2019 15th European Dependable Computing Conference (EDCC)最新文献

筛选
英文 中文
Approximation of the Time Alignment Error for Measurements in Electricity Grids 电网测量时间对准误差的逼近
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-11-07 DOI: 10.1109/EDCC.2019.00038
Imad Antonios, H. Schwefel, L. Lipsky
{"title":"Approximation of the Time Alignment Error for Measurements in Electricity Grids","authors":"Imad Antonios, H. Schwefel, L. Lipsky","doi":"10.1109/EDCC.2019.00038","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00038","url":null,"abstract":"Measurements of parameters in electricity grids are frequently captured as average values over some time interval. In scenarios of distributed measurements such as in distribution grids, offsets of local clocks can result in misaligned averaging intervals. This paper investigates the properties of the so-called time alignment error of such measurands that is caused by shifts of the averaging interval. We extend a previously derived Markov-modulated model and provide an approximation of the variance of the time alignment error. The model accounts for slow-decaying correlation structure found in actual traces of electrical measures. We compare results of three electrical measures for 20 traces with numerical results and simulations from the the fitted Markov model.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125417646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resilient Access to Heterogeneous Measurement Data for Grid Observability 网格可观测性异构测量数据的弹性访问
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-11-07 DOI: 10.1109/EDCC.2019.00043
Nicola Nostro, Kamal Shahid, A. Bondavalli, H. Schwefel
{"title":"Resilient Access to Heterogeneous Measurement Data for Grid Observability","authors":"Nicola Nostro, Kamal Shahid, A. Bondavalli, H. Schwefel","doi":"10.1109/EDCC.2019.00043","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00043","url":null,"abstract":"The ability to fuse data from heterogeneous sources (such as Smart Meters etc.) in the low-voltage grid highly depends on the communication and data management infrastructure that allows an exchange of information between different grid assets. Failure or any attempt to attack this data fusion solution can lead to inefficient grid operation and in worst case even blackouts. Therefore, this paper describes methodologies to cope with threats and faults in a low-voltage grid scenario to provide resilient access to the heterogeneous measurement data.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125706228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Impact of Measurement Errors on Loss Calculations in Distribution Grids 测量误差对配电网损耗计算的影响
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-11-07 DOI: 10.1109/EDCC.2019.00039
H. Schwefel, J. Rasmussen, R. Olsen, N. Silva
{"title":"On the Impact of Measurement Errors on Loss Calculations in Distribution Grids","authors":"H. Schwefel, J. Rasmussen, R. Olsen, N. Silva","doi":"10.1109/EDCC.2019.00039","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00039","url":null,"abstract":"Power or energy losses are an important metric to describe efficiency of distribution grids. They can also be relevant input metrics for fault and theft detection approaches. When considering low-voltage grids, power losses have to be obtained from distributed low-cost measurement devices, which leads to measurement inaccuracies. When calculating power losses, these measurement inaccuracies need to be taken into account. This paper presents first steps for obtaining unbiased estimators and confidence intervals of loss calculation taking into account statistical errors on input measurands. Smart meter measurements from a real low-voltage grid are used to show the validity of approximations that are useful for efficient and effective confidence interval calculation.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices Toubkal:用于安全轻量级设备的灵活高效的硬件隔离模块
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-16 DOI: 10.1109/EDCC.2019.00018
Abderrahmane Sensaoui, D. Hély, O. Aktouf
{"title":"Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices","authors":"Abderrahmane Sensaoui, D. Hély, O. Aktouf","doi":"10.1109/EDCC.2019.00018","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00018","url":null,"abstract":"Toubkal is a new hardware architecture which provides secure, efficient and flexible hardware isolation. It is a modular system that offers strong separation of different hardware modules within a system. Lightweight devices use mainly a Memory Protection Unit (MPU) to protect the memory and create an isolation architecture. However, the MPU offers only a memory control access for the software running on the system. This scheme does not prevent other hardware components from accessing system memories. Toubkal aims at enhancing MPU architectures by adding a new hardware layer to create different access environments for different hardware components. Toubkal has been designed in such a way that it can easily be adapted to the system needs in terms of security, safety and performances. It does not require any change in the existing hardware modules. We present a detailed description of the architecture, then we compare and discuss run-time, area overhead as well as security limitations using different policies and options. The first experimental hardware module increases between 0.08% and 8.5% a single core Rocket Chip cells area.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115873434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach 健康相关数据的安全跨境交换:KONFIDO方法
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00024
Sotirios Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, E. Puigdomènech, D. Karamitros, E. Gelenbe, J. Dumortier, Maja Voss-Knude Voronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, Oana Stan, P. Campegiani, David Mari Martinez
{"title":"Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach","authors":"Sotirios Diamantopoulos, M. Nalin, I. Baroni, F. Clemente, G. Faiella, C. Mesaritakis, E. Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, E. Puigdomènech, D. Karamitros, E. Gelenbe, J. Dumortier, Maja Voss-Knude Voronkov, L. Romano, L. Coppolino, V. Koutkias, K. Votis, Oana Stan, P. Campegiani, David Mari Martinez","doi":"10.1109/EDCC.2019.00024","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00024","url":null,"abstract":"This extended abstract sets up the scene of the KONFIDO project in a clear way. In particular, it: i) defines KONFIDO objectives and draws KONFIDO boundaries; ii) identifies KONFIDO users and beneficiaries; iii) describes the environment where KONFIDO is embedded; iv) provides a bird's eye view of the KONFIDO technologies and how they will be deployed in the pilot studies of the project; and v) presents the approach that the KONFIDO consortium will take to prove that the proposed solutions work. KONFIDO addresses one of the top three priorities of the European Commission regarding the digital transformation of health and care in the Digital Single Market, i.e. citizens' secure access to their health data, also across borders. To make sure that KONFIDO has a high-impact, its results are exposed to the wide public by developing three substantial pilots in three distinct European countries (namely Denmark, Italy, and Spain).","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114962101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Studying the Applicability of Intrusion Detection to Multi-Tenant Container Environments 研究入侵检测在多租户容器环境中的适用性
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00033
José Flora, Nuno Antunes
{"title":"Studying the Applicability of Intrusion Detection to Multi-Tenant Container Environments","authors":"José Flora, Nuno Antunes","doi":"10.1109/EDCC.2019.00033","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00033","url":null,"abstract":"The use of containers in cloud-based applications allows for rapid and scalable deployments. Containers are lightweight and appealing to be used even in business-critical systems, but their use implies great security concerns, which are exacerbated in multi-tenant environments. To mitigate these concerns, techniques such as intrusion detection are a must, however, in the containers' context, it has received limited attention. Thus, it is necessary to define an improved approach to container-level intrusion detection for multi-tenant environments. In this paper we make a preliminary feasibility analysis of host-based container-level intrusion detection. For this, we are currently focusing on achieving a stable container profile definition and the results obtained show we are following the correct path.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Robustness-Aware Design Space Exploration Through Iterative Refinement of D-Optimal Designs 基于d -最优设计迭代优化的鲁棒性感知设计空间探索
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00017
I. Tuzov, D. Andrés, J. Ruiz
{"title":"Robustness-Aware Design Space Exploration Through Iterative Refinement of D-Optimal Designs","authors":"I. Tuzov, D. Andrés, J. Ruiz","doi":"10.1109/EDCC.2019.00017","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00017","url":null,"abstract":"Design space exploration (DSE) is nowadays of utmost importance to implement HW designs with acceptable levels of performance, power consumption, area and dependability (PPAD). Electronic Design Automation (EDA) tools support the transformation of HW description models into technology-dependent implementations. Although designers can influence this process by tuning the parameters offered by EDA toolkits, determining their proper configuration is a complex and very time-consuming DSE problem rarely addressed from a PPAD perspective. On one hand, the spatial and temporal complexity of considered targets and the level of abstraction of their descriptions pose problems for the rapid execution of fault injection campaigns. On the other hand, the multi-level nature of parameters offered by EDA toolkits lead to an explosion of possible configurations to exercise during experimentation. This paper shows how to combine the D-optimal design of experiments with FPGA-based and statistical fault injection to significantly reduce not only the number of such configurations but also the number of faults to inject and the time required to perform each injection. All of this without compromising the statistical significance of results. The proposal is exemplified through the Xilinx Vivado Design Suite, which integrates one of the FPGA-based EDA toolkits most widely-used today in the industry, and the MC8051 IP core, a synthesizable microcontroller from Oregano Systems.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protecting Secrets of Persistent Systems with Volatility 具有波动性的持久系统的秘密保护
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00027
V. Sartakov, R. Kapitza
{"title":"Protecting Secrets of Persistent Systems with Volatility","authors":"V. Sartakov, R. Kapitza","doi":"10.1109/EDCC.2019.00027","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00027","url":null,"abstract":"The volatility of main memory and CPU caches is an important implicit protection mechanism for sensitive data: in-memory data gets erased if memory modules are disconnected from power supply. Persistent systems, on the other hand, cannot rely on volatility and without further measures their secrets can be easily retrieved by physical access. In this paper, we present Volatility, a system which protects secrets stored in persistent memory. This system provides mechanisms which turn persistent sub-systems into volatile ones by the use of AMD Secure Memory Encryption (SME), a new extension of AMD CPUs which provides encryption of main memory at the page granularity. Volatility protects secrets at two levels: it offers fine-grained memory encryption inside the kernel, where only information considered as sensitive is secured, and per-process memory encryption, which encrypts selected user space programs. Besides storing subsystems in an encrypted form, all relevant input and output paths, e.g. managed by the kernel, are protected as well. Our evaluation of Volatility demonstrates that the proposed protection mechanism does not impact the system performance, while protecting against strong adversaries.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation 基于蚁群优化的无线传感器网络可靠多对多路由
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00030
J. Grosso, A. Jhumka, M. Bradbury
{"title":"Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation","authors":"J. Grosso, A. Jhumka, M. Bradbury","doi":"10.1109/EDCC.2019.00030","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00030","url":null,"abstract":"Wireless sensor networks (WSNs) have been widely studied in the context of many-to-one communication, in which multiple data sources send messages to a dedicated sink. However, there has been little research in the area of many-to-many communication. Many-to-many communication in WSNs is a growing application area, with examples including fire detection in both natural and urban areas, and the monitoring of heating and air conditioning within buildings. In this paper, we propose a scalable many-to-many routing protocol that makes use of Ant Colony Optimisation (ACO) that is applicable for an arbitrary number of sources and sinks. The protocol aggregates data sent from multiple sources into a single, shared backbone of nodes to reduce the total number of packets sent and so increase network lifetime. Results from simulations using the Cooja Network simulator show that the protocol is able to achieve packet delivery ratios above 95%, with the algorithm becoming more efficient with larger networks, sending fewer packets relative to the size of the networks, as well as involving fewer nodes in routing.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123378168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward a Model-Based Approach for Analyzing Information Quality Requirements for Smart Grid 基于模型的智能电网信息质量需求分析方法研究
2019 15th European Dependable Computing Conference (EDCC) Pub Date : 2019-09-01 DOI: 10.1109/EDCC.2019.00044
M. Gharib, P. Lollini, A. Bondavalli
{"title":"Toward a Model-Based Approach for Analyzing Information Quality Requirements for Smart Grid","authors":"M. Gharib, P. Lollini, A. Bondavalli","doi":"10.1109/EDCC.2019.00044","DOIUrl":"https://doi.org/10.1109/EDCC.2019.00044","url":null,"abstract":"Nowadays, most developed countries need to optimize their electricity production and consumption, which has led to the development of the Smart Grid (SG) concept. SG has a main objective of optimizing the generation, consumption, and management of electricity via information and communication technology. However, the vast amounts of information generated and processed in SG environments raise the issue of Information Quality (IQ). Accordingly, IQ has become an increasingly prominent issue in SG, since IQ can directly affect the services quality, reliability, and availability of an electric power supply. Despite this, the current IQ related issues in SG are still addressed in an ad-hoc manner. Without considering IQ requirements during the design of SG, it will be vulnerable to faults arising from depending on low-quality information, which may influence the dependability, reliability and efficient performance of SG. In this track of research, we aim at tackling this problem by developing a model-based approach for modeling and analyzing IQ requirements for SG.","PeriodicalId":334498,"journal":{"name":"2019 15th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信