首页 > 最新文献

ACM Computing Surveys (CSUR)最新文献

英文 中文
A Survey of Approaches to Unobtrusive Sensing of Humans 非突兀感知人类方法综述
Pub Date : 2022-01-18 DOI: 10.1145/3491208
J. Fernandes, J. Silva, A. Rodrigues, F. Boavida
The increasing amount of human-related and/or human-originated data in current systems is both an opportunity and a challenge. Nevertheless, despite relying on the processing of large amounts of data, most of the so-called smart systems that we have nowadays merely consider humans as sources of data, not as system beneficiaries or even active “components.” For truly smart systems, we need to create systems that are able to understand human actions and emotions, and take them into account when deciding on the system behavior. Naturally, in order to achieve this, we first have to empower systems with human sensing capabilities, possibly in ways that are as inconspicuous as possible. In this context, in this article we survey existing approaches to unobtrusive monitorization of human beings, namely, of their activity, vital signs, and emotional states. After setting a taxonomy for human sensing, we proceed to present and analyze existing solutions for unobtrusive sensing. Subsequently, we identify and discuss open issues and challenges in this area. Although there are surveys that address some of the concerned fields of research, such as healthcare, human monitorization, or even the use-specific techniques like channel state information or image recognition, as far as we know this is the first comprehensive survey on unobtrusive sensing of human beings.
当前系统中与人类相关和/或源自人类的数据数量不断增加,这既是机遇也是挑战。然而,尽管依赖于对大量数据的处理,我们现在拥有的大多数所谓的智能系统仅仅将人类视为数据的来源,而不是系统的受益者,甚至不是主动的“组件”。对于真正的智能系统,我们需要创建能够理解人类行为和情感的系统,并在决定系统行为时将其考虑在内。当然,为了实现这一目标,我们首先必须赋予系统以人类感知能力,可能以尽可能不引人注目的方式。在这种情况下,在本文中,我们调查了现有的不引人注目的监测人类的方法,即他们的活动,生命体征和情绪状态。在为人类感知设置了分类之后,我们继续提出和分析现有的非突兀感知解决方案。随后,我们确定并讨论这一领域的开放性问题和挑战。虽然有一些调查涉及一些相关的研究领域,如医疗保健、人类监控,甚至是特定用途的技术,如通道状态信息或图像识别,但据我们所知,这是第一次关于人类不引人注目的感知的全面调查。
{"title":"A Survey of Approaches to Unobtrusive Sensing of Humans","authors":"J. Fernandes, J. Silva, A. Rodrigues, F. Boavida","doi":"10.1145/3491208","DOIUrl":"https://doi.org/10.1145/3491208","url":null,"abstract":"The increasing amount of human-related and/or human-originated data in current systems is both an opportunity and a challenge. Nevertheless, despite relying on the processing of large amounts of data, most of the so-called smart systems that we have nowadays merely consider humans as sources of data, not as system beneficiaries or even active “components.” For truly smart systems, we need to create systems that are able to understand human actions and emotions, and take them into account when deciding on the system behavior. Naturally, in order to achieve this, we first have to empower systems with human sensing capabilities, possibly in ways that are as inconspicuous as possible. In this context, in this article we survey existing approaches to unobtrusive monitorization of human beings, namely, of their activity, vital signs, and emotional states. After setting a taxonomy for human sensing, we proceed to present and analyze existing solutions for unobtrusive sensing. Subsequently, we identify and discuss open issues and challenges in this area. Although there are surveys that address some of the concerned fields of research, such as healthcare, human monitorization, or even the use-specific techniques like channel state information or image recognition, as far as we know this is the first comprehensive survey on unobtrusive sensing of human beings.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"22 1","pages":"1 - 28"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90875730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN 实时以太网建模与设计方法综述:从AVB到TSN
Pub Date : 2022-01-18 DOI: 10.1145/3487330
Li-Ming Deng, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li, Keqin Li
With the development of real-time critical systems, the ever-increasing communication data traffic puts forward high-bandwidth and low-delay requirements for communication networks. Therefore, various real-time Ethernet protocols have been proposed, but these protocols are not compatible with each other. The IEEE 802.1 Working Group developed standardized protocols named Audio Video Bridging (AVB) in 2005, and renamed it Time-Sensitive Networking (TSN) later. TSN not only adds new features but also retains the original functions of AVB. Proposing real-time Ethernet modeling and design methodologies is the key to meeting high-bandwidth and low-delay communication requirements. This article surveys the modeling from AVB to TSN, mainly including: (1) AVB and TSN modeling; (2) end-to-end delay modeling; (3) real-time scheduling modeling; (4) reliability modeling; and (5) security modeling. Based on these models, this article surveys the recent advances in real-time Ethernet design methodologies from AVB to TSN: (1) end-to-end delay analysis from AVB to TSN; (2) real-time scheduling from AVB to TSN; (3) reliability-aware design for TSN; and (4) security-aware design for TSN. Among the above four points, the last two points are only for TSN, because AVB lacks reliability and security mechanisms. This article further takes the automotive use case as an example to discuss the application of TSN in automobiles. Finally, this article discusses the future trends of TSN. By surveying the recent advances and future trends, we hope to provide references for researchers interested in real-time Ethernet modeling and design methodologies for AVB and TSN.
随着实时关键系统的发展,日益增长的通信数据流量对通信网络提出了高带宽、低时延的要求。因此,人们提出了各种实时以太网协议,但这些协议之间并不兼容。IEEE 802.1工作组于2005年开发了名为音视频桥接(AVB)的标准化协议,后来将其更名为时间敏感网络(TSN)。TSN既增加了新的功能,又保留了AVB原有的功能。提出实时以太网建模和设计方法是满足高带宽、低延迟通信需求的关键。本文综述了从AVB到TSN的建模,主要包括:(1)AVB和TSN建模;(2)端到端延迟建模;(3)实时调度建模;(4)可靠性建模;(5)安全建模。基于这些模型,本文综述了从AVB到TSN的实时以太网设计方法的最新进展:(1)从AVB到TSN的端到端延迟分析;(2) AVB到TSN的实时调度;(3) TSN的可靠性感知设计;(4) TSN的安全感知设计。以上四点中,后两点仅针对TSN,因为AVB缺乏可靠性和安全机制。本文进一步以汽车用例为例,讨论TSN在汽车中的应用。最后,本文讨论了TSN的未来发展趋势。通过对最新进展和未来趋势的综述,我们希望为对AVB和TSN实时以太网建模和设计方法感兴趣的研究人员提供参考。
{"title":"A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN","authors":"Li-Ming Deng, Guoqi Xie, Hong Liu, Yunbo Han, Renfa Li, Keqin Li","doi":"10.1145/3487330","DOIUrl":"https://doi.org/10.1145/3487330","url":null,"abstract":"With the development of real-time critical systems, the ever-increasing communication data traffic puts forward high-bandwidth and low-delay requirements for communication networks. Therefore, various real-time Ethernet protocols have been proposed, but these protocols are not compatible with each other. The IEEE 802.1 Working Group developed standardized protocols named Audio Video Bridging (AVB) in 2005, and renamed it Time-Sensitive Networking (TSN) later. TSN not only adds new features but also retains the original functions of AVB. Proposing real-time Ethernet modeling and design methodologies is the key to meeting high-bandwidth and low-delay communication requirements. This article surveys the modeling from AVB to TSN, mainly including: (1) AVB and TSN modeling; (2) end-to-end delay modeling; (3) real-time scheduling modeling; (4) reliability modeling; and (5) security modeling. Based on these models, this article surveys the recent advances in real-time Ethernet design methodologies from AVB to TSN: (1) end-to-end delay analysis from AVB to TSN; (2) real-time scheduling from AVB to TSN; (3) reliability-aware design for TSN; and (4) security-aware design for TSN. Among the above four points, the last two points are only for TSN, because AVB lacks reliability and security mechanisms. This article further takes the automotive use case as an example to discuss the application of TSN in automobiles. Finally, this article discusses the future trends of TSN. By surveying the recent advances and future trends, we hope to provide references for researchers interested in real-time Ethernet modeling and design methodologies for AVB and TSN.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"23 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87344117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Orchestration in Fog Computing: A Comprehensive Survey 雾计算中的编排:一个全面的调查
Pub Date : 2022-01-18 DOI: 10.1145/3486221
Breno G. S. Costa, João Bachiega, Leonardo Rebouças de Carvalho, Aleteia P. F. Araujo
Fog computing is a paradigm that brings computational resources and services to the network edge in the vicinity of user devices, lowering latency and connecting with cloud computing resources. Unlike cloud computing, fog resources are based on constrained and heterogeneous nodes whose connectivity can be unstable. In this complex scenario, there is a need to define and implement orchestration processes to ensure that applications and services can be provided, considering the settled agreements. Although some publications have dealt with orchestration in fog computing, there are still some diverse definitions and functional intersection with other areas, such as resource management and monitoring. This article presents a systematic review of the literature with focus on orchestration in fog computing. A generic architecture of fog orchestration is presented, created from the consolidation of the analyzed proposals, bringing to light the essential functionalities addressed in the literature. This work also highlights the main challenges and open research questions.
雾计算是一种范例,它将计算资源和服务带到用户设备附近的网络边缘,降低延迟并与云计算资源连接。与云计算不同,雾资源基于受约束的异构节点,这些节点的连通性可能不稳定。在这个复杂的场景中,需要定义和实现编排流程,以确保可以提供应用程序和服务,同时考虑到已确定的协议。尽管一些出版物已经处理了雾计算中的编排,但仍然存在一些不同的定义以及与其他领域(如资源管理和监视)的功能交集。本文对雾计算中的编排进行了系统的综述。本文提出了一个雾编排的通用架构,该架构是通过整合分析的建议而创建的,它揭示了文献中提到的基本功能。这项工作也突出了主要的挑战和开放的研究问题。
{"title":"Orchestration in Fog Computing: A Comprehensive Survey","authors":"Breno G. S. Costa, João Bachiega, Leonardo Rebouças de Carvalho, Aleteia P. F. Araujo","doi":"10.1145/3486221","DOIUrl":"https://doi.org/10.1145/3486221","url":null,"abstract":"Fog computing is a paradigm that brings computational resources and services to the network edge in the vicinity of user devices, lowering latency and connecting with cloud computing resources. Unlike cloud computing, fog resources are based on constrained and heterogeneous nodes whose connectivity can be unstable. In this complex scenario, there is a need to define and implement orchestration processes to ensure that applications and services can be provided, considering the settled agreements. Although some publications have dealt with orchestration in fog computing, there are still some diverse definitions and functional intersection with other areas, such as resource management and monitoring. This article presents a systematic review of the literature with focus on orchestration in fog computing. A generic architecture of fog orchestration is presented, created from the consolidation of the analyzed proposals, bringing to light the essential functionalities addressed in the literature. This work also highlights the main challenges and open research questions.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"6 1","pages":"1 - 34"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87382511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Level-5 Autonomous Driving—Are We There Yet? A Review of Research Literature 5级自动驾驶——我们到达了吗?研究文献综述
Pub Date : 2022-01-18 DOI: 10.1145/3485767
M. A. Khan, Hesham El Sayed, Sumbal Malik, Talha Zia, Jalal Khan, Najla Alkaabi, H. Ignatious
Autonomous vehicles are revolutionizing transport and next-generation autonomous mobility. Such vehicles are promising to increase road safety, improve traffic efficiency, reduce vehicle emission, and improve mobility. However, for these vehicles to live up to their full potentials, there are significant research, technological and urgent organizational issues that need to be addressed to reach the highest level of automation, i.e., level 5. Sensors, communication, mobile edge computing, machine learning, data analytic, distributed learning, and so on, are examples of the building blocks technologies and concepts constituting the end-to-end solution. This survey discusses these technologies and concepts and maps their roles to the end-to-end solution. It highlights the challenges for each technology. Moreover, this survey provides an analysis of different solution approaches proposed by relevant stakeholders, utilizing these technologies aiming to achieve level-5 autonomy. Finally, the article details two use cases to present the interplay of the building blocks technologies.
自动驾驶汽车正在彻底改变交通和下一代自动驾驶汽车。这些车辆有望增加道路安全,提高交通效率,减少车辆排放,提高机动性。然而,为了使这些车辆充分发挥其潜力,需要解决重大的研究、技术和紧迫的组织问题,以达到最高的自动化水平,即5级。传感器、通信、移动边缘计算、机器学习、数据分析、分布式学习等等,都是构成端到端解决方案的构建模块技术和概念的例子。本文讨论了这些技术和概念,并将它们的角色映射到端到端解决方案。它突出了每种技术面临的挑战。此外,本调查还分析了相关利益相关者提出的利用这些技术实现5级自治的不同解决方案。最后,本文将详细介绍两个用例,以展示构建块技术的相互作用。
{"title":"Level-5 Autonomous Driving—Are We There Yet? A Review of Research Literature","authors":"M. A. Khan, Hesham El Sayed, Sumbal Malik, Talha Zia, Jalal Khan, Najla Alkaabi, H. Ignatious","doi":"10.1145/3485767","DOIUrl":"https://doi.org/10.1145/3485767","url":null,"abstract":"Autonomous vehicles are revolutionizing transport and next-generation autonomous mobility. Such vehicles are promising to increase road safety, improve traffic efficiency, reduce vehicle emission, and improve mobility. However, for these vehicles to live up to their full potentials, there are significant research, technological and urgent organizational issues that need to be addressed to reach the highest level of automation, i.e., level 5. Sensors, communication, mobile edge computing, machine learning, data analytic, distributed learning, and so on, are examples of the building blocks technologies and concepts constituting the end-to-end solution. This survey discusses these technologies and concepts and maps their roles to the end-to-end solution. It highlights the challenges for each technology. Moreover, this survey provides an analysis of different solution approaches proposed by relevant stakeholders, utilizing these technologies aiming to achieve level-5 autonomy. Finally, the article details two use cases to present the interplay of the building blocks technologies.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"8 1","pages":"1 - 38"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73053045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Trustworthy Artificial Intelligence: A Review 值得信赖的人工智能:综述
Pub Date : 2022-01-18 DOI: 10.1145/3491209
Davinder Kaur, Suleyman Uslu, Kaley J. Rittichier, A. Durresi
Artificial intelligence (AI) and algorithmic decision making are having a profound impact on our daily lives. These systems are vastly used in different high-stakes applications like healthcare, business, government, education, and justice, moving us toward a more algorithmic society. However, despite so many advantages of these systems, they sometimes directly or indirectly cause harm to the users and society. Therefore, it has become essential to make these systems safe, reliable, and trustworthy. Several requirements, such as fairness, explainability, accountability, reliability, and acceptance, have been proposed in this direction to make these systems trustworthy. This survey analyzes all of these different requirements through the lens of the literature. It provides an overview of different approaches that can help mitigate AI risks and increase trust and acceptance of the systems by utilizing the users and society. It also discusses existing strategies for validating and verifying these systems and the current standardization efforts for trustworthy AI. Finally, we present a holistic view of the recent advancements in trustworthy AI to help the interested researchers grasp the crucial facets of the topic efficiently and offer possible future research directions.
人工智能(AI)和算法决策正在对我们的日常生活产生深远的影响。这些系统被广泛应用于不同的高风险应用,如医疗保健、商业、政府、教育和司法,将我们推向一个更加算法化的社会。然而,尽管这些系统有很多优点,但它们有时会直接或间接地对用户和社会造成伤害。因此,使这些系统安全、可靠和值得信赖变得至关重要。在这个方向上提出了一些要求,如公平性、可解释性、问责性、可靠性和可接受性,以使这些系统值得信赖。本调查通过文献的视角分析了所有这些不同的需求。它提供了不同方法的概述,这些方法可以帮助减轻人工智能风险,并通过利用用户和社会增加对系统的信任和接受度。它还讨论了验证和验证这些系统的现有策略以及可信赖人工智能的当前标准化工作。最后,我们对可信人工智能的最新进展进行了全面的介绍,以帮助感兴趣的研究人员有效地掌握该主题的关键方面,并提供可能的未来研究方向。
{"title":"Trustworthy Artificial Intelligence: A Review","authors":"Davinder Kaur, Suleyman Uslu, Kaley J. Rittichier, A. Durresi","doi":"10.1145/3491209","DOIUrl":"https://doi.org/10.1145/3491209","url":null,"abstract":"Artificial intelligence (AI) and algorithmic decision making are having a profound impact on our daily lives. These systems are vastly used in different high-stakes applications like healthcare, business, government, education, and justice, moving us toward a more algorithmic society. However, despite so many advantages of these systems, they sometimes directly or indirectly cause harm to the users and society. Therefore, it has become essential to make these systems safe, reliable, and trustworthy. Several requirements, such as fairness, explainability, accountability, reliability, and acceptance, have been proposed in this direction to make these systems trustworthy. This survey analyzes all of these different requirements through the lens of the literature. It provides an overview of different approaches that can help mitigate AI risks and increase trust and acceptance of the systems by utilizing the users and society. It also discusses existing strategies for validating and verifying these systems and the current standardization efforts for trustworthy AI. Finally, we present a holistic view of the recent advancements in trustworthy AI to help the interested researchers grasp the crucial facets of the topic efficiently and offer possible future research directions.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"95 1","pages":"1 - 38"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78181394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 137
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey 基于RPL控制消息的路由攻击评估与缓解技术综述
Pub Date : 2022-01-18 DOI: 10.1145/3494524
A. Bang, U. P. Rao, Pallavi Kaliyar, M. Conti
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) protocol stack. Features such as energy-efficient mechanisms and availability of the secure modes of operations make RPL suitable for the constrained Internet of Things (IoT) devices. Hence, the majority of IoT applications rely on RPL for data communication. However, routing security in RPL-based IoT networks is a significant concern, motivating us to study and analyze routing attacks and suggested countermeasures against them. To this end, we provide a comprehensive survey on the state-of-the-art security threats and their corresponding countermeasures in RPL-based IoT networks. Based on our study, we propose a novel classification scheme that uses a mapping between RPL attacks and their countermeasure techniques to the RPL control messages used to develop these techniques. Furthermore, we provide an in-depth statistical analysis that includes analysis of routing attacks through the RPL control messages, distribution of various mitigation techniques as per the method used, RPL control messages involved in the mitigation techniques, and details of the tools used by multiple researchers. In the end, we highlight some open challenges and future research opportunities on this topic. We believe that this survey will be beneficial to researchers and practitioners working in the area of RPL security.
RPL (Routing Protocol for Low-Power and Lossy Networks)是一种针对Low-Power and Lossy network (lln)的标准路由协议。它是IPv6低功耗无线个人区域网络(6LoWPAN)协议栈的一部分。诸如节能机制和安全操作模式的可用性等特性使RPL适用于受限的物联网(IoT)设备。因此,大多数物联网应用都依赖于RPL进行数据通信。然而,基于rpl的物联网网络中的路由安全是一个重要的问题,这促使我们研究和分析路由攻击,并提出针对它们的对策。为此,我们对基于rpl的物联网网络中最先进的安全威胁及其相应对策进行了全面调查。基于我们的研究,我们提出了一种新的分类方案,该方案使用RPL攻击及其对抗技术与用于开发这些技术的RPL控制消息之间的映射。此外,我们还提供了深入的统计分析,包括通过RPL控制消息对路由攻击进行分析,根据所使用的方法分发各种缓解技术,缓解技术中涉及的RPL控制消息,以及多个研究人员使用的工具的详细信息。最后,我们强调了该主题的一些开放挑战和未来的研究机会。我们相信,这项调查将有利于研究人员和从业者在RPL安全领域的工作。
{"title":"Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey","authors":"A. Bang, U. P. Rao, Pallavi Kaliyar, M. Conti","doi":"10.1145/3494524","DOIUrl":"https://doi.org/10.1145/3494524","url":null,"abstract":"Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) protocol stack. Features such as energy-efficient mechanisms and availability of the secure modes of operations make RPL suitable for the constrained Internet of Things (IoT) devices. Hence, the majority of IoT applications rely on RPL for data communication. However, routing security in RPL-based IoT networks is a significant concern, motivating us to study and analyze routing attacks and suggested countermeasures against them. To this end, we provide a comprehensive survey on the state-of-the-art security threats and their corresponding countermeasures in RPL-based IoT networks. Based on our study, we propose a novel classification scheme that uses a mapping between RPL attacks and their countermeasure techniques to the RPL control messages used to develop these techniques. Furthermore, we provide an in-depth statistical analysis that includes analysis of routing attacks through the RPL control messages, distribution of various mitigation techniques as per the method used, RPL control messages involved in the mitigation techniques, and details of the tools used by multiple researchers. In the end, we highlight some open challenges and future research opportunities on this topic. We believe that this survey will be beneficial to researchers and practitioners working in the area of RPL security.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"14 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86852051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Comprehensive Exploration of Languages for Parallel Computing 并行计算语言的综合探索
Pub Date : 2022-01-18 DOI: 10.1145/3485008
Federico Ciccozzi, Lorenzo Addazi, Sara Abbaspour Asadollah, B. Lisper, A. Masud, S. Mubeen
Software-intensive systems in most domains, from autonomous vehicles to health, are becoming predominantly parallel to efficiently manage large amount of data in short (even real-) time. There is an incredibly rich literature on languages for parallel computing, thus it is difficult for researchers and practitioners, even experienced in this very field, to get a grasp on them. With this work we provide a comprehensive, structured, and detailed snapshot of documented research on those languages to identify trends, technical characteristics, open challenges, and research directions. In this article, we report on planning, execution, and results of our systematic peer-reviewed as well as grey literature review, which aimed at providing such a snapshot by analysing 225 studies.
从自动驾驶汽车到医疗保健,大多数领域的软件密集型系统正变得主要是并行的,以便在短时间(甚至是实时)内有效地管理大量数据。关于并行计算语言的文献非常丰富,因此对于研究人员和实践者来说,即使是在这个领域有经验的人,也很难掌握它们。通过这项工作,我们为这些语言提供了一个全面、结构化和详细的文档研究快照,以确定趋势、技术特征、开放的挑战和研究方向。在本文中,我们报告了我们系统的同行评审和灰色文献综述的计划、执行和结果,旨在通过分析225项研究提供这样一个快照。
{"title":"A Comprehensive Exploration of Languages for Parallel Computing","authors":"Federico Ciccozzi, Lorenzo Addazi, Sara Abbaspour Asadollah, B. Lisper, A. Masud, S. Mubeen","doi":"10.1145/3485008","DOIUrl":"https://doi.org/10.1145/3485008","url":null,"abstract":"Software-intensive systems in most domains, from autonomous vehicles to health, are becoming predominantly parallel to efficiently manage large amount of data in short (even real-) time. There is an incredibly rich literature on languages for parallel computing, thus it is difficult for researchers and practitioners, even experienced in this very field, to get a grasp on them. With this work we provide a comprehensive, structured, and detailed snapshot of documented research on those languages to identify trends, technical characteristics, open challenges, and research directions. In this article, we report on planning, execution, and results of our systematic peer-reviewed as well as grey literature review, which aimed at providing such a snapshot by analysing 225 studies.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"48 1","pages":"1 - 39"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77361966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Query Processing on Heterogeneous CPU/GPU Systems 异构CPU/GPU系统的查询处理
Pub Date : 2022-01-17 DOI: 10.1145/3485126
Viktor Rosenfeld, S. Breß, V. Markl
Due to their high computational power and internal memory bandwidth, graphic processing units (GPUs) have been extensively studied by the database systems research community. A heterogeneous query processing system that employs CPUs and GPUs at the same time has to solve many challenges, including how to distribute the workload on processors with different capabilities; how to overcome the data transfer bottleneck; and how to support implementations for multiple processors efficiently. In this survey we devise a classification scheme to categorize techniques developed to address these challenges. Based on this scheme, we categorize query processing systems on heterogeneous CPU/GPU systems and identify open research problems.
由于图形处理单元(gpu)具有很高的计算能力和内部存储带宽,因此受到数据库系统研究界的广泛研究。一个同时使用cpu和gpu的异构查询处理系统必须解决许多挑战,包括如何在不同能力的处理器上分配工作负载;如何克服数据传输瓶颈;以及如何有效地支持多处理器的实现。在这项调查中,我们设计了一个分类方案来对为解决这些挑战而开发的技术进行分类。基于该方案,我们对异构CPU/GPU系统上的查询处理系统进行了分类,并识别出开放的研究问题。
{"title":"Query Processing on Heterogeneous CPU/GPU Systems","authors":"Viktor Rosenfeld, S. Breß, V. Markl","doi":"10.1145/3485126","DOIUrl":"https://doi.org/10.1145/3485126","url":null,"abstract":"Due to their high computational power and internal memory bandwidth, graphic processing units (GPUs) have been extensively studied by the database systems research community. A heterogeneous query processing system that employs CPUs and GPUs at the same time has to solve many challenges, including how to distribute the workload on processors with different capabilities; how to overcome the data transfer bottleneck; and how to support implementations for multiple processors efficiently. In this survey we devise a classification scheme to categorize techniques developed to address these challenges. Based on this scheme, we categorize query processing systems on heterogeneous CPU/GPU systems and identify open research problems.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"37 1","pages":"1 - 38"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83757027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis 无人机网络时代的安全回顾:威胁、对策和差距分析
Pub Date : 2022-01-17 DOI: 10.1145/3485272
Alessio Rugo, C. Ardagna, Nabil El Ioini
Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for commercial applications, embracing many domains ranging from human safety to the medical field, agriculture and environment, multimedia production, and even commercial delivery. This rise in popularity, however, is causing an increasing interest from criminals, making UAVs the target of new attacks. To fully characterize the current UAV cybersecurity landscape, we perform a complete literature review, digging into drone security historic facts and scientific studies on the matter, reviewing specialized articles and scientific papers focusing on cybersecurity threats and gaps in the context of small UAVs in commercial applications. Being a recent research and development area, most of the articles have been published between 2016 and 2020 as a direct consequence of the increase of security concerns and interest in the drone field. Papers in this review deal with UAV cyberthreats and related vulnerabilities, identifying flaws experimented in a lab or describing incidents detected in the field. Communication, sensors, and system misconfigurations are among the most important threat vectors, while sensor spoofing/jamming and malware DoS/control are among the most cited threats. Threat vectors permit depicting a complete overview of the topic and potential countermeasures known to date, with related gap analysis, also accounting for the recent Unmanned Aircraft System evolution toward ad hoc or cloud-based UAV networks. Countermeasures include the adoption of traditional communication encryption and standard protocols, GPS spoofing/jamming mitigation, encryption and privacy-aware implementations, and counter-malware techniques, to name the most adopted. It also emerges that often attacks are simply ported or adapted from other attacks in similar domains, while peculiar attacks still remain such as targeted physical attacks, specific UAV malware, and GPS spoofing/jamming.
无人驾驶飞行器(uav)正在成为商业应用的主要技术支持之一,涵盖了从人类安全到医疗领域、农业和环境、多媒体制作甚至商业交付的许多领域。然而,无人机受欢迎程度的上升引起了犯罪分子越来越大的兴趣,使无人机成为新的攻击目标。为了充分表征当前无人机网络安全格局,我们进行了完整的文献综述,深入研究了无人机安全的历史事实和科学研究,回顾了专注于小型无人机商业应用背景下的网络安全威胁和差距的专业文章和科学论文。作为一个最近的研究和开发领域,大多数文章都是在2016年至2020年之间发表的,这是对无人机领域安全问题和兴趣增加的直接后果。本综述中的论文涉及无人机网络威胁和相关漏洞,识别实验室实验中的缺陷或描述在现场发现的事件。通信、传感器和系统配置错误是最重要的威胁载体,而传感器欺骗/干扰和恶意软件DoS/控制是最常见的威胁。威胁向量允许描述该主题的完整概述和迄今为止已知的潜在对策,以及相关的差距分析,也说明了最近无人机系统向特设或基于云的无人机网络的演变。对策包括采用传统通信加密和标准协议,GPS欺骗/干扰缓解,加密和隐私感知实现,以及反恶意软件技术,这些是最常用的。通常,攻击只是简单地移植或改编自类似领域的其他攻击,而特殊攻击仍然存在,例如有针对性的物理攻击,特定的无人机恶意软件和GPS欺骗/干扰。
{"title":"A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis","authors":"Alessio Rugo, C. Ardagna, Nabil El Ioini","doi":"10.1145/3485272","DOIUrl":"https://doi.org/10.1145/3485272","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for commercial applications, embracing many domains ranging from human safety to the medical field, agriculture and environment, multimedia production, and even commercial delivery. This rise in popularity, however, is causing an increasing interest from criminals, making UAVs the target of new attacks. To fully characterize the current UAV cybersecurity landscape, we perform a complete literature review, digging into drone security historic facts and scientific studies on the matter, reviewing specialized articles and scientific papers focusing on cybersecurity threats and gaps in the context of small UAVs in commercial applications. Being a recent research and development area, most of the articles have been published between 2016 and 2020 as a direct consequence of the increase of security concerns and interest in the drone field. Papers in this review deal with UAV cyberthreats and related vulnerabilities, identifying flaws experimented in a lab or describing incidents detected in the field. Communication, sensors, and system misconfigurations are among the most important threat vectors, while sensor spoofing/jamming and malware DoS/control are among the most cited threats. Threat vectors permit depicting a complete overview of the topic and potential countermeasures known to date, with related gap analysis, also accounting for the recent Unmanned Aircraft System evolution toward ad hoc or cloud-based UAV networks. Countermeasures include the adoption of traditional communication encryption and standard protocols, GPS spoofing/jamming mitigation, encryption and privacy-aware implementations, and counter-malware techniques, to name the most adopted. It also emerges that often attacks are simply ported or adapted from other attacks in similar domains, while peculiar attacks still remain such as targeted physical attacks, specific UAV malware, and GPS spoofing/jamming.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"34 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79379200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features 二进制码指纹识别方法综述:分类、方法和特征
Pub Date : 2022-01-17 DOI: 10.1145/3486860
S. Alrabaee, M. Debbabi, Lingyu Wang
Binary code fingerprinting is crucial in many security applications. Examples include malware detection, software infringement, vulnerability analysis, and digital forensics. It is also useful for security researchers and reverse engineers since it enables high fidelity reasoning about the binary code such as revealing the functionality, authorship, libraries used, and vulnerabilities. Numerous studies have investigated binary code with the goal of extracting fingerprints that can illuminate the semantics of a target application. However, extracting fingerprints is a challenging task since a substantial amount of significant information will be lost during compilation, notably, variable and function naming, the original data and control flow structures, comments, semantic information, and the code layout. This article provides the first systematic review of existing binary code fingerprinting approaches and the contexts in which they are used. In addition, it discusses the applications that rely on binary code fingerprints, the information that can be captured during the fingerprinting process, and the approaches used and their implementations. It also addresses limitations and open questions related to the fingerprinting process and proposes future directions.
二进制码指纹识别在许多安全应用中是至关重要的。示例包括恶意软件检测、软件侵权、漏洞分析和数字取证。它对安全研究人员和逆向工程师也很有用,因为它支持对二进制代码进行高保真的推理,例如揭示功能、作者、使用的库和漏洞。许多研究研究了二进制代码,目的是提取能够阐明目标应用程序语义的指纹。然而,提取指纹是一项具有挑战性的任务,因为在编译过程中会丢失大量重要信息,特别是变量和函数命名、原始数据和控制流结构、注释、语义信息和代码布局。本文首次系统地回顾了现有的二进制代码指纹识别方法及其使用环境。此外,还讨论了依赖于二进制码指纹的应用程序、指纹过程中可以捕获的信息、所使用的方法及其实现。它还解决了与指纹识别过程有关的限制和开放问题,并提出了未来的方向。
{"title":"A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features","authors":"S. Alrabaee, M. Debbabi, Lingyu Wang","doi":"10.1145/3486860","DOIUrl":"https://doi.org/10.1145/3486860","url":null,"abstract":"Binary code fingerprinting is crucial in many security applications. Examples include malware detection, software infringement, vulnerability analysis, and digital forensics. It is also useful for security researchers and reverse engineers since it enables high fidelity reasoning about the binary code such as revealing the functionality, authorship, libraries used, and vulnerabilities. Numerous studies have investigated binary code with the goal of extracting fingerprints that can illuminate the semantics of a target application. However, extracting fingerprints is a challenging task since a substantial amount of significant information will be lost during compilation, notably, variable and function naming, the original data and control flow structures, comments, semantic information, and the code layout. This article provides the first systematic review of existing binary code fingerprinting approaches and the contexts in which they are used. In addition, it discusses the applications that rely on binary code fingerprints, the information that can be captured during the fingerprinting process, and the approaches used and their implementations. It also addresses limitations and open questions related to the fingerprinting process and proposes future directions.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"36 1","pages":"1 - 41"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76761827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
ACM Computing Surveys (CSUR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1