首页 > 最新文献

2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)最新文献

英文 中文
Safe and secure software updates on high-performance embedded systems 安全可靠的高性能嵌入式系统软件更新
Irune Agirre
The next generation of dependable embedded systems feature autonomy and higher levels of interconnection. Autonomy is commonly achieved with the support of artificial intelligence algorithms that pose high computing demands on the hardware platform, reaching a high performance scale. This involves a dramatic increase in software and hardware complexity, fact that together with the novelty of the technology, raises serious concerns regarding system dependability. Traditional approaches for certification require to demonstrate that the system will be acceptably safe to operate before it is deployed into service. The nature of autonomous systems, with potentially infinite scenarios, configurations and unanticipated interactions, makes it increasingly difficult to support such claim at design time. In this context, the extended networking technologies can be exploited to collect post-deployment evidence that serve to oversee whether safety assumptions are preserved during operation and to continuously improve the system through regular software updates. These software updates are not only convenient for critical bug fixing but also necessary for keeping the interconnected system resilient against security threats. However, such approach requires a recondition of the traditional certification practices.
下一代可靠的嵌入式系统具有自主性和更高层次的互联性。自治通常在人工智能算法的支持下实现,这对硬件平台提出了很高的计算要求,达到了高性能规模。这涉及到软件和硬件复杂性的急剧增加,事实上,加上技术的新颖性,引起了对系统可靠性的严重关注。传统的认证方法要求在系统投入使用之前证明系统将是可接受的安全操作。自主系统的本质,包括潜在的无限场景、配置和不可预期的交互,使得在设计时支持这种说法变得越来越困难。在这种情况下,扩展网络技术可以用于收集部署后的证据,用于监督操作期间是否保持安全假设,并通过定期软件更新不断改进系统。这些软件更新不仅便于修复关键错误,而且对于保持互联系统抵御安全威胁也是必要的。然而,这种方法需要对传统的认证实践进行改造。
{"title":"Safe and secure software updates on high-performance embedded systems","authors":"Irune Agirre","doi":"10.1109/DSN-W50199.2020.00021","DOIUrl":"https://doi.org/10.1109/DSN-W50199.2020.00021","url":null,"abstract":"The next generation of dependable embedded systems feature autonomy and higher levels of interconnection. Autonomy is commonly achieved with the support of artificial intelligence algorithms that pose high computing demands on the hardware platform, reaching a high performance scale. This involves a dramatic increase in software and hardware complexity, fact that together with the novelty of the technology, raises serious concerns regarding system dependability. Traditional approaches for certification require to demonstrate that the system will be acceptably safe to operate before it is deployed into service. The nature of autonomous systems, with potentially infinite scenarios, configurations and unanticipated interactions, makes it increasingly difficult to support such claim at design time. In this context, the extended networking technologies can be exploited to collect post-deployment evidence that serve to oversee whether safety assumptions are preserved during operation and to continuously improve the system through regular software updates. These software updates are not only convenient for critical bug fixing but also necessary for keeping the interconnected system resilient against security threats. However, such approach requires a recondition of the traditional certification practices.","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems TAaMR:针对多媒体推荐系统的针对性对抗性攻击
T. D. Noia, Daniele Malitesta, Felice Antonio Merra
Deep learning classifiers are hugely vulnerable to adversarial examples, and their existence raised cybersecurity concerns in many tasks with an emphasis on malware detection, computer vision, and speech recognition. While there is a considerable effort to investigate attacks and defense strategies in these tasks, only limited work explores the influence of targeted attacks on input data (e.g., images, textual descriptions, audio) used in multimedia recommender systems (MR). In this work, we examine the consequences of applying targeted adversarial attacks against the product images of a visual-based MR. We propose a novel adversarial attack approach, called Target Adversarial Attack against Multimedia Recommender Systems (TAaMR), to investigate the modification of MR behavior when the images of a category of low recommended products (e.g., socks) are perturbed to misclassify the deep neural classifier towards the class of more recommended products (e.g., running shoes) with human-level slight images alterations. We explore the TAaMR approach studying the effect of two targeted adversarial attacks (i.e., FGSM and PGD) against input pictures of two state-of-the-art MR (i.e., VBPR and AMR). Extensive experiments on two real-world recommender fashion datasets confirmed the effectiveness of TAaMR in terms of recommendation lists changing while keeping the original human judgment on the perturbed images.
深度学习分类器非常容易受到对抗性示例的攻击,它们的存在在许多任务中引起了网络安全问题,重点是恶意软件检测、计算机视觉和语音识别。虽然在研究这些任务中的攻击和防御策略方面付出了相当大的努力,但只有有限的工作探索了有针对性的攻击对多媒体推荐系统(MR)中使用的输入数据(例如图像、文本描述、音频)的影响。在这项工作中,我们研究了针对基于视觉的MR产品图像应用针对性对抗性攻击的后果。我们提出了一种新的对抗性攻击方法,称为针对多媒体推荐系统(TAaMR)的目标对抗性攻击,以研究当低推荐产品类别(例如袜子)的图像受到干扰而导致深度神经分类器对更推荐产品类别(例如,跑鞋)与人类水平的轻微图像变化。我们探索了TAaMR方法,研究了两种有针对性的对抗性攻击(即FGSM和PGD)对两种最先进的MR(即VBPR和AMR)的输入图像的影响。在两个真实世界的推荐时尚数据集上进行的大量实验证实了TAaMR在推荐列表变化方面的有效性,同时保持了对受干扰图像的原始人类判断。
{"title":"TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems","authors":"T. D. Noia, Daniele Malitesta, Felice Antonio Merra","doi":"10.1109/DSN-W50199.2020.00011","DOIUrl":"https://doi.org/10.1109/DSN-W50199.2020.00011","url":null,"abstract":"Deep learning classifiers are hugely vulnerable to adversarial examples, and their existence raised cybersecurity concerns in many tasks with an emphasis on malware detection, computer vision, and speech recognition. While there is a considerable effort to investigate attacks and defense strategies in these tasks, only limited work explores the influence of targeted attacks on input data (e.g., images, textual descriptions, audio) used in multimedia recommender systems (MR). In this work, we examine the consequences of applying targeted adversarial attacks against the product images of a visual-based MR. We propose a novel adversarial attack approach, called Target Adversarial Attack against Multimedia Recommender Systems (TAaMR), to investigate the modification of MR behavior when the images of a category of low recommended products (e.g., socks) are perturbed to misclassify the deep neural classifier towards the class of more recommended products (e.g., running shoes) with human-level slight images alterations. We explore the TAaMR approach studying the effect of two targeted adversarial attacks (i.e., FGSM and PGD) against input pictures of two state-of-the-art MR (i.e., VBPR and AMR). Extensive experiments on two real-world recommender fashion datasets confirmed the effectiveness of TAaMR in terms of recommendation lists changing while keeping the original human judgment on the perturbed images.","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
DSN-W 2020 Commentary DSN-W 2020评论
{"title":"DSN-W 2020 Commentary","authors":"","doi":"10.1109/dsn-w50199.2020.00010","DOIUrl":"https://doi.org/10.1109/dsn-w50199.2020.00010","url":null,"abstract":"","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical fault tolerant architecture for an autonomous robot 自主机器人的分层容错体系结构
Anthony Favier, Antonin Messioux, Jérémie Guiochet, J. Fabre, C. Lesire
This paper presents a generic approach to specify a fault tolerant robot controller, and its implementation and validation with ROS and Gazebo. The main idea is to implement a fault tolerance strategy using a fault tree and an ordered set of recovery modules. A fault injection campaign has been carried out with a mobile autonomous robot for airport inspection using simulation with Gazebo and ROS. This successful experiment implements a safety-first strategy.
本文提出了一种通用的容错机器人控制器设计方法,并利用ROS和Gazebo进行了实现和验证。其主要思想是使用故障树和有序的恢复模块集来实现容错策略。使用Gazebo和ROS进行仿真,使用移动自主机器人进行机场检查故障注入活动。这个成功的实验实施了安全第一的策略。
{"title":"A hierarchical fault tolerant architecture for an autonomous robot","authors":"Anthony Favier, Antonin Messioux, Jérémie Guiochet, J. Fabre, C. Lesire","doi":"10.1109/DSN-W50199.2020.00031","DOIUrl":"https://doi.org/10.1109/DSN-W50199.2020.00031","url":null,"abstract":"This paper presents a generic approach to specify a fault tolerant robot controller, and its implementation and validation with ROS and Gazebo. The main idea is to implement a fault tolerance strategy using a fault tree and an ordered set of recovery modules. A fault injection campaign has been carried out with a mobile autonomous robot for airport inspection using simulation with Gazebo and ROS. This successful experiment implements a safety-first strategy.","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124328664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/dsn-w50199.2020.00003","DOIUrl":"https://doi.org/10.1109/dsn-w50199.2020.00003","url":null,"abstract":"","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129714632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association Rule Mining with Differential Privacy 差分隐私的关联规则挖掘
Hao Zhen, Bo-Cheng Chiou, Yao-Tung Tsou, S. Kuo, Pang-Chieh Wang
Association analysis is an important task in data analysis to find all co-occurrence relationships (i.e., frequent itemsets or confident association rules) from the transactional dataset. An association rule can help people better discover patterns and develop corresponding strategies. The process of data analysis can be highly summarized as a set of queries, where each query is a real-valued function of the dataset. However, without any restriction and protection, accessing the dataset to answer the queries may lead to the disclosure of individual privacy. In this paper, we propose and implement the association rule mining with differential privacy algorithm, which uses multiple support thresholds to reduce the number of candidate itemsets while reflecting the real nature of the items, and uses random truncation and uniform partition to lower the dimensionality of the dataset. We also stabilize the noise scale by adaptively allocating the privacy budgets, and bound the overall privacy loss. In addition, we prove that the association rule mining with differential privacy algorithm satisfies ex post differential privacy, and verify the utility of our association rule mining with differential privacy algorithm through a series of experiments. To the best of our knowledge, our work is the first differentially private association rule mining algorithm under multiple support thresholds.
关联分析是数据分析中的一项重要任务,它从事务数据集中发现所有共现关系(即频繁项集或可信关联规则)。关联规则可以帮助人们更好地发现模式并制定相应的策略。数据分析的过程可以高度概括为一组查询,其中每个查询都是数据集的实值函数。然而,在没有任何限制和保护的情况下,访问数据集回答查询可能会导致个人隐私的泄露。本文提出并实现了基于差分隐私算法的关联规则挖掘,该算法使用多个支持阈值来减少候选项目集的数量,同时反映项目的真实性质,并使用随机截断和统一分割来降低数据集的维数。我们还通过自适应分配隐私预算来稳定噪声尺度,并对整体隐私损失进行了约束。此外,我们证明了差分隐私算法的关联规则挖掘满足事后差分隐私,并通过一系列实验验证了差分隐私算法的关联规则挖掘的实用性。据我们所知,我们的工作是第一个在多个支持阈值下的差异私有关联规则挖掘算法。
{"title":"Association Rule Mining with Differential Privacy","authors":"Hao Zhen, Bo-Cheng Chiou, Yao-Tung Tsou, S. Kuo, Pang-Chieh Wang","doi":"10.1109/DSN-W50199.2020.00017","DOIUrl":"https://doi.org/10.1109/DSN-W50199.2020.00017","url":null,"abstract":"Association analysis is an important task in data analysis to find all co-occurrence relationships (i.e., frequent itemsets or confident association rules) from the transactional dataset. An association rule can help people better discover patterns and develop corresponding strategies. The process of data analysis can be highly summarized as a set of queries, where each query is a real-valued function of the dataset. However, without any restriction and protection, accessing the dataset to answer the queries may lead to the disclosure of individual privacy. In this paper, we propose and implement the association rule mining with differential privacy algorithm, which uses multiple support thresholds to reduce the number of candidate itemsets while reflecting the real nature of the items, and uses random truncation and uniform partition to lower the dimensionality of the dataset. We also stabilize the noise scale by adaptively allocating the privacy budgets, and bound the overall privacy loss. In addition, we prove that the association rule mining with differential privacy algorithm satisfies ex post differential privacy, and verify the utility of our association rule mining with differential privacy algorithm through a series of experiments. To the best of our knowledge, our work is the first differentially private association rule mining algorithm under multiple support thresholds.","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131329062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Cybersecurity Mechanisms with respect to Dependability and Security Attributes 基于可靠性和安全属性的网络安全机制分析
B. Sangchoolie, P. Folkesson, Pierre Kleberger, J. Vinter
Embedded electronic systems need to be equipped with different types of security mechanisms to protect themselves and to mitigate the effects of cybersecurity attacks. These mechanisms should be evaluated with respect to their impacts on dependability and security attributes such as availability, reliability, safety, etc. The evaluation is of great importance as, e.g., a security mechanism should never violate the system safety. Therefore, in this paper, we evaluate a comprehensive set of security mechanisms consisting of 17 different types of mechanisms with respect to their impact on dependability and security attributes. The results show that, in general, the use of these mechanisms have positive effect on system dependability and security. However, there are at least three mechanisms that could have negative impacts on system dependability by violating safety and availability requirements. The results support our claim that the analyses such as the ones conducted in this paper are necessary when selecting and implementing an optimal set of safety and security mechanisms.
嵌入式电子系统需要配备不同类型的安全机制来保护自己并减轻网络安全攻击的影响。应该评估这些机制对可靠性和安全性属性(如可用性、可靠性、安全性等)的影响。评估是非常重要的,例如,安全机制不应该违反系统安全。因此,在本文中,我们评估了一套全面的安全机制,包括17种不同类型的机制,以及它们对可靠性和安全属性的影响。结果表明,总的来说,这些机制的使用对系统的可靠性和安全性都有积极的影响。然而,至少有三种机制可能会违反安全性和可用性需求,从而对系统可靠性产生负面影响。研究结果支持了我们的观点,即在选择和实施一套最优的安全和保障机制时,像本文中进行的分析是必要的。
{"title":"Analysis of Cybersecurity Mechanisms with respect to Dependability and Security Attributes","authors":"B. Sangchoolie, P. Folkesson, Pierre Kleberger, J. Vinter","doi":"10.1109/DSN-W50199.2020.00027","DOIUrl":"https://doi.org/10.1109/DSN-W50199.2020.00027","url":null,"abstract":"Embedded electronic systems need to be equipped with different types of security mechanisms to protect themselves and to mitigate the effects of cybersecurity attacks. These mechanisms should be evaluated with respect to their impacts on dependability and security attributes such as availability, reliability, safety, etc. The evaluation is of great importance as, e.g., a security mechanism should never violate the system safety. Therefore, in this paper, we evaluate a comprehensive set of security mechanisms consisting of 17 different types of mechanisms with respect to their impact on dependability and security attributes. The results show that, in general, the use of these mechanisms have positive effect on system dependability and security. However, there are at least three mechanisms that could have negative impacts on system dependability by violating safety and availability requirements. The results support our claim that the analyses such as the ones conducted in this paper are necessary when selecting and implementing an optimal set of safety and security mechanisms.","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124767536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Open Source Hardware: An Opportunity For Critical Systems 开源硬件:关键系统的机会
Jimmy Le Rhun, Sylvain Girbal, D. G. Pérez
Dependable systems currently undergo a series of transformations, notably the shift to multi-core processors and the rise of concerns previously limited to the IT domain such as cybersecurity or cloud-like versatility. In this position paper we summarize the key challenges, and some promising solutions.In addition to software-based techniques devised for COTS multi-processors, emerging Open-Source processing platforms provide the ability to experiment domain-specific mitigation techniques that were previously deemed not economically feasible.
可靠的系统目前正在经历一系列的转变,特别是向多核处理器的转变,以及以前仅限于IT领域(如网络安全或类似云的多功能性)的担忧的兴起。在这份立场文件中,我们总结了主要挑战,以及一些有希望的解决方案。除了为COTS多处理器设计的基于软件的技术之外,新兴的开源处理平台还提供了实验特定于领域的缓解技术的能力,这些技术以前被认为在经济上是不可行的。
{"title":"Open Source Hardware: An Opportunity For Critical Systems","authors":"Jimmy Le Rhun, Sylvain Girbal, D. G. Pérez","doi":"10.1109/DSN-W50199.2020.00019","DOIUrl":"https://doi.org/10.1109/DSN-W50199.2020.00019","url":null,"abstract":"Dependable systems currently undergo a series of transformations, notably the shift to multi-core processors and the rise of concerns previously limited to the IT domain such as cybersecurity or cloud-like versatility. In this position paper we summarize the key challenges, and some promising solutions.In addition to software-based techniques devised for COTS multi-processors, emerging Open-Source processing platforms provide the ability to experiment domain-specific mitigation techniques that were previously deemed not economically feasible.","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122091629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Fault Parameter Space Using Reinforcement Learning-based Fault Injection 基于强化学习的故障注入方法探索故障参数空间
M. Moradi, Bentley James Oakes, M. Saraoglu, A. Morozov, K. Janschek, J. Denil
Assessing the safety of complex Cyber-Physical Systems (CPS) is a challenge in any industry. Fault Injection (FI) is a proven technique for safety analysis and is recommended by the automotive safety standard ISO 26262. Traditional FI methods require a considerable amount of effort and cost as FI is applied late in the development cycle and is driven by manual effort or random algorithms. In this paper, we propose a Reinforcement Learning (RL) approach to explore the fault space and find critical faults. During the learning process, the RL agent injects and parameterizes faults in the system to cause catastrophic behavior. The fault space is explored based on a reward function that evaluates previous simulation results such that the RL technique tries to predict improved fault timing and values. In this paper, we apply our technique on an Adaptive Cruise Controller with sensor fusion and compare the proposed method with Monte Carlo-based fault injection. The proposed technique is more efficient in terms of fault coverage and time to find the first critical fault.
评估复杂的网络物理系统(CPS)的安全性在任何行业都是一个挑战。故障注入(FI)是一种经过验证的安全分析技术,由汽车安全标准ISO 26262推荐。传统的FI方法需要大量的努力和成本,因为FI是在开发周期的后期应用的,并且是由人工或随机算法驱动的。在本文中,我们提出了一种强化学习(RL)方法来探索故障空间并发现关键故障。在学习过程中,RL agent将系统中的故障注入并参数化,从而导致灾难性的行为。故障空间是基于评估先前模拟结果的奖励函数来探索的,因此RL技术试图预测改进的故障时间和值。本文将该方法应用于传感器融合的自适应巡航控制器,并与基于蒙特卡罗的故障注入方法进行了比较。该方法在故障覆盖率和发现第一个关键故障的时间方面更有效。
{"title":"Exploring Fault Parameter Space Using Reinforcement Learning-based Fault Injection","authors":"M. Moradi, Bentley James Oakes, M. Saraoglu, A. Morozov, K. Janschek, J. Denil","doi":"10.1109/DSN-W50199.2020.00028","DOIUrl":"https://doi.org/10.1109/DSN-W50199.2020.00028","url":null,"abstract":"Assessing the safety of complex Cyber-Physical Systems (CPS) is a challenge in any industry. Fault Injection (FI) is a proven technique for safety analysis and is recommended by the automotive safety standard ISO 26262. Traditional FI methods require a considerable amount of effort and cost as FI is applied late in the development cycle and is driven by manual effort or random algorithms. In this paper, we propose a Reinforcement Learning (RL) approach to explore the fault space and find critical faults. During the learning process, the RL agent injects and parameterizes faults in the system to cause catastrophic behavior. The fault space is explored based on a reward function that evaluates previous simulation results such that the RL technique tries to predict improved fault timing and values. In this paper, we apply our technique on an Adaptive Cruise Controller with sensor fusion and compare the proposed method with Monte Carlo-based fault injection. The proposed technique is more efficient in terms of fault coverage and time to find the first critical fault.","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
DSN-W 2020 TOC
Abdulrahman Mahmoud
{"title":"DSN-W 2020 TOC","authors":"Abdulrahman Mahmoud","doi":"10.1109/dsn-w50199.2020.00004","DOIUrl":"https://doi.org/10.1109/dsn-w50199.2020.00004","url":null,"abstract":"","PeriodicalId":427687,"journal":{"name":"2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114808763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1