{"title":"Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach","authors":"G. Spanoudakis, E. Damiani, A. Maña","doi":"10.1109/HASE.2012.16","DOIUrl":"https://doi.org/10.1109/HASE.2012.16","url":null,"abstract":"The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted computing proofs. CUMULUS is a novel infrastructure for realising such certification models.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenke Zhang, F. Bastani, I. Yen, K. Hulin, F. Bastani, L. Khan
{"title":"Real-Time Anomaly Detection in Streams of Execution Traces","authors":"Wenke Zhang, F. Bastani, I. Yen, K. Hulin, F. Bastani, L. Khan","doi":"10.1109/HASE.2012.13","DOIUrl":"https://doi.org/10.1109/HASE.2012.13","url":null,"abstract":"For deployed systems, software fault detection can be challenging. Generally, faulty behaviors are detected based on execution logs, which may contain a large volume of execution traces, making analysis extremely difficult. This paper investigates and compares the effectiveness and efficiency of various data mining techniques for software fault detection based on execution logs, including clustering based, density based, and probabilistic automata based methods. However, some existing algorithms suffer from high complexity and do not scale well to large datasets. To address this problem, we present a suite of prefix tree based anomaly detection techniques. The prefix tree model serves as a compact loss less data representation of execution traces. Also, the prefix tree distance metric provides an effective heuristic to guide the search for execution traces having close proximity to each other. In the density based algorithm, the prefix tree distance is used to confine the K-nearest neighbor search to a small subset of the nodes, which greatly reduces the computing time without sacrificing accuracy. Experimental studies show a significant speedup in our prefix tree based and prefix tree distance guided approaches, from days to minutes in the best cases, in automated identification of software failures.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Figueiras, Jesper Grønbæk, A. Ceccarelli, H. Schwefel
{"title":"GPS and Electronic Fence Data Fusion for Positioning within Railway Worksite Scenarios","authors":"J. Figueiras, Jesper Grønbæk, A. Ceccarelli, H. Schwefel","doi":"10.1109/HASE.2012.30","DOIUrl":"https://doi.org/10.1109/HASE.2012.30","url":null,"abstract":"Context-dependent decisions in safety-critical applications require careful consideration of accuracy and timeliness of the underlying context information. Relevant examples include location-dependent actions in mobile distributed systems. This paper considers localization functions for personalized warning systems for railway workers, where the safety aspects require timely and precise identification whether a worker is located in a dangerous (red) or safe (green) zone within the worksite. The paper proposes and analyzes a data fusion approach based on low-cost GPS receivers integrated on mobile devices, combined with electronic fences strategically placed in the adjacent boundaries between safe and unsafe geographic zones. An approach based on the combination of a Kalman Filter for GPS-based trajectory estimation and a Hidden Markov Model for inclusion of mobility constraints and fusion with information from the electronic fences is developed and analyzed. Different accuracy metrics are proposed and the benefit obtained from the fusion with electronic fences is quantitatively analyzed in the scenarios of a single mobile entity: By having fence information, the correct zone estimation can increase by 30%, while false alarms can be reduced one order of magnitude in the tested scenario.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreas Johnsen, K. Lundqvist, P. Pettersson, Omar Jaradat
{"title":"Automated Verification of AADL-Specifications Using UPPAAL","authors":"Andreas Johnsen, K. Lundqvist, P. Pettersson, Omar Jaradat","doi":"10.1109/HASE.2012.22","DOIUrl":"https://doi.org/10.1109/HASE.2012.22","url":null,"abstract":"The Architecture Analysis and Design Language (AADL) is used to represent architecture design decisions of safety-critical and real-time embedded systems. Due to the far-reaching effects these decisions have on the development process, an architecture design fault is likely to have a significant deteriorating impact through the complete process. Automated fault avoidance of architecture design decisions therefore has the potential to significantly reduce the cost of the development while increasing the dependability of the end product. To provide means for automated fault avoidance when developing systems specified in AADL, a formal verification technique has been developed to ensure completeness and consistency of an AADL specification as well as its conformity with the end product. The approach requires the semantics of AADL to be formalized and implemented. We use the methodology of semantic anchoring to contribute with a formal and implemented semantics of a subset of AADL through a set of transformation rules to timed automata constructs. In addition, the verification technique, including the transformation rules, is validated using a case study of a safety-critical fuel-level system developed by a major vehicle manufacturer.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Tool-Supported Model Based Safety Analysis -- Progress and Experiences in SAML Development","authors":"Michael Lipaczewski, S. Struck, F. Ortmeier","doi":"10.1109/HASE.2012.34","DOIUrl":"https://doi.org/10.1109/HASE.2012.34","url":null,"abstract":"Software controls in technical systems are becoming more and more important and complex. Model based safety analysis can give provably correct and complete results, often in a fully automatic way. These methods can answer both logical and probabilistic questions. In common practice, the needed models must be specified in different input languages of different tools depending on the chosen verification tool for the desired aspect. This is time consuming and error-prone. To cope with this problem we developed the safety analysis modeling language (SAML). In this paper, we present a new tool to intuitively create probabilistic, non-deterministic and deterministic specifications for formal analysis. The goal is to give tool-support during modeling and thus make building a formal model less error-prone. The model is then automatically transformed into the input language of state of the art verification engines. We illustrate the approach on a case-study from nuclear power plant domain.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication Efficient Oblivious Transfer Using Elliptic Curves","authors":"Abhishek Parakh","doi":"10.1109/HASE.2012.14","DOIUrl":"https://doi.org/10.1109/HASE.2012.14","url":null,"abstract":"This paper presents communication efficient protocols for oblivious transfer (OT) using elliptic curve cryptography (ECC). ECC provides better security than RSA for the same key length and is known to have faster implementations. We provide protocols for 1-out-of-2 and 1-out-of-n oblivious transfer in which the latter requires the sender to send only n+2 elements over the network and the receiver sends only one messages over the network.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126389562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Reduce the Cost of Passive Testing","authors":"César Andrés, A. Cavalli","doi":"10.1109/HASE.2012.36","DOIUrl":"https://doi.org/10.1109/HASE.2012.36","url":null,"abstract":"This paper presents an extension of the methodology to perform passive testing based on invariants for systems that present temporal restrictions. Invariants represent the most relevant expected properties of the implementation under test. Intuitively, an invariant expresses the fact that each time the implementation under test performs a given sequence of actions, then it must exhibit a behavior in a lapse of time reflected in the invariant. When a trace is checked against an invariant, for each input/output action that appears in the trace then the complete set of invariants is checked. That is, it is assumed that invariants must hold at any point of the trace, and the cost of checking this process depends on the length of the trace and the number of invariants. In this paper a novel approach that allows us to âactivateâ and âdeactivateâ some invariants during the testing task is presented. Within this approach automatically the number of invariants that must be checked can be decreased at runtime, which causes a reduction in the cost of the testing task without loosing any power of error detection.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MDA-based Approach for Developing Simulation-Oriented Combat Flows","authors":"Hong Lu, Li Zhang, Zhao Liu","doi":"10.1109/HASE.2012.32","DOIUrl":"https://doi.org/10.1109/HASE.2012.32","url":null,"abstract":"Combat flow simulation is usually used to evaluate combat effectiveness. For development of combat flows based on special simulation platforms, both combat flows and platform-specific information need to be concerned. To separate concerns on combat flows and platform-specific information and improve productivity and accuracy during the development, a MDA-based approach for developing simulation-oriented combat flows is proposed in this paper. In the approach, original combat flows and platform specific combat flows are respectively regarded as Platform Independent Models (PIMs) and Platform Specific Models (PSMs) to separate concerns, and automatic transformation from PIMs to PSMs is realized. Moreover, this approach combines independent variation point units and primary-secondary templates to transform PSMs to simulation code automatically. An eclipse-based tool is developed to support the approach and applied to ship-borne combat systems. Results of application show that our approach and tool can improve productivity and accuracy during the development of simulation-oriented combat flows.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. B. Copet, A. Pironti, D. Pozza, R. Sisto, P. Vivoli
{"title":"Visual model-driven design, verification and implementation of security protocols","authors":"P. B. Copet, A. Pironti, D. Pozza, R. Sisto, P. Vivoli","doi":"10.1109/HASE.2012.23","DOIUrl":"https://doi.org/10.1109/HASE.2012.23","url":null,"abstract":"A novel visual model-driven approach to security protocol design, verification, and implementation is presented in this paper. User-friendly graphical models are combined with rigorous formal methods to enable protocol verification and sound automatic code generation. Domain-specific abstractions keep the graphical models simple, yet powerful enough to represent complex, realistic protocols such as SSH. The main contribution is to bring together aspects that were only partially available or not available at all in previous proposals.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134324831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Autonomic Reliability Improvement System for Cyber-Physical Systems","authors":"Leon Wu, G. Kaiser","doi":"10.1109/HASE.2012.33","DOIUrl":"https://doi.org/10.1109/HASE.2012.33","url":null,"abstract":"System reliability is a fundamental requirement of cyber-physical systems. Unreliable systems can lead to disruption of service, financial cost and even loss of human life. Typical cyber-physical systems are designed to process large amounts of data, employ software as a system component, run online continuously and retain an operator-in-the-loop because of human judgment and accountability requirements for safety-critical systems. This paper describes a data-centric runtime monitoring system named ARIS (Autonomic Reliability Improvement System) for improving the reliability of these types of cyber-physical systems. ARIS employs automated online evaluation, working in parallel with the cyber-physical system to continuously conduct automated evaluation at multiple stages in the system workflow and provide real-time feedback for reliability improvement. This approach enables effective evaluation of data from cyber-physical systems. For example, abnormal input and output data can be detected and flagged through data quality analysis. As a result, alerts can be sent to the operator-in-the-loop, who can then take actions and make changes to the system based on these alerts in order to achieve minimal system downtime and higher system reliability. We have implemented ARIS in a large commercial building cyber-physical system in New York City, and our experiment has shown that it is effective and efficient in improving building system reliability.","PeriodicalId":214862,"journal":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128088702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}