{"title":"Bitvector Support in the Theta Formal Verification Framework","authors":"M. Dobos-Kovács, Á. Hajdu, András Vörös","doi":"10.1109/ladc53747.2021.9672595","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672595","url":null,"abstract":"The verification of safety-critical software systems has many challenges, such as the complex language constructs in embedded software. This paper addresses the verification problem of software systems using bitwise operations, and we present an extension to the Theta open-source formal verification framework. Our goal is to integrate bitvectors and bitwise operations in the abstraction-refinement-based formal verification methods in Theta. Supporting bitvectors is a step towards the verification of industrial embedded software systems. We extended the language support in Theta with formal semantics. In addition, the new language constructs and operators are transformed into the formal language inside Theta. We also need new algorithms to solve the verification problem: we implemented Newton-style refinement algorithms in Theta to verify software with bitvectors and bitwise operators efficiently.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122893972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Down-to-Earth Scheduling Strategy for Dense SINR Wireless Networks","authors":"Fábio Engel De Camargo, E. P. Duarte","doi":"10.1109/ladc53747.2021.9672559","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672559","url":null,"abstract":"This work presents a scheduling strategy for wireless networks under the Signal-to-Interference-plus-Noise Ratio (SINR) model. This model employs the signal-to-noise ratio and the cumulative interference of simultaneous communications as a criterion to determine whether a transmission can be correctly received at the destination. As an advantage, the SINR model allows spatial reuse, i.e., given certain conditions, concurrent communication between multiple devices is possible, even if they are all within the coverage areas of one other. The strategy proposed in this work estimates the interference at the receivers, to determine which sets of devices can transmit simultaneously. The strategy assumes that devices know their positions on the plane and is based on a heuristic according to which transmissions only occur to the closest device. The cumulative interference at receivers is determined based on the analysis of the communications between pairs of devices. The output is a schedule that determines which devices can communicate on consecutive time slots. The strategy was evaluated through simulation, for networks of different densities. Results attest to the effectiveness of the schedules obtained.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"34 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Performance of Using Parallel State Machine Replication to Implement Blockchains","authors":"Aldenio Burgos, E. Alchieri, F. Dotti","doi":"10.1109/ladc53747.2021.9672588","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672588","url":null,"abstract":"State Machine Replication (SMR) and blockchains share the same goal of keeping a consistent state replicated across a set of replicas. However, there are some subtle differences between these techniques. In particular, using a SMR framework as a building block to implement blockchains significantly impacts performance due to the sequential execution model of traditional SMRs, i.e., all transactions are sequentially executed. This work presents a case study about the use of a parallel SMR (PSMR) to implement blockchains. In a PSMR, some transactions can be executed in parallel, for instance those addressed to different accounts. More specifically, we implemented a payment system and conducted a set of experiments to show that, by using a PSMR, it is possible to circumvent the previously described performance limitation, i.e., the performance of the resulting system increases substantially, i.e., up to 22×, when compared to a traditional sequential SMR.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133742487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature Rankers to Predict Classification Performance of Unsupervised Intrusion Detectors","authors":"T. Zoppi, A. Ceccarelli, A. Bondavalli","doi":"10.1109/ladc53747.2021.9672586","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672586","url":null,"abstract":"An anomaly-based Intrusion Detection System (IDS) consists of a monitor and a binary classifier, in which monitored system indicators are fed into a Machine Learning (ML) algorithm that detects anomalies due to attacks. Building such an IDS for a target system requires first to define a strategy to monitor features, then to select and evaluate many ML algorithms to find the most suitable candidate. Noticeably, features that do not fluctuate enough when attacks happen will negatively affect detection performance. In this paper we propose a strategy to predict the classification performance of unsupervised anomaly-based intrusion detectors without any knowledge or execution of the ML algorithm. We experimentally verify that individual scores assigned to features by filter and wrapper-based feature rankers can be used to predict the classification performance of anomaly detectors. Particularly, we detail, explain and motivate how feeding scores of feature rankers into a Random Forest regressor allows predicting the value of common evaluation metrics for anomaly detectors as F1 or MCC with average of relative residuals lower than 15%, and how to take advantage of our prediction strategy in different scenarios.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116786721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Nagy, Richárd Szabó, Máté Levente Vajda, András Vörös
{"title":"Demonstrator for dependable edge-based cyber-physical systems","authors":"S. Nagy, Richárd Szabó, Máté Levente Vajda, András Vörös","doi":"10.1109/ladc53747.2021.9672569","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672569","url":null,"abstract":"Dependable cyber-physical systems (CPS) are increasingly used in various application fields, such as urban mobility, smart city, industrial IoT and telecommunication. Beside functional requirements, dependable CPS systems have to meet several extra-functional requirements such as reliability, availability, fault-tolerance and performance. The complexity of modern CPS systems significantly increased since the extensive use of distributed services, redundant architectures and advanced safety mechanisms. In addition, several new technologies have emerged in the edge, such as embedded GPU-s, AI acceleration and virtualisation tools, which enhance the extra-functional properties, such as latency and performance of dependable CPS systems. Because of the increased complexity and the cutting edge technologies, evaluating the extra-functional requirements becomes difficult for modern CPS systems. Consequently, several new analysis techniques have also been developed. We developed an open-source demonstrator for dependable edge-based CPS systems in the field of smart city and urban mobility. With the demonstrator, the researchers can compare and evaluate different technologies, safety mechanisms and analysis techniques. The demonstrator consists of several emerging technologies such as hardware accelerators, load-balance mechanisms, containerisation and container deployment tools. The architecture of the demonstrator was developed following the edge computing paradigm and model-driven engineering approach. The demonstrator contains distributed redundant and fault-tolerant services. We also developed a hardware-in-the-loop (HIL) test environment to simulate various environmental scenarios and evaluate extra-functional properties.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120845431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Home Care: Towards Supporting Elderlies in the Comfort and Safety of their (Smart) Homes","authors":"Igor Zavalyshyn, Axel Legay, A. Rath, E. Rivière","doi":"10.1109/ladc53747.2021.9672565","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672565","url":null,"abstract":"The aging of the population will be a major challenge in the coming years and will lead to massive changes related to aging peoples' safety, social inclusion, and well-being. The nature of the aid provided to elderly people is already changing, with a shift towards home care (assisted living) as compared to traditional care homes. In this position paper, we highlight the need for appropriate home automation and support systems that ensure the safety and well-being of aging occupants and maintain their social links with various people around them. Existing smart home systems do not meet all the requirements and safety features required for this purpose, in particular in terms of usability, privacy, and security. We describe the challenges the research community and the industry will need to address when designing smart home care systems and lay out a research agenda that we hope will stir more work in this important emerging area.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity in Aviation: the STPA-Sec Method Applied to the TCAS Security","authors":"Mayara Lopes Salgado, M. Sousa","doi":"10.1109/ladc53747.2021.9672578","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672578","url":null,"abstract":"This work presents the cybersecurity theme in the aviation ecosystem and a case study for the application of the STPA-Sec method, in the TCAS (Traffic Collision Avoidance System). The aviation community is benefiting from new levels of digitization and connectivity, but the effectiveness gained by increased digitization has led to increased levels of system vulnerabilities. Therefore, the work is focused on the application of the STPA method, aiming to increase security from the point of view of planned attacks, that is, intentional attacks, sabotage, malicious aircraft interference and how these attacks relate to events unplanned or unintended ralated to the “ghost aircraft” vulnerability of the TCAS. The STPA applied to neutralize the TCAS ghost aircraft attacks pointed out that the air collision avoidance system is a critical system as it involves loss of life or human injury, loss of critical data, damage to the aircraft, inability to complete primary missions, loss of customer satisfaction and loss of airline reputation. In this sense, the work highlights the importance of the role of STPA-Sec method in improving aircraft security and motivates redesign and updates to TCAS.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}