MPM '12Pub Date : 2012-10-01DOI: 10.1145/2508443.2508448
Sean Whitsitt, J. Sprinkle, Roman L. Lysecky
{"title":"An overseer control methodology for data adaptable embedded systems","authors":"Sean Whitsitt, J. Sprinkle, Roman L. Lysecky","doi":"10.1145/2508443.2508448","DOIUrl":"https://doi.org/10.1145/2508443.2508448","url":null,"abstract":"The performance of software algorithms can be improved by performing those algorithms on specialized embedded hardware. However, complex algorithms that rely on input data at runtime for configuration have a combinatorial explosion of possible configurations, which has historically put hardware acceleration out of reach for applications wishing to serve large configuration spaces. Data adaptable embedded systems overcome this limitation by allowing for hardware reconfiguration during runtime, but the complexity of the specification of these systems is difficult to manage with traditional techniques. In this paper, a modeling approach is discussed in order to concurrently model two aspects of the final system: dependencies between algorithm tasks, and desired hardware configurations for each task. The contribution of the work is the model-based generation of hardware and software tasks, as well as a control scheme customized to each model that oversees the dynamic reconfiguration process.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128522916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-10-01DOI: 10.1145/2508443.2508455
Henrik Steudel, R. Hebig, H. Giese
{"title":"A build server for model-driven engineering","authors":"Henrik Steudel, R. Hebig, H. Giese","doi":"10.1145/2508443.2508455","DOIUrl":"https://doi.org/10.1145/2508443.2508455","url":null,"abstract":"Model-driven engineering (MDE) is more and more used in collaborative settings. Therefore, the usage of build servers to gain early integration of different system parts is desirable. Current build server technologies only consider fully automated operations. Further, the availability of all described artifacts is necessary for a correct run. However, in MDE manual activities can occur in between automated operations, which also prevents that all necessary artifacts are already available when the build starts. Therefore, state of the art build techniques are not sufficient to support MDE development. In this paper, we present a build server prototype which is designed to fit the needs of development with multiple paradigms and languages.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-09-30DOI: 10.1145/2508443.2508450
Dominique Blouin, E. Senn, K. Roussel, Olivier Zendra
{"title":"QAML: a multi-paradigm DSML for quantitative analysis of embedded system architecture models","authors":"Dominique Blouin, E. Senn, K. Roussel, Olivier Zendra","doi":"10.1145/2508443.2508450","DOIUrl":"https://doi.org/10.1145/2508443.2508450","url":null,"abstract":"In this paper, the QAML (Quantitative Analysis Modeling Language) DSML is presented. It is a formalism for representing quantitative analysis models applied to embedded system architecture models. Issued from the need to standardize the representation of heterogeneous power consumption analysis models, QAML has been generalized to support the analysis of arbitrary physical quantities. Following a Multi-Paradigm Modeling (MPM) approach and the principle of separation of concerns, QAML combines a set of DSMLs such as the SysML QUDV annex, the W3C MathML and other custom DSMLs to favor interoperability and reuse. Using an enhanced Atlas Model Weaving language, embedded systems architecture models of arbitrary languages such as AADL can be annotated with quantitative estimation models issued from measurements campaigns, numerical simulations or other means. The complete set of models in the MPM environment is interpretable to provide analysis results in system architecture models.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-04-10DOI: 10.1145/2181196.2181198
David Evans, D. Eyers, J. Bacon
{"title":"A model of information flow control to determine whether malfunctions cause the privacy invasion","authors":"David Evans, D. Eyers, J. Bacon","doi":"10.1145/2181196.2181198","DOIUrl":"https://doi.org/10.1145/2181196.2181198","url":null,"abstract":"Privacy is difficult to assure in complex systems that collect, process, and store data about individuals. The problem is particularly acute when data arise from sensing physical phenomena as individuals are unlikely to realise that actions such as walking past a building generate privacy-sensitive data. Information Flow Control (IFC) is a mature technique for managing security and privacy concerns in large distributed systems. This paper describes (i) how the meta-data required by IFC, in the form of tags, can reflect the physical properties of sensors; and (ii) how the formal expression of the IFC this allows can be used to, statically, determine the proportion of the system that handles private data and how this changes in the face of software or human malfunctions.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"7 49","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131436213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-04-10DOI: 10.1145/2181196.2181205
H. Hofinger, Alexander Kiening, P. Schoo
{"title":"When browsing leaves footprints: automatically detect privacy violations","authors":"H. Hofinger, Alexander Kiening, P. Schoo","doi":"10.1145/2181196.2181205","DOIUrl":"https://doi.org/10.1145/2181196.2181205","url":null,"abstract":"Web sites use a number of different techniques to gather information about the behavior and interests of their visitors. In many cases this collection happens without the knowledge of the visitors and is continued across different domains in the world wide web. This allows organizations to gain a huge amount of personal information about users. We present a tool named PRIVIDOR (PRIvacy VIolation DetectOR) that allows to detect potential privacy violations on web sites and create reports containing its findings. The design goal of PRIVIDOR is to integrate as many as possible evaluations into one server based tool. The tool helps to evaluate the web sites policies concerning the handling of their visitors privacy.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123845137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-04-10DOI: 10.1145/2181196.2181204
Panagiotis Georgopoulos, B. McCarthy, C. Edwards
{"title":"Providing secure and accountable privacy to roaming 802.11 mobile devices","authors":"Panagiotis Georgopoulos, B. McCarthy, C. Edwards","doi":"10.1145/2181196.2181204","DOIUrl":"https://doi.org/10.1145/2181196.2181204","url":null,"abstract":"Nowadays, roaming individuals require ubiquitous, effortless, secure and private \"on-the-go\" connectivity for their Mobile Device (MD). At the same time, WiFi Access Networks (ANs) need to offer connectivity to MDs in an accountable and credible manner to avoid compromising their security policies. Our approach efficiently satisfies these conflicting requirements, and presents a solution where the MD does not have to disclose its identity when requesting network access. At the same time, the AN has a uniquely identifying alias for the MD, to account and profile for the connectivity it provides to it. The evaluation of our implementation on a live experimental testbed, demonstrates that our solution's overhead is remarkably low for the benefits it provides, and highlights its applicability and efficiency for real world deployment in the current Internet infrastructure.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-04-10DOI: 10.1145/2181196.2181200
Iraklis Leontiadis, C. Delakouridis, L. Kazatzopoulos, G. Marias
{"title":"ANOSIP: anonymizing the SIP protocol","authors":"Iraklis Leontiadis, C. Delakouridis, L. Kazatzopoulos, G. Marias","doi":"10.1145/2181196.2181200","DOIUrl":"https://doi.org/10.1145/2181196.2181200","url":null,"abstract":"Enhancing anonymity in the Session Initiation Protocol (SIP) is much more than sealing participants' identities. It requires methods to unlink the communication parties and relax their proximity identification. These requirements should be fulfilled under several prerequisites, such as time limitation for session establishment, involvement of several functional entities for session management, inter-domain communications and support of streaming services when the session is established. In this paper we propose the usage of a privacy enhancement framework, called Mist, as a solution to the anonymity issue in SIP. For achieving anonymity, the original Mist architecture was modified to be adapted in the SIP framework. We evaluate the adapted Mist framework to SIP and measure how efficiently it supports anonymity features.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-04-10DOI: 10.1145/2181196.2181197
Marc Rennhard, M. Tschannen, T. Christen
{"title":"SecureSafe: a highly secure online data safe industrial use case","authors":"Marc Rennhard, M. Tschannen, T. Christen","doi":"10.1145/2181196.2181197","DOIUrl":"https://doi.org/10.1145/2181196.2181197","url":null,"abstract":"In this paper, we present the core security architecture of SecureSafe, a cloud service that provides a highly secure online storage for sensitive data. The architecture combines best practices in cryptography and security protocols with novel approaches to offer high security while providing good usability and performance. More than two years of successful operation with many satisfied customers and no security incidents demonstrate the soundness of the architecture. In addition to granting insight into the security architecture of a field-proven service to provide inputs for other services that have similar requirements, there's another motivation for this paper: We believe that to increase trust in cloud services, service providers should be more open about internal security details -- although this is in contrast to what typical cloud service providers do today.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131675303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-04-10DOI: 10.1145/2181196.2181202
Volkan Cambazoglu, C. Rohner, B. Victor
{"title":"The impact of trace and adversary models on location privacy provided by K-anonymity","authors":"Volkan Cambazoglu, C. Rohner, B. Victor","doi":"10.1145/2181196.2181202","DOIUrl":"https://doi.org/10.1145/2181196.2181202","url":null,"abstract":"Privacy preserving mechanisms help users of location-based services to balance their location privacy while still getting useful results from the service. The provided location privacy depends on the users' behavior and an adversary's knowledge used to locate the users. The aim of this paper is to investigate how users' mobility patterns and adversaries' knowledge affect the location privacy of users querying a location-based service. We consider three mobility trace models in order to generate user traces that cross each other, are parallel to each other and form a circular shape. Furthermore, we consider four adversary models, which are distinguished according to their level of knowledge of users. We simulate the trace and the adversary models by using Distortion-based Metric and K-anonymity. The results show that the location privacy provided by K-anonymity decreases, as users are located closer to each other in the trace models. The impact of the adversary on location privacy is reduced as more users are cloaked together.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MPM '12Pub Date : 2012-04-10DOI: 10.1145/2181196.2181199
S. Gambs, M. Killijian, Miguel Núñez del Prado Cortez
{"title":"Next place prediction using mobility Markov chains","authors":"S. Gambs, M. Killijian, Miguel Núñez del Prado Cortez","doi":"10.1145/2181196.2181199","DOIUrl":"https://doi.org/10.1145/2181196.2181199","url":null,"abstract":"In this paper, we address the issue of predicting the next location of an individual based on the observations of his mobility behavior over some period of time and the recent locations that he has visited. This work has several potential applications such as the evaluation of geo-privacy mechanisms, the development of location-based services anticipating the next movement of a user and the design of location-aware proactive resource migration. In a nutshell, we extend a mobility model called Mobility Markov Chain (MMC) in order to incorporate the n previous visited locations and we develop a novel algorithm for next location prediction based on this mobility model that we coined as n-MMC. The evaluation of the efficiency of our algorithm on three different datasets demonstrates an accuracy for the prediction of the next location in the range of 70% to 95% as soon as n = 2.","PeriodicalId":176268,"journal":{"name":"MPM '12","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}