/ladc53747.2021.9672573","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672573","url":null,"abstract":"Internet-based systems are definitely present in people's daily lives, helping to perform various activities and providing greater comfort and ease in communication. In this context of diversification, every day more devices have access to the network, further increasing the reach and distribution of information around the world, including IoT systems, which are critical in some scenarios. In this context, this paper proposes a methodology to assess the robustness of an IoT System, based on a scenario with an automated system for growing vegetables that was initially designed for residential scale but which can be adapted for industrial scale. We use components commonly used in IoT systems, which facilitates scalability and allows for robustness testing. We aim to test the robustness of these components by creating a test case methodology and performing many test cases for each endpoint. From this analysis we intend to improve security mechanisms in IoT environments with characteristics similar to the proposed scenario. Finally, we will check the behavior of the software components in the presence of errors and problems with the data sent.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposal of a Dynamic Routing Multicast Protocol for Visible Light Communication Networks 一种可见光通信网络动态路由组播协议的提出
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672566
Frederico O. Sales, E. F. Silva, A. Vieira, M. Vieira, L. Vieira
Wireless networks have grown since the 2000s. Compelling to rethink the way to enrich the possibilities to outflow the network traffic and its coverage. Current Visible Light Communication (VLC) systems focus mainly on wireless solutions. Converting multicast to unicast. Because of it, we propose an evolution of unicast and multi-hop wireless Optical Wireless Communication (OWC) supporting multicast communication in VLC environments, called MCAST-VLC. MCAST-VLC is a cross-layer dynamic routing protocol for VLC scenery, considering some particular characteristics of this area. Our proposal comprises the need for group management, traffic isolation, multi-hop route discovery protocol. We evaluate our protocol in a VLC environment, following a close indoor VLC. Our results evidence that multicast protocol over visible light communication can handle three more network flows than a simple unicast under a negligible overhead to maintain the multicast characteristics.
自2000年代以来,无线网络一直在发展。迫切需要重新思考如何丰富流出网络流量及其覆盖范围的可能性。当前的可见光通信(VLC)系统主要集中在无线解决方案上。将组播转换为单播。因此,我们提出了一种支持VLC环境下组播通信的单播和多跳无线光通信(OWC)的演进,称为MCAST-VLC。MCAST-VLC是一种针对VLC场景的跨层动态路由协议,考虑了该区域的一些特点。我们的建议包括组管理、流量隔离、多跳路由发现协议的需求。我们在近距离的室内VLC环境中评估我们的协议。我们的结果证明,在可见光通信上的多播协议可以处理比简单的单播多三个网络流,而开销可以忽略不计,以保持多播特性。
{"title":"A Proposal of a Dynamic Routing Multicast Protocol for Visible Light Communication Networks","authors":"Frederico O. Sales, E. F. Silva, A. Vieira, M. Vieira, L. Vieira","doi":"10.1109/ladc53747.2021.9672566","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672566","url":null,"abstract":"Wireless networks have grown since the 2000s. Compelling to rethink the way to enrich the possibilities to outflow the network traffic and its coverage. Current Visible Light Communication (VLC) systems focus mainly on wireless solutions. Converting multicast to unicast. Because of it, we propose an evolution of unicast and multi-hop wireless Optical Wireless Communication (OWC) supporting multicast communication in VLC environments, called MCAST-VLC. MCAST-VLC is a cross-layer dynamic routing protocol for VLC scenery, considering some particular characteristics of this area. Our proposal comprises the need for group management, traffic isolation, multi-hop route discovery protocol. We evaluate our protocol in a VLC environment, following a close indoor VLC. Our results evidence that multicast protocol over visible light communication can handle three more network flows than a simple unicast under a negligible overhead to maintain the multicast characteristics.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying STAMP to Support the Synthesis of Controller Logic considering Safety Concerns 考虑安全问题,应用STAMP支持控制器逻辑的综合
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672587
Bráulio Marques Horta, Juliana de Melo Bezerra, C. Hirata
Controllers are key components of safety-critical systems. They are responsible for ensuring many of the system requirements through monitoring and action over other components. The traditional approach for designing controllers encompasses careful understanding, analysis, and manual definition of the behavior of the controller. We propose a correct-by-construction method to synthesize the logic of controllers, based on supervisory control theory. In this paper, we focus on using STAMP to support the controller synthesis. STAMP is an accident causation model based on systems theory, which treats accidents and unacceptable losses as a dynamic control problem. Here STAMP aids to capture the system description, supporting the steps related to the definition of components and their interfaces, the specification of components' behavior, the identification of assumptions, and the determination of functional and safety properties. We provide an overview of the method, contextualizing the methods steps with the system of an automatic door. Later, we present a real system of a Nuclear Power Plant and discuss its outcomes.
控制器是安全关键系统的关键部件。他们负责通过对其他组件的监视和操作来确保许多系统需求。设计控制器的传统方法包括仔细理解、分析和手动定义控制器的行为。在监督控制理论的基础上,提出了一种基于构造修正的控制器逻辑综合方法。在本文中,我们主要研究使用STAMP来支持控制器的合成。STAMP是一种基于系统理论的事故原因模型,它将事故和不可接受损失作为一个动态控制问题来处理。在这里,STAMP帮助捕获系统描述,支持与组件及其接口的定义、组件行为的规范、假设的识别以及功能和安全属性的确定相关的步骤。我们提供了该方法的概述,将方法步骤与自动门系统联系起来。随后,我们介绍了一个真实的核电站系统,并讨论了其结果。
{"title":"Applying STAMP to Support the Synthesis of Controller Logic considering Safety Concerns","authors":"Bráulio Marques Horta, Juliana de Melo Bezerra, C. Hirata","doi":"10.1109/ladc53747.2021.9672587","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672587","url":null,"abstract":"Controllers are key components of safety-critical systems. They are responsible for ensuring many of the system requirements through monitoring and action over other components. The traditional approach for designing controllers encompasses careful understanding, analysis, and manual definition of the behavior of the controller. We propose a correct-by-construction method to synthesize the logic of controllers, based on supervisory control theory. In this paper, we focus on using STAMP to support the controller synthesis. STAMP is an accident causation model based on systems theory, which treats accidents and unacceptable losses as a dynamic control problem. Here STAMP aids to capture the system description, supporting the steps related to the definition of components and their interfaces, the specification of components' behavior, the identification of assumptions, and the determination of functional and safety properties. We provide an overview of the method, contextualizing the methods steps with the system of an automatic door. Later, we present a real system of a Nuclear Power Plant and discuss its outcomes.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WAFERS: Program 晶片:程序
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672555
{"title":"WAFERS: Program","authors":"","doi":"10.1109/ladc53747.2021.9672555","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672555","url":null,"abstract":"","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Building a Vulnerability Dataset with Static Information from the Source Code 基于源代码静态信息构建漏洞数据集的研究
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672589
José D’Abruzzo Pereira, João Henggeler Antunes, M. Vieira
Software vulnerabilities are weaknesses in software systems that can have serious consequences when exploited. Examples of side effects include unauthorized authentication, data breaches, and financial losses. Due to the nature of the software industry, companies are increasingly pressured to deploy software as quickly as possible, leading to a large number of undetected software vulnerabilities. Static code analysis, with the support of Static Analysis Tools (SATs), can generate security alerts that highlight potential vulnerabilities in an application's source code. Software Metrics (SMs) have also been used to predict software vulnerabilities, usually with the support of Machine Learning (ML) classification algorithms. Several datasets are available to support the development of improved software vulnerability detection techniques. However, they suffer from the same issues: they are either outdated or use a single type of information. In this paper, we present a methodology for collecting software vulnerabilities from known vulnerability databases and enhancing them with static information (namely SAT alerts and SMs). The proposed methodology aims to define a mechanism capable of more easily updating the collected data.
软件漏洞是软件系统中的弱点,一旦被利用,可能会产生严重的后果。副作用的例子包括未经授权的身份验证、数据泄露和财务损失。由于软件行业的性质,公司面临着越来越大的压力,要求尽快部署软件,这导致了大量未被发现的软件漏洞。在静态分析工具(sat)的支持下,静态代码分析可以生成安全警报,突出显示应用程序源代码中的潜在漏洞。软件度量(SMs)也被用于预测软件漏洞,通常在机器学习(ML)分类算法的支持下。有几个数据集可用于支持改进的软件漏洞检测技术的开发。然而,它们都面临着同样的问题:它们要么过时,要么使用单一类型的信息。在本文中,我们提出了一种从已知漏洞数据库中收集软件漏洞并使用静态信息(即SAT警报和SMs)增强它们的方法。所建议的方法旨在定义一种能够更容易地更新所收集数据的机制。
{"title":"On Building a Vulnerability Dataset with Static Information from the Source Code","authors":"José D’Abruzzo Pereira, João Henggeler Antunes, M. Vieira","doi":"10.1109/ladc53747.2021.9672589","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672589","url":null,"abstract":"Software vulnerabilities are weaknesses in software systems that can have serious consequences when exploited. Examples of side effects include unauthorized authentication, data breaches, and financial losses. Due to the nature of the software industry, companies are increasingly pressured to deploy software as quickly as possible, leading to a large number of undetected software vulnerabilities. Static code analysis, with the support of Static Analysis Tools (SATs), can generate security alerts that highlight potential vulnerabilities in an application's source code. Software Metrics (SMs) have also been used to predict software vulnerabilities, usually with the support of Machine Learning (ML) classification algorithms. Several datasets are available to support the development of improved software vulnerability detection techniques. However, they suffer from the same issues: they are either outdated or use a single type of information. In this paper, we present a methodology for collecting software vulnerabilities from known vulnerability databases and enhancing them with static information (namely SAT alerts and SMs). The proposed methodology aims to define a mechanism capable of more easily updating the collected data.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Denial of Service Attacks on Wi-Fi-based Unmanned Aerial Vehicle 基于wi - fi的无人机拒绝服务攻击分类
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672561
G. Bertoli, L. A. P. Júnior, O. Saotome
This paper presents an analysis of denial of service (DoS) attacks on Wi-Fi-based Unmanned Aerial Vehicle (UAV). The platform is a Parrot AR.Drone 2 and uses the IEEE 802.11 protocol for command and control. The threat scenarios are the TCP and UDP Flood Attacks and the de-authentication attack. The de-authentication is a functionality available on IEEE 802.11 Wireless protocol that is misused for DoS attacks. The approach for DoS classification is based on logistic regression and decision tree (DT) using a dataset composed of malicious and normal network traffic captured during UAV flights. The DT model obtained in this paper accomplishes an F1-score to classify DoS attacks (de-authentication, UDP, and TCP flood) of 0.97.
本文分析了基于wi - fi的无人机(UAV)的拒绝服务(DoS)攻击。该平台是Parrot AR.Drone 2,使用IEEE 802.11协议进行命令和控制。威胁场景包括TCP Flood攻击、UDP Flood攻击和去认证攻击。去认证是IEEE 802.11无线协议中可用的一项功能,它被滥用于DoS攻击。DoS分类方法基于逻辑回归和决策树(DT),使用由无人机飞行期间捕获的恶意和正常网络流量组成的数据集。本文得到的DT模型对DoS攻击(去认证、UDP和TCP flood)的分类得分为f1 - 0.97。
{"title":"Classification of Denial of Service Attacks on Wi-Fi-based Unmanned Aerial Vehicle","authors":"G. Bertoli, L. A. P. Júnior, O. Saotome","doi":"10.1109/ladc53747.2021.9672561","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672561","url":null,"abstract":"This paper presents an analysis of denial of service (DoS) attacks on Wi-Fi-based Unmanned Aerial Vehicle (UAV). The platform is a Parrot AR.Drone 2 and uses the IEEE 802.11 protocol for command and control. The threat scenarios are the TCP and UDP Flood Attacks and the de-authentication attack. The de-authentication is a functionality available on IEEE 802.11 Wireless protocol that is misused for DoS attacks. The approach for DoS classification is based on logistic regression and decision tree (DT) using a dataset composed of malicious and normal network traffic captured during UAV flights. The DT model obtained in this paper accomplishes an F1-score to classify DoS attacks (de-authentication, UDP, and TCP flood) of 0.97.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Techniques for Evaluating the Robustness of Deep Learning Systems: A Preliminary Review 评估深度学习系统鲁棒性的技术:初步综述
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672592
Horacio L. França, César Teixeira, N. Laranjeiro
Machine Learning algorithms are currently being applied to a huge diversity of systems in various domains, including control systems in the industry, medical instruments, and autonomous vehicles, just to name a few. Systems based on deep learning models have become extremely popular in this context, and, like regular machine learning algorithms, are susceptible to errors caused by noisy data, outliers, or adversarial attacks. An error of a deep learning model in a safety-critical context can lead to a system failure, which can have disastrous consequences, including safety violations. In this paper we review the state of the art in techniques for evaluating the reliability (in lato sensu) of deep learning models, identify the main characteristics of the methods used and discuss research trends and open challenges.
机器学习算法目前被应用于各种领域的各种系统,包括工业控制系统、医疗器械和自动驾驶汽车,仅举几例。在这种情况下,基于深度学习模型的系统已经变得非常流行,并且,像常规的机器学习算法一样,容易受到噪声数据、异常值或对抗性攻击引起的错误的影响。在安全关键环境中,深度学习模型的错误可能导致系统故障,从而产生灾难性后果,包括违反安全规定。在本文中,我们回顾了深度学习模型可靠性评估技术的最新进展,确定了所使用方法的主要特征,并讨论了研究趋势和开放的挑战。
{"title":"Techniques for Evaluating the Robustness of Deep Learning Systems: A Preliminary Review","authors":"Horacio L. França, César Teixeira, N. Laranjeiro","doi":"10.1109/ladc53747.2021.9672592","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672592","url":null,"abstract":"Machine Learning algorithms are currently being applied to a huge diversity of systems in various domains, including control systems in the industry, medical instruments, and autonomous vehicles, just to name a few. Systems based on deep learning models have become extremely popular in this context, and, like regular machine learning algorithms, are susceptible to errors caused by noisy data, outliers, or adversarial attacks. An error of a deep learning model in a safety-critical context can lead to a system failure, which can have disastrous consequences, including safety violations. In this paper we review the state of the art in techniques for evaluating the reliability (in lato sensu) of deep learning models, identify the main characteristics of the methods used and discuss research trends and open challenges.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Calibration of BLE beacons and its impact on distance estimation using the log-distance path loss model 利用对数距离路径损耗模型标定BLE信标及其对距离估计的影响
Pub Date : 2021-11-01 DOI: 10.1109/ladc53747.2021.9672575
Leonardo Vanzin, M. Oyamada
The indoor positioning system is used to determine the location of people or objects in an enclosed space. It can be used in many applications such as navigation or even active marketing to provide a better experience to customers. There are various solutions to perform indoor localization. In this paper, the focus is on the use of Bluetooth Low Energy beacons to determine the position of the customer or object in the room. Therefore, the goal of this work is to use low-cost HM-10 BLE boards to test their accuracy and use as beacons. After collecting and analyzing the data, it was determined that HM-10 is a viable solution for beacons. When using the log-distance path loss model to determine distance, the experiments show variations between different HM-10 boards, suggesting the need for calibration to obtain more accurate results.
室内定位系统用于确定人或物体在封闭空间中的位置。它可以用于许多应用程序,例如导航甚至主动营销,为客户提供更好的体验。室内定位有多种解决方案。在本文中,重点是使用低功耗蓝牙信标来确定房间中客户或物体的位置。因此,这项工作的目标是使用低成本的HM-10 BLE板来测试其精度并用作信标。在收集和分析数据后,确定HM-10是一种可行的信标解决方案。当使用对数距离路径损耗模型确定距离时,实验显示不同HM-10板之间存在差异,表明需要进行校准以获得更准确的结果。
{"title":"Calibration of BLE beacons and its impact on distance estimation using the log-distance path loss model","authors":"Leonardo Vanzin, M. Oyamada","doi":"10.1109/ladc53747.2021.9672575","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672575","url":null,"abstract":"The indoor positioning system is used to determine the location of people or objects in an enclosed space. It can be used in many applications such as navigation or even active marketing to provide a better experience to customers. There are various solutions to perform indoor localization. In this paper, the focus is on the use of Bluetooth Low Energy beacons to determine the position of the customer or object in the room. Therefore, the goal of this work is to use low-cost HM-10 BLE boards to test their accuracy and use as beacons. After collecting and analyzing the data, it was determined that HM-10 is a viable solution for beacons. When using the log-distance path loss model to determine distance, the experiments show variations between different HM-10 boards, suggesting the need for calibration to obtain more accurate results.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129712795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 10th Latin-American Symposium on Dependable Computing (LADC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1