2012 IEEE 14th International Symposium on High-Assurance Systems Engineering最新文献

筛选
英文 中文
Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach 云服务认证:混合、增量和多层方法的案例
G. Spanoudakis, E. Damiani, A. Maña
{"title":"Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach","authors":"G. Spanoudakis, E. Damiani, A. Maña","doi":"10.1109/HASE.2012.16","DOIUrl":"https://doi.org/10.1109/HASE.2012.16","url":null,"abstract":"The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted computing proofs. CUMULUS is a novel infrastructure for realising such certification models.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Real-Time Anomaly Detection in Streams of Execution Traces 执行轨迹流中的实时异常检测
Wenke Zhang, F. Bastani, I. Yen, K. Hulin, F. Bastani, L. Khan
{"title":"Real-Time Anomaly Detection in Streams of Execution Traces","authors":"Wenke Zhang, F. Bastani, I. Yen, K. Hulin, F. Bastani, L. Khan","doi":"10.1109/HASE.2012.13","DOIUrl":"https://doi.org/10.1109/HASE.2012.13","url":null,"abstract":"For deployed systems, software fault detection can be challenging. Generally, faulty behaviors are detected based on execution logs, which may contain a large volume of execution traces, making analysis extremely difficult. This paper investigates and compares the effectiveness and efficiency of various data mining techniques for software fault detection based on execution logs, including clustering based, density based, and probabilistic automata based methods. However, some existing algorithms suffer from high complexity and do not scale well to large datasets. To address this problem, we present a suite of prefix tree based anomaly detection techniques. The prefix tree model serves as a compact loss less data representation of execution traces. Also, the prefix tree distance metric provides an effective heuristic to guide the search for execution traces having close proximity to each other. In the density based algorithm, the prefix tree distance is used to confine the K-nearest neighbor search to a small subset of the nodes, which greatly reduces the computing time without sacrificing accuracy. Experimental studies show a significant speedup in our prefix tree based and prefix tree distance guided approaches, from days to minutes in the best cases, in automated identification of software failures.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GPS and Electronic Fence Data Fusion for Positioning within Railway Worksite Scenarios 铁路工地GPS与电子围栏数据融合定位
J. Figueiras, Jesper Grønbæk, A. Ceccarelli, H. Schwefel
{"title":"GPS and Electronic Fence Data Fusion for Positioning within Railway Worksite Scenarios","authors":"J. Figueiras, Jesper Grønbæk, A. Ceccarelli, H. Schwefel","doi":"10.1109/HASE.2012.30","DOIUrl":"https://doi.org/10.1109/HASE.2012.30","url":null,"abstract":"Context-dependent decisions in safety-critical applications require careful consideration of accuracy and timeliness of the underlying context information. Relevant examples include location-dependent actions in mobile distributed systems. This paper considers localization functions for personalized warning systems for railway workers, where the safety aspects require timely and precise identification whether a worker is located in a dangerous (red) or safe (green) zone within the worksite. The paper proposes and analyzes a data fusion approach based on low-cost GPS receivers integrated on mobile devices, combined with electronic fences strategically placed in the adjacent boundaries between safe and unsafe geographic zones. An approach based on the combination of a Kalman Filter for GPS-based trajectory estimation and a Hidden Markov Model for inclusion of mobility constraints and fusion with information from the electronic fences is developed and analyzed. Different accuracy metrics are proposed and the benefit obtained from the fusion with electronic fences is quantitatively analyzed in the scenarios of a single mobile entity: By having fence information, the correct zone estimation can increase by 30%, while false alarms can be reduced one order of magnitude in the tested scenario.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated Verification of AADL-Specifications Using UPPAAL 使用UPPAAL自动验证aadl规格
Andreas Johnsen, K. Lundqvist, P. Pettersson, Omar Jaradat
{"title":"Automated Verification of AADL-Specifications Using UPPAAL","authors":"Andreas Johnsen, K. Lundqvist, P. Pettersson, Omar Jaradat","doi":"10.1109/HASE.2012.22","DOIUrl":"https://doi.org/10.1109/HASE.2012.22","url":null,"abstract":"The Architecture Analysis and Design Language (AADL) is used to represent architecture design decisions of safety-critical and real-time embedded systems. Due to the far-reaching effects these decisions have on the development process, an architecture design fault is likely to have a significant deteriorating impact through the complete process. Automated fault avoidance of architecture design decisions therefore has the potential to significantly reduce the cost of the development while increasing the dependability of the end product. To provide means for automated fault avoidance when developing systems specified in AADL, a formal verification technique has been developed to ensure completeness and consistency of an AADL specification as well as its conformity with the end product. The approach requires the semantics of AADL to be formalized and implemented. We use the methodology of semantic anchoring to contribute with a formal and implemented semantics of a subset of AADL through a set of transformation rules to timed automata constructs. In addition, the verification technique, including the transformation rules, is validated using a case study of a safety-critical fuel-level system developed by a major vehicle manufacturer.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Using Tool-Supported Model Based Safety Analysis -- Progress and Experiences in SAML Development 基于工具支持模型的安全分析——SAML开发的进展与经验
Michael Lipaczewski, S. Struck, F. Ortmeier
{"title":"Using Tool-Supported Model Based Safety Analysis -- Progress and Experiences in SAML Development","authors":"Michael Lipaczewski, S. Struck, F. Ortmeier","doi":"10.1109/HASE.2012.34","DOIUrl":"https://doi.org/10.1109/HASE.2012.34","url":null,"abstract":"Software controls in technical systems are becoming more and more important and complex. Model based safety analysis can give provably correct and complete results, often in a fully automatic way. These methods can answer both logical and probabilistic questions. In common practice, the needed models must be specified in different input languages of different tools depending on the chosen verification tool for the desired aspect. This is time consuming and error-prone. To cope with this problem we developed the safety analysis modeling language (SAML). In this paper, we present a new tool to intuitively create probabilistic, non-deterministic and deterministic specifications for formal analysis. The goal is to give tool-support during modeling and thus make building a formal model less error-prone. The model is then automatically transformed into the input language of state of the art verification engines. We illustrate the approach on a case-study from nuclear power plant domain.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Communication Efficient Oblivious Transfer Using Elliptic Curves 基于椭圆曲线的通信高效无关传输
Abhishek Parakh
{"title":"Communication Efficient Oblivious Transfer Using Elliptic Curves","authors":"Abhishek Parakh","doi":"10.1109/HASE.2012.14","DOIUrl":"https://doi.org/10.1109/HASE.2012.14","url":null,"abstract":"This paper presents communication efficient protocols for oblivious transfer (OT) using elliptic curve cryptography (ECC). ECC provides better security than RSA for the same key length and is known to have faster implementations. We provide protocols for 1-out-of-2 and 1-out-of-n oblivious transfer in which the latter requires the sender to send only n+2 elements over the network and the receiver sends only one messages over the network.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126389562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How to Reduce the Cost of Passive Testing 如何降低被动检测的成本
César Andrés, A. Cavalli
{"title":"How to Reduce the Cost of Passive Testing","authors":"César Andrés, A. Cavalli","doi":"10.1109/HASE.2012.36","DOIUrl":"https://doi.org/10.1109/HASE.2012.36","url":null,"abstract":"This paper presents an extension of the methodology to perform passive testing based on invariants for systems that present temporal restrictions. Invariants represent the most relevant expected properties of the implementation under test. Intuitively, an invariant expresses the fact that each time the implementation under test performs a given sequence of actions, then it must exhibit a behavior in a lapse of time reflected in the invariant. When a trace is checked against an invariant, for each input/output action that appears in the trace then the complete set of invariants is checked. That is, it is assumed that invariants must hold at any point of the trace, and the cost of checking this process depends on the length of the trace and the number of invariants. In this paper a novel approach that allows us to âactivateâ and âdeactivateâ some invariants during the testing task is presented. Within this approach automatically the number of invariants that must be checked can be decreased at runtime, which causes a reduction in the cost of the testing task without loosing any power of error detection.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A MDA-based Approach for Developing Simulation-Oriented Combat Flows 一种基于mda的面向仿真的作战流程开发方法
Hong Lu, Li Zhang, Zhao Liu
{"title":"A MDA-based Approach for Developing Simulation-Oriented Combat Flows","authors":"Hong Lu, Li Zhang, Zhao Liu","doi":"10.1109/HASE.2012.32","DOIUrl":"https://doi.org/10.1109/HASE.2012.32","url":null,"abstract":"Combat flow simulation is usually used to evaluate combat effectiveness. For development of combat flows based on special simulation platforms, both combat flows and platform-specific information need to be concerned. To separate concerns on combat flows and platform-specific information and improve productivity and accuracy during the development, a MDA-based approach for developing simulation-oriented combat flows is proposed in this paper. In the approach, original combat flows and platform specific combat flows are respectively regarded as Platform Independent Models (PIMs) and Platform Specific Models (PSMs) to separate concerns, and automatic transformation from PIMs to PSMs is realized. Moreover, this approach combines independent variation point units and primary-secondary templates to transform PSMs to simulation code automatically. An eclipse-based tool is developed to support the approach and applied to ship-borne combat systems. Results of application show that our approach and tool can improve productivity and accuracy during the development of simulation-oriented combat flows.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual model-driven design, verification and implementation of security protocols 可视化模型驱动的安全协议设计、验证和实现
P. B. Copet, A. Pironti, D. Pozza, R. Sisto, P. Vivoli
{"title":"Visual model-driven design, verification and implementation of security protocols","authors":"P. B. Copet, A. Pironti, D. Pozza, R. Sisto, P. Vivoli","doi":"10.1109/HASE.2012.23","DOIUrl":"https://doi.org/10.1109/HASE.2012.23","url":null,"abstract":"A novel visual model-driven approach to security protocol design, verification, and implementation is presented in this paper. User-friendly graphical models are combined with rigorous formal methods to enable protocol verification and sound automatic code generation. Domain-specific abstractions keep the graphical models simple, yet powerful enough to represent complex, realistic protocols such as SSH. The main contribution is to bring together aspects that were only partially available or not available at all in previous proposals.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134324831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Autonomic Reliability Improvement System for Cyber-Physical Systems 信息物理系统的自主可靠性改进系统
Leon Wu, G. Kaiser
{"title":"An Autonomic Reliability Improvement System for Cyber-Physical Systems","authors":"Leon Wu, G. Kaiser","doi":"10.1109/HASE.2012.33","DOIUrl":"https://doi.org/10.1109/HASE.2012.33","url":null,"abstract":"System reliability is a fundamental requirement of cyber-physical systems. Unreliable systems can lead to disruption of service, financial cost and even loss of human life. Typical cyber-physical systems are designed to process large amounts of data, employ software as a system component, run online continuously and retain an operator-in-the-loop because of human judgment and accountability requirements for safety-critical systems. This paper describes a data-centric runtime monitoring system named ARIS (Autonomic Reliability Improvement System) for improving the reliability of these types of cyber-physical systems. ARIS employs automated online evaluation, working in parallel with the cyber-physical system to continuously conduct automated evaluation at multiple stages in the system workflow and provide real-time feedback for reliability improvement. This approach enables effective evaluation of data from cyber-physical systems. For example, abnormal input and output data can be detected and flagged through data quality analysis. As a result, alerts can be sent to the operator-in-the-loop, who can then take actions and make changes to the system based on these alerts in order to achieve minimal system downtime and higher system reliability. We have implemented ARIS in a large commercial building cyber-physical system in New York City, and our experiment has shown that it is effective and efficient in improving building system reliability.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128088702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信