{"title":"Approximation of the Time Alignment Error for Measurements in Electricity Grids","authors":"Imad Antonios, H. Schwefel, L. Lipsky","doi":"10.1109/EDCC.2019.00038","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00038","url":null,"abstract":"Measurements of parameters in electricity grids are frequently captured as average values over some time interval. In scenarios of distributed measurements such as in distribution grids, offsets of local clocks can result in misaligned averaging intervals. This paper investigates the properties of the so-called time alignment error of such measurands that is caused by shifts of the averaging interval. We extend a previously derived Markov-modulated model and provide an approximation of the variance of the time alignment error. The model accounts for slow-decaying correlation structure found in actual traces of electrical measures. We compare results of three electrical measures for 20 traces with numerical results and simulations from the the fitted Markov model.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125417646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicola Nostro, Kamal Shahid, A. Bondavalli, H. Schwefel
{"title":"Resilient Access to Heterogeneous Measurement Data for Grid Observability","authors":"Nicola Nostro, Kamal Shahid, A. Bondavalli, H. Schwefel","doi":"10.1109/EDCC.2019.00043","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00043","url":null,"abstract":"The ability to fuse data from heterogeneous sources (such as Smart Meters etc.) in the low-voltage grid highly depends on the communication and data management infrastructure that allows an exchange of information between different grid assets. Failure or any attempt to attack this data fusion solution can lead to inefficient grid operation and in worst case even blackouts. Therefore, this paper describes methodologies to cope with threats and faults in a low-voltage grid scenario to provide resilient access to the heterogeneous measurement data.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125706228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Impact of Measurement Errors on Loss Calculations in Distribution Grids","authors":"H. Schwefel, J. Rasmussen, R. Olsen, N. Silva","doi":"10.1109/EDCC.2019.00039","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00039","url":null,"abstract":"Power or energy losses are an important metric to describe efficiency of distribution grids. They can also be relevant input metrics for fault and theft detection approaches. When considering low-voltage grids, power losses have to be obtained from distributed low-cost measurement devices, which leads to measurement inaccuracies. When calculating power losses, these measurement inaccuracies need to be taken into account. This paper presents first steps for obtaining unbiased estimators and confidence intervals of loss calculation taking into account statistical errors on input measurands. Smart meter measurements from a real low-voltage grid are used to show the validity of approximations that are useful for efficient and effective confidence interval calculation.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices","authors":"Abderrahmane Sensaoui, D. Hély, O. Aktouf","doi":"10.1109/EDCC.2019.00018","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00018","url":null,"abstract":"Toubkal is a new hardware architecture which provides secure, efficient and flexible hardware isolation. It is a modular system that offers strong separation of different hardware modules within a system. Lightweight devices use mainly a Memory Protection Unit (MPU) to protect the memory and create an isolation architecture. However, the MPU offers only a memory control access for the software running on the system. This scheme does not prevent other hardware components from accessing system memories. Toubkal aims at enhancing MPU architectures by adding a new hardware layer to create different access environments for different hardware components. Toubkal has been designed in such a way that it can easily be adapted to the system needs in terms of security, safety and performances. It does not require any change in the existing hardware modules. We present a detailed description of the architecture, then we compare and discuss run-time, area overhead as well as security limitations using different policies and options. The first experimental hardware module increases between 0.08% and 8.5% a single core Rocket Chip cells area.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115873434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sotirios Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, E. Puigdomènech, D. Karamitros, E. Gelenbe, J. Dumortier, Maja Voss-Knude Voronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, Oana Stan, P. Campegiani, David Mari Martinez
{"title":"Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach","authors":"Sotirios Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, E. Puigdomènech, D. Karamitros, E. Gelenbe, J. Dumortier, Maja Voss-Knude Voronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, Oana Stan, P. Campegiani, David Mari Martinez","doi":"10.1109/EDCC.2019.00024","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00024","url":null,"abstract":"This extended abstract sets up the scene of the KONFIDO project in a clear way. In particular, it: i) defines KONFIDO objectives and draws KONFIDO boundaries; ii) identifies KONFIDO users and beneficiaries; iii) describes the environment where KONFIDO is embedded; iv) provides a bird's eye view of the KONFIDO technologies and how they will be deployed in the pilot studies of the project; and v) presents the approach that the KONFIDO consortium will take to prove that the proposed solutions work. KONFIDO addresses one of the top three priorities of the European Commission regarding the digital transformation of health and care in the Digital Single Market, i.e. citizens' secure access to their health data, also across borders. To make sure that KONFIDO has a high-impact, its results are exposed to the wide public by developing three substantial pilots in three distinct European countries (namely Denmark, Italy, and Spain).","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114962101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Studying the Applicability of Intrusion Detection to Multi-Tenant Container Environments","authors":"José Flora, Nuno Antunes","doi":"10.1109/EDCC.2019.00033","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00033","url":null,"abstract":"The use of containers in cloud-based applications allows for rapid and scalable deployments. Containers are lightweight and appealing to be used even in business-critical systems, but their use implies great security concerns, which are exacerbated in multi-tenant environments. To mitigate these concerns, techniques such as intrusion detection are a must, however, in the containers' context, it has received limited attention. Thus, it is necessary to define an improved approach to container-level intrusion detection for multi-tenant environments. In this paper we make a preliminary feasibility analysis of host-based container-level intrusion detection. For this, we are currently focusing on achieving a stable container profile definition and the results obtained show we are following the correct path.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robustness-Aware Design Space Exploration Through Iterative Refinement of D-Optimal Designs","authors":"I. Tuzov, D. Andrés, J. Ruiz","doi":"10.1109/EDCC.2019.00017","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00017","url":null,"abstract":"Design space exploration (DSE) is nowadays of utmost importance to implement HW designs with acceptable levels of performance, power consumption, area and dependability (PPAD). Electronic Design Automation (EDA) tools support the transformation of HW description models into technology-dependent implementations. Although designers can influence this process by tuning the parameters offered by EDA toolkits, determining their proper configuration is a complex and very time-consuming DSE problem rarely addressed from a PPAD perspective. On one hand, the spatial and temporal complexity of considered targets and the level of abstraction of their descriptions pose problems for the rapid execution of fault injection campaigns. On the other hand, the multi-level nature of parameters offered by EDA toolkits lead to an explosion of possible configurations to exercise during experimentation. This paper shows how to combine the D-optimal design of experiments with FPGA-based and statistical fault injection to significantly reduce not only the number of such configurations but also the number of faults to inject and the time required to perform each injection. All of this without compromising the statistical significance of results. The proposal is exemplified through the Xilinx Vivado Design Suite, which integrates one of the FPGA-based EDA toolkits most widely-used today in the industry, and the MC8051 IP core, a synthesizable microcontroller from Oregano Systems.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Secrets of Persistent Systems with Volatility","authors":"V. Sartakov, R. Kapitza","doi":"10.1109/EDCC.2019.00027","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00027","url":null,"abstract":"The volatility of main memory and CPU caches is an important implicit protection mechanism for sensitive data: in-memory data gets erased if memory modules are disconnected from power supply. Persistent systems, on the other hand, cannot rely on volatility and without further measures their secrets can be easily retrieved by physical access. In this paper, we present Volatility, a system which protects secrets stored in persistent memory. This system provides mechanisms which turn persistent sub-systems into volatile ones by the use of AMD Secure Memory Encryption (SME), a new extension of AMD CPUs which provides encryption of main memory at the page granularity. Volatility protects secrets at two levels: it offers fine-grained memory encryption inside the kernel, where only information considered as sensitive is secured, and per-process memory encryption, which encrypts selected user space programs. Besides storing subsystems in an encrypted form, all relevant input and output paths, e.g. managed by the kernel, are protected as well. Our evaluation of Volatility demonstrates that the proposed protection mechanism does not impact the system performance, while protecting against strong adversaries.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation","authors":"J. Grosso, A. Jhumka, M. Bradbury","doi":"10.1109/EDCC.2019.00030","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00030","url":null,"abstract":"Wireless sensor networks (WSNs) have been widely studied in the context of many-to-one communication, in which multiple data sources send messages to a dedicated sink. However, there has been little research in the area of many-to-many communication. Many-to-many communication in WSNs is a growing application area, with examples including fire detection in both natural and urban areas, and the monitoring of heating and air conditioning within buildings. In this paper, we propose a scalable many-to-many routing protocol that makes use of Ant Colony Optimisation (ACO) that is applicable for an arbitrary number of sources and sinks. The protocol aggregates data sent from multiple sources into a single, shared backbone of nodes to reduce the total number of packets sent and so increase network lifetime. Results from simulations using the Cooja Network simulator show that the protocol is able to achieve packet delivery ratios above 95%, with the algorithm becoming more efficient with larger networks, sending fewer packets relative to the size of the networks, as well as involving fewer nodes in routing.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123378168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward a Model-Based Approach for Analyzing Information Quality Requirements for Smart Grid","authors":"M. Gharib, P. Lollini, A. Bondavalli","doi":"10.1109/EDCC.2019.00044","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00044","url":null,"abstract":"Nowadays, most developed countries need to optimize their electricity production and consumption, which has led to the development of the Smart Grid (SG) concept. SG has a main objective of optimizing the generation, consumption, and management of electricity via information and communication technology. However, the vast amounts of information generated and processed in SG environments raise the issue of Information Quality (IQ). Accordingly, IQ has become an increasingly prominent issue in SG, since IQ can directly affect the services quality, reliability, and availability of an electric power supply. Despite this, the current IQ related issues in SG are still addressed in an ad-hoc manner. Without considering IQ requirements during the design of SG, it will be vulnerable to faults arising from depending on low-quality information, which may influence the dependability, reliability and efficient performance of SG. In this track of research, we aim at tackling this problem by developing a model-based approach for modeling and analyzing IQ requirements for SG.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}