{"title":"A MDE Tool for Security Risk Assessment of Enterprises","authors":"Enrico Schiavone, Nicola Nostro, F. Brancati","doi":"10.5753/ladc.2021.18530","DOIUrl":"https://doi.org/10.5753/ladc.2021.18530","url":null,"abstract":"This paper introduces ResilBlockly, a Model-Driven Engineering software that evolves an existing tool called Blockly4SoS and which has been provided with a set of new features for addressing the challenge of assessing security risks of enterprises and infrastructures, especially when operating in the domain of critical systems.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Traffic Sign Recognition System","authors":"Muhammad Atif, A. Ceccarelli, A. Bondavalli","doi":"10.5753/ladc.2021.18528","DOIUrl":"https://doi.org/10.5753/ladc.2021.18528","url":null,"abstract":"Traffic sign detection and recognition is an important part of Advance Driving Assistance Systems (ADAS), which aims to provide assistance to the driver, autonomous driving, or even monitoring of traffic signs for maintenance. Particularly, misclassification of traffic signs may have severe negative impact on safety of drivers, infrastructures, and human in the surrounding environment. In addition to shape and colors, there are many challenges to recognize traffic signs correctly such as occlusion, motion blur, visual camera’s failures, or physically altering the integrity of traffic signs. In Literature, different machine learning based classifiers and deep classifiers are utilized for Traffic Sign Recognition (TSR), with a few studies consider sequences of frames to commit final decision about traffic signs. This paper proposes a robust TSR against different attacks/failures such as camera related failures, occlusion, broken signs, and patches inserted on traffic signs. We are planning to utilize generative adversarial networks to corrupt images of traffic signs and investigate the robustness of TSR. Furthermore, we are currently working on designing a failure detector, which will help the TSR in advance before recognition, whether images are corrupted with some type of failure. Our conjecture is that failure detector with classifiers will improve the robustness of TSR system.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting the SAT Revolution for Automated Software Verification: Report from an Industrial Case Study","authors":"L. Cordeiro","doi":"10.5753/ladc.2021.18531","DOIUrl":"https://doi.org/10.5753/ladc.2021.18531","url":null,"abstract":"In the last three decades, Boolean Satisfiability (SAT) solvers experienced a dramatic performance revolution; they are now used as the backend of various industrial verification engines. SAT solvers can now check logical formulas that contain millions of propositional variables. In Satisfiability Modulo Theories (SMT) solvers, predicates from various theories are not encoded using propositional variables as in SAT but remain in the problem formulation. Thus, SMT solvers can be used as backends for solving the generated verification conditions to cope with increasing software complexity from industrial applications. This talk will overview automated software verification techniques that rely on sophisticated SMT solvers built over efficient SAT solvers. I will discuss challenges, problems, and recent advances to ensure safety and security in open-source and embedded software applications. I will describe novel algorithms that exploit fuzzing, explicit-state, and SMT-based symbolic model checking for verifying single- and multi-threaded software. These algorithms were the first to verify multi-threaded C/Posix software based on shared-memory synchronization and communication symbolically. They are implemented in industrial-strength software verification tools, now considered state-of-the-art in the software testing and verification community, receiving 28 medals at SV-COMP and Test-COMP. This achievement enabled industrial research collaborations with Intel and Nokia. Software engineers applied these tools to find real security vulnerabilities in large-scale software systems (e.g., memory safety in firmware for Intel and arithmetic overflow in telecommunication software for Nokia, neither of which had been found before).","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
André A. S. Ivo, S. G. Ribeiro, Fátima Mattiello-Francisco, Rogério Ishibashi
{"title":"On the use of ontology-based integration architecture in Cemaden's Natural Disaster Observational Network","authors":"André A. S. Ivo, S. G. Ribeiro, Fátima Mattiello-Francisco, Rogério Ishibashi","doi":"10.5753/ladc.2021.18532","DOIUrl":"https://doi.org/10.5753/ladc.2021.18532","url":null,"abstract":"This paper describes a study performed in the Brazilian governmental center, named Cemaden, responsible to monitor natural disasters and sending alerts to the vulnerable community involved. The target of our study is the complex architecture of Cemaden’s Observational Network. It comprises constituent systems (CS) provided by other partners organisms, which operation and maintenance are out of Cemaden con trolling. The correct functioning of those heterogeneous CSs represents a major challenge in this type of system. Thus the comprehension of dependability issues regarding the information flow in the integration of the CSs is essential. Our study compares the current integration architecture based on syntax rules with the use of an ontology-based integration. The advantages of the proposed architecture are discussed in a case study.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Static Analysis Tools Applied to Smart Contracts","authors":"Mirko Staderini, A. Pataricza, A. Bondavalli","doi":"10.5753/ladc.2021.18529","DOIUrl":"https://doi.org/10.5753/ladc.2021.18529","url":null,"abstract":"Smart contracts are one of the most important innovations of the second generation of the Blockchain. They are widely used in various contexts, including financial, insurance, gaming, and betting. Once a smart contract is deployed on a Blockchain, due to its code immutability, residual vulnerabilities cannot be patched. Static analysis is an efficient method for vulnerability detection. This paper addresses the security evaluation and improvement of Solidity smart contracts through the use of static analysis tools, discussing: (i) the motivation and background, (ii) the evaluation of how good the tools are for improving security, (iii) their combination, and (iv) main results.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Failure Boundedness in Discrete Applications","authors":"J. Muranho, Paula Prata, M. Z. Rela, J. G. Silva","doi":"10.1007/978-3-540-75294-3_12","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_12","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116331424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract)","authors":"P. Koopman","doi":"10.1007/978-3-540-75294-3_1","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_1","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing, Measuring, and Benchmarking Dependability and Resilience","authors":"H. Madeira","doi":"10.1007/978-3-540-75294-3_21","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_21","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122305954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Intrusion Detection in Databases","authors":"J. Fonseca, M. Vieira, H. Madeira","doi":"10.1007/978-3-540-75294-3_15","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_15","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133560289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}