Latin-American Symposium on Dependable Computing最新文献

筛选
英文 中文
A MDE Tool for Security Risk Assessment of Enterprises 面向企业安全风险评估的MDE工具
Latin-American Symposium on Dependable Computing Pub Date : 2021-11-22 DOI: 10.5753/ladc.2021.18530
Enrico Schiavone, Nicola Nostro, F. Brancati
{"title":"A MDE Tool for Security Risk Assessment of Enterprises","authors":"Enrico Schiavone, Nicola Nostro, F. Brancati","doi":"10.5753/ladc.2021.18530","DOIUrl":"https://doi.org/10.5753/ladc.2021.18530","url":null,"abstract":"This paper introduces ResilBlockly, a Model-Driven Engineering software that evolves an existing tool called Blockly4SoS and which has been provided with a set of new features for addressing the challenge of assessing security risks of enterprises and infrastructures, especially when operating in the domain of critical systems.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliable Traffic Sign Recognition System 可靠的交通标志识别系统
Latin-American Symposium on Dependable Computing Pub Date : 2021-11-22 DOI: 10.5753/ladc.2021.18528
Muhammad Atif, A. Ceccarelli, A. Bondavalli
{"title":"Reliable Traffic Sign Recognition System","authors":"Muhammad Atif, A. Ceccarelli, A. Bondavalli","doi":"10.5753/ladc.2021.18528","DOIUrl":"https://doi.org/10.5753/ladc.2021.18528","url":null,"abstract":"Traffic sign detection and recognition is an important part of Advance Driving Assistance Systems (ADAS), which aims to provide assistance to the driver, autonomous driving, or even monitoring of traffic signs for maintenance. Particularly, misclassification of traffic signs may have severe negative impact on safety of drivers, infrastructures, and human in the surrounding environment. In addition to shape and colors, there are many challenges to recognize traffic signs correctly such as occlusion, motion blur, visual camera’s failures, or physically altering the integrity of traffic signs. In Literature, different machine learning based classifiers and deep classifiers are utilized for Traffic Sign Recognition (TSR), with a few studies consider sequences of frames to commit final decision about traffic signs. This paper proposes a robust TSR against different attacks/failures such as camera related failures, occlusion, broken signs, and patches inserted on traffic signs. We are planning to utilize generative adversarial networks to corrupt images of traffic signs and investigate the robustness of TSR. Furthermore, we are currently working on designing a failure detector, which will help the TSR in advance before recognition, whether images are corrupted with some type of failure. Our conjecture is that failure detector with classifiers will improve the robustness of TSR system.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting the SAT Revolution for Automated Software Verification: Report from an Industrial Case Study 利用自动化软件验证的SAT革命:来自一个工业案例研究的报告
Latin-American Symposium on Dependable Computing Pub Date : 2021-11-22 DOI: 10.5753/ladc.2021.18531
L. Cordeiro
{"title":"Exploiting the SAT Revolution for Automated Software Verification: Report from an Industrial Case Study","authors":"L. Cordeiro","doi":"10.5753/ladc.2021.18531","DOIUrl":"https://doi.org/10.5753/ladc.2021.18531","url":null,"abstract":"In the last three decades, Boolean Satisfiability (SAT) solvers experienced a dramatic performance revolution; they are now used as the backend of various industrial verification engines. SAT solvers can now check logical formulas that contain millions of propositional variables. In Satisfiability Modulo Theories (SMT) solvers, predicates from various theories are not encoded using propositional variables as in SAT but remain in the problem formulation. Thus, SMT solvers can be used as backends for solving the generated verification conditions to cope with increasing software complexity from industrial applications. This talk will overview automated software verification techniques that rely on sophisticated SMT solvers built over efficient SAT solvers. I will discuss challenges, problems, and recent advances to ensure safety and security in open-source and embedded software applications. I will describe novel algorithms that exploit fuzzing, explicit-state, and SMT-based symbolic model checking for verifying single- and multi-threaded software. These algorithms were the first to verify multi-threaded C/Posix software based on shared-memory synchronization and communication symbolically. They are implemented in industrial-strength software verification tools, now considered state-of-the-art in the software testing and verification community, receiving 28 medals at SV-COMP and Test-COMP. This achievement enabled industrial research collaborations with Intel and Nokia. Software engineers applied these tools to find real security vulnerabilities in large-scale software systems (e.g., memory safety in firmware for Intel and arithmetic overflow in telecommunication software for Nokia, neither of which had been found before).","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the use of ontology-based integration architecture in Cemaden's Natural Disaster Observational Network 基于本体的集成体系结构在Cemaden自然灾害观测网中的应用
Latin-American Symposium on Dependable Computing Pub Date : 2021-11-22 DOI: 10.5753/ladc.2021.18532
André A. S. Ivo, S. G. Ribeiro, Fátima Mattiello-Francisco, Rogério Ishibashi
{"title":"On the use of ontology-based integration architecture in Cemaden's Natural Disaster Observational Network","authors":"André A. S. Ivo, S. G. Ribeiro, Fátima Mattiello-Francisco, Rogério Ishibashi","doi":"10.5753/ladc.2021.18532","DOIUrl":"https://doi.org/10.5753/ladc.2021.18532","url":null,"abstract":"This paper describes a study performed in the Brazilian governmental center, named Cemaden, responsible to monitor natural disasters and sending alerts to the vulnerable community involved. The target of our study is the complex architecture of Cemaden’s Observational Network. It comprises constituent systems (CS) provided by other partners organisms, which operation and maintenance are out of Cemaden con trolling. The correct functioning of those heterogeneous CSs represents a major challenge in this type of system. Thus the comprehension of dependability issues regarding the information flow in the integration of the CSs is essential. Our study compares the current integration architecture based on syntax rules with the use of an ontology-based integration. The advantages of the proposed architecture are discussed in a case study.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Static Analysis Tools Applied to Smart Contracts 应用于智能合约的静态分析工具
Latin-American Symposium on Dependable Computing Pub Date : 2021-11-22 DOI: 10.5753/ladc.2021.18529
Mirko Staderini, A. Pataricza, A. Bondavalli
{"title":"Static Analysis Tools Applied to Smart Contracts","authors":"Mirko Staderini, A. Pataricza, A. Bondavalli","doi":"10.5753/ladc.2021.18529","DOIUrl":"https://doi.org/10.5753/ladc.2021.18529","url":null,"abstract":"Smart contracts are one of the most important innovations of the second generation of the Blockchain. They are widely used in various contexts, including financial, insurance, gaming, and betting. Once a smart contract is deployed on a Blockchain, due to its code immutability, residual vulnerabilities cannot be patched. Static analysis is an efficient method for vulnerability detection. This paper addresses the security evaluation and improvement of Solidity smart contracts through the use of static analysis tools, discussing: (i) the motivation and background, (ii) the evaluation of how good the tools are for improving security, (iii) their combination, and (iv) main results.","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Failure Boundedness in Discrete Applications 离散应用中的故障有界性
Latin-American Symposium on Dependable Computing Pub Date : 2007-09-26 DOI: 10.1007/978-3-540-75294-3_12
J. Muranho, Paula Prata, M. Z. Rela, J. G. Silva
{"title":"Failure Boundedness in Discrete Applications","authors":"J. Muranho, Paula Prata, M. Z. Rela, J. G. Silva","doi":"10.1007/978-3-540-75294-3_12","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_12","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116331424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) 日常嵌入式系统的可靠性、安全性和安全性(扩展摘要)
Latin-American Symposium on Dependable Computing Pub Date : 2007-09-26 DOI: 10.1007/978-3-540-75294-3_1
P. Koopman
{"title":"Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract)","authors":"P. Koopman","doi":"10.1007/978-3-540-75294-3_1","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_1","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementing Fault Tolerance Using Aspect Oriented Programming 使用面向方面编程实现容错
Latin-American Symposium on Dependable Computing Pub Date : 2007-09-26 DOI: 10.1007/978-3-540-75294-3_6
Ruben Alexandersson, Peter Öhman
{"title":"Implementing Fault Tolerance Using Aspect Oriented Programming","authors":"Ruben Alexandersson, Peter Öhman","doi":"10.1007/978-3-540-75294-3_6","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_6","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Assessing, Measuring, and Benchmarking Dependability and Resilience 评估、测量和基准测试可靠性和弹性
Latin-American Symposium on Dependable Computing Pub Date : 2007-09-26 DOI: 10.1007/978-3-540-75294-3_21
H. Madeira
{"title":"Assessing, Measuring, and Benchmarking Dependability and Resilience","authors":"H. Madeira","doi":"10.1007/978-3-540-75294-3_21","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_21","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122305954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated Intrusion Detection in Databases 数据库集成入侵检测
Latin-American Symposium on Dependable Computing Pub Date : 2007-09-26 DOI: 10.1007/978-3-540-75294-3_15
J. Fonseca, M. Vieira, H. Madeira
{"title":"Integrated Intrusion Detection in Databases","authors":"J. Fonseca, M. Vieira, H. Madeira","doi":"10.1007/978-3-540-75294-3_15","DOIUrl":"https://doi.org/10.1007/978-3-540-75294-3_15","url":null,"abstract":"","PeriodicalId":404669,"journal":{"name":"Latin-American Symposium on Dependable Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133560289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信