{"title":"Characterizing and Injecting Faults in Executable Models Specified with fUML","authors":"Guilherme W. Lopes, Leonardo Montecchi","doi":"10.1109/ladc53747.2021.9672596","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672596","url":null,"abstract":"Fault Injection (FI) is a well-known system verification technique, in which faults are artificially introduced into a system, to assess its behavior in exceptional conditions. FI can be applied at different levels, including physical, hardware and software. FI has also been applied at model level, although the amount of work in this direction is limited. However, the importance of models in the development of complex systems is growing, pushing towards model-level verification and sim-ulations. The Foundational UML (fUML) is a specific subset of UML, released as an OMG standard, that has a precise execution semantics and can therefore be executed. In this paper we investigate the application of FI to executable models specified with fUML. We first characterize the kind of fault that may be applied to fUML models, and then we realize an injection mechanisms based on automated model transformation. We apply the methodology to a simple example in the space domain, adapted from a real satellite system. We believe this is an important first step for the adoption of FI techniques on fUML models, for an early detection of design flaws. We conclude discussing some challenges and directions for future work.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. R. Bortoloto, Talitha C. De Oliveira, C. Lahoz, F. Abrahão
{"title":"CAST Applied to Covid-19 Pandemic in Brazil","authors":"E. R. Bortoloto, Talitha C. De Oliveira, C. Lahoz, F. Abrahão","doi":"10.1109/ladc53747.2021.9672568","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672568","url":null,"abstract":"This work presents the results of CAST (Causal Analysis using Systems Theory) application, technique initially created to understand the aerospace accidents root causes, to identify the main reasons that may have contributed to the considerable amount of human deaths caused by the Coronavirus pandemic in Brazil. Through the CAST process, it was possible to identify the dangers involved in safety control mechanisms related to the pandemic and its health implications, understanding the events that allowed this occurrence, identifying why the components related to the system's safety were not effective and, suggest mechanisms that reinforce safety controls at national and global levels, in order to avoid or mitigate similar losses related to pandemics in future events. The steps established in the CAST structured approach, allowed to analyze the factors that contributed to the high number of human deaths, obtaining a greater amount of information and details, used in the elaboration of improvement proposals to face the problem, mainly with regard to the health system.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123858611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Robustness Assessment Methodology for IoT Systems","authors":"Bruno A. Jesus, Glauber Leite, Nuno Antunes","doi":"10.1109/ladc53747.2021.9672573","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672573","url":null,"abstract":"Internet-based systems are definitely present in people's daily lives, helping to perform various activities and providing greater comfort and ease in communication. In this context of diversification, every day more devices have access to the network, further increasing the reach and distribution of information around the world, including IoT systems, which are critical in some scenarios. In this context, this paper proposes a methodology to assess the robustness of an IoT System, based on a scenario with an automated system for growing vegetables that was initially designed for residential scale but which can be adapted for industrial scale. We use components commonly used in IoT systems, which facilitates scalability and allows for robustness testing. We aim to test the robustness of these components by creating a test case methodology and performing many test cases for each endpoint. From this analysis we intend to improve security mechanisms in IoT environments with characteristics similar to the proposed scenario. Finally, we will check the behavior of the software components in the presence of errors and problems with the data sent.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Frederico O. Sales, E. F. Silva, A. Vieira, M. Vieira, L. Vieira
{"title":"A Proposal of a Dynamic Routing Multicast Protocol for Visible Light Communication Networks","authors":"Frederico O. Sales, E. F. Silva, A. Vieira, M. Vieira, L. Vieira","doi":"10.1109/ladc53747.2021.9672566","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672566","url":null,"abstract":"Wireless networks have grown since the 2000s. Compelling to rethink the way to enrich the possibilities to outflow the network traffic and its coverage. Current Visible Light Communication (VLC) systems focus mainly on wireless solutions. Converting multicast to unicast. Because of it, we propose an evolution of unicast and multi-hop wireless Optical Wireless Communication (OWC) supporting multicast communication in VLC environments, called MCAST-VLC. MCAST-VLC is a cross-layer dynamic routing protocol for VLC scenery, considering some particular characteristics of this area. Our proposal comprises the need for group management, traffic isolation, multi-hop route discovery protocol. We evaluate our protocol in a VLC environment, following a close indoor VLC. Our results evidence that multicast protocol over visible light communication can handle three more network flows than a simple unicast under a negligible overhead to maintain the multicast characteristics.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bráulio Marques Horta, Juliana de Melo Bezerra, C. Hirata
{"title":"Applying STAMP to Support the Synthesis of Controller Logic considering Safety Concerns","authors":"Bráulio Marques Horta, Juliana de Melo Bezerra, C. Hirata","doi":"10.1109/ladc53747.2021.9672587","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672587","url":null,"abstract":"Controllers are key components of safety-critical systems. They are responsible for ensuring many of the system requirements through monitoring and action over other components. The traditional approach for designing controllers encompasses careful understanding, analysis, and manual definition of the behavior of the controller. We propose a correct-by-construction method to synthesize the logic of controllers, based on supervisory control theory. In this paper, we focus on using STAMP to support the controller synthesis. STAMP is an accident causation model based on systems theory, which treats accidents and unacceptable losses as a dynamic control problem. Here STAMP aids to capture the system description, supporting the steps related to the definition of components and their interfaces, the specification of components' behavior, the identification of assumptions, and the determination of functional and safety properties. We provide an overview of the method, contextualizing the methods steps with the system of an automatic door. Later, we present a real system of a Nuclear Power Plant and discuss its outcomes.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
José D’Abruzzo Pereira, João Henggeler Antunes, M. Vieira
{"title":"On Building a Vulnerability Dataset with Static Information from the Source Code","authors":"José D’Abruzzo Pereira, João Henggeler Antunes, M. Vieira","doi":"10.1109/ladc53747.2021.9672589","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672589","url":null,"abstract":"Software vulnerabilities are weaknesses in software systems that can have serious consequences when exploited. Examples of side effects include unauthorized authentication, data breaches, and financial losses. Due to the nature of the software industry, companies are increasingly pressured to deploy software as quickly as possible, leading to a large number of undetected software vulnerabilities. Static code analysis, with the support of Static Analysis Tools (SATs), can generate security alerts that highlight potential vulnerabilities in an application's source code. Software Metrics (SMs) have also been used to predict software vulnerabilities, usually with the support of Machine Learning (ML) classification algorithms. Several datasets are available to support the development of improved software vulnerability detection techniques. However, they suffer from the same issues: they are either outdated or use a single type of information. In this paper, we present a methodology for collecting software vulnerabilities from known vulnerability databases and enhancing them with static information (namely SAT alerts and SMs). The proposed methodology aims to define a mechanism capable of more easily updating the collected data.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Denial of Service Attacks on Wi-Fi-based Unmanned Aerial Vehicle","authors":"G. Bertoli, L. A. P. Júnior, O. Saotome","doi":"10.1109/ladc53747.2021.9672561","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672561","url":null,"abstract":"This paper presents an analysis of denial of service (DoS) attacks on Wi-Fi-based Unmanned Aerial Vehicle (UAV). The platform is a Parrot AR.Drone 2 and uses the IEEE 802.11 protocol for command and control. The threat scenarios are the TCP and UDP Flood Attacks and the de-authentication attack. The de-authentication is a functionality available on IEEE 802.11 Wireless protocol that is misused for DoS attacks. The approach for DoS classification is based on logistic regression and decision tree (DT) using a dataset composed of malicious and normal network traffic captured during UAV flights. The DT model obtained in this paper accomplishes an F1-score to classify DoS attacks (de-authentication, UDP, and TCP flood) of 0.97.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques for Evaluating the Robustness of Deep Learning Systems: A Preliminary Review","authors":"Horacio L. França, César Teixeira, N. Laranjeiro","doi":"10.1109/ladc53747.2021.9672592","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672592","url":null,"abstract":"Machine Learning algorithms are currently being applied to a huge diversity of systems in various domains, including control systems in the industry, medical instruments, and autonomous vehicles, just to name a few. Systems based on deep learning models have become extremely popular in this context, and, like regular machine learning algorithms, are susceptible to errors caused by noisy data, outliers, or adversarial attacks. An error of a deep learning model in a safety-critical context can lead to a system failure, which can have disastrous consequences, including safety violations. In this paper we review the state of the art in techniques for evaluating the reliability (in lato sensu) of deep learning models, identify the main characteristics of the methods used and discuss research trends and open challenges.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calibration of BLE beacons and its impact on distance estimation using the log-distance path loss model","authors":"Leonardo Vanzin, M. Oyamada","doi":"10.1109/ladc53747.2021.9672575","DOIUrl":"https://doi.org/10.1109/ladc53747.2021.9672575","url":null,"abstract":"The indoor positioning system is used to determine the location of people or objects in an enclosed space. It can be used in many applications such as navigation or even active marketing to provide a better experience to customers. There are various solutions to perform indoor localization. In this paper, the focus is on the use of Bluetooth Low Energy beacons to determine the position of the customer or object in the room. Therefore, the goal of this work is to use low-cost HM-10 BLE boards to test their accuracy and use as beacons. After collecting and analyzing the data, it was determined that HM-10 is a viable solution for beacons. When using the log-distance path loss model to determine distance, the experiments show variations between different HM-10 boards, suggesting the need for calibration to obtain more accurate results.","PeriodicalId":376642,"journal":{"name":"2021 10th Latin-American Symposium on Dependable Computing (LADC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129712795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}