2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)最新文献

筛选
英文 中文
Towards a Security-Enhanced Cloud Platform 迈向安全增强的云平台
Junsik Seo, Jaehyun Nam, Seungwon Shin
{"title":"Towards a Security-Enhanced Cloud Platform","authors":"Junsik Seo, Jaehyun Nam, Seungwon Shin","doi":"10.1109/PRDC.2018.00042","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00042","url":null,"abstract":"While cloud computing platform becomes popular and works as a platform for network function virtualization (NFV), the security of the cloud also becomes an important subject. However, although there are many works about security mechanisms, there has not been much research into what problems can occur when these conventional mechanisms are applied to the cloud system. Thus, we have given more attention to the robustness of communications resided in the cloud, not security mechanism itself, and found that security threats could arise from communication between cloud services and identification process. To cope with this problem, we propose three approaches: integrative identification system in a single cloud service, action-based token authorization, and partially encrypted communication between the identification system and cloud services. By implementing these approaches to open-source cloud computing platform, Openstack, we show that our approaches are feasible.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124873679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Title page i] [标题页i]
{"title":"[Title page i]","authors":"","doi":"10.1109/prdc.2018.00001","DOIUrl":"https://doi.org/10.1109/prdc.2018.00001","url":null,"abstract":"","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On IoT Misbehavior Detection in Cyber Physical Systems 网络物理系统中物联网不当行为检测研究
I. You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, I. Chen, Jin-Hee Cho
{"title":"On IoT Misbehavior Detection in Cyber Physical Systems","authors":"I. You, Kangbin Yim, Vishal Sharma, Gaurav Choudhary, I. Chen, Jin-Hee Cho","doi":"10.1109/PRDC.2018.00033","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00033","url":null,"abstract":"This article discusses a lightweight behavior rule specification-based monitoring solution for identifying misbehavior of an embedded IoT device. These unusual activities are exhibited because of attacks exploiting the vulnerability exposed through automatic model checking and formal verification. It is conclusive in the presented research that rule specification-based misbehavior detection technique outperforms contemporary anomaly-based misbehavior detection techniques for an unmanned aerial vehicle (UAV) cyber-physical system.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126660396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/prdc.2018.00003","DOIUrl":"https://doi.org/10.1109/prdc.2018.00003","url":null,"abstract":"","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126196886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for Approximate Adders Reliability Estimation Based on PTM Model 基于PTM模型的加法器可靠性近似估计方法
Jianhui Jiang, Guangming Lu, Zhen Wang
{"title":"Methods for Approximate Adders Reliability Estimation Based on PTM Model","authors":"Jianhui Jiang, Guangming Lu, Zhen Wang","doi":"10.1109/PRDC.2018.00038","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00038","url":null,"abstract":"Approximate adders have become a focus of approximate circuit design. However, there has been a lack of appropriate methods to evaluate their reliability. The existing analytical methods for accurate circuits cannot be applied to approximate circuits directly, and the Monte-Carlo simulation is time-consuming. Some metrics such as worst-case error, error distance, mean error distance and normalized error distance have been used to describe the reliability characters and arithmetic performance of approximate circuits, but they cannot directly calculate the reliability. This paper presents two methods for approximate adders reliability estimation based on the probabilistic transfer matrix (PTM) model. The first method takes the sum of the probabilities of all acceptable outputs as the probability of acceptable result corresponding to each input. The second method calculates the probability of acceptable result according to the deviation between the acceptable output and exact output. The reliability of approximate adders is calculated by combining the probabilities of the input vectors and those of the corresponding acceptable results. Experimental results demonstrate the validity and accuracy of the proposed methods.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
[Title page iii] [标题页iii]
{"title":"[Title page iii]","authors":"","doi":"10.1109/prdc.2018.00002","DOIUrl":"https://doi.org/10.1109/prdc.2018.00002","url":null,"abstract":"","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"abs/2209.03352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control Flow Checking Optimization Based on Regular Patterns Analysis 基于规则模式分析的控制流检测优化
Zhiqi Zhu, Joseph Callenes-Sloan, Benjamin Carrión Schäfer
{"title":"Control Flow Checking Optimization Based on Regular Patterns Analysis","authors":"Zhiqi Zhu, Joseph Callenes-Sloan, Benjamin Carrión Schäfer","doi":"10.1109/PRDC.2018.00036","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00036","url":null,"abstract":"With the continuous sub-micron process scaling, reliability of integrated circuits has quickly become a first-order design concern. In modern computing systems, transient errors are increasingly likely to corrupt the computation by altering the control flow or sequencing of instructions, leading to catastrophic failures. Prior work on control flow checking provides good coverage but at a high cost. In this paper, by exploring regular control flow patterns found in most applications, we propose the optimization schemes for software signature control flow checking that could reduce the error detection overheads. Specifically, we leverage the fact that most applications have: (1) simple fan-in / fan-out control flow patterns, and (2) most of control flows can be predicted during the compilation stage through static branch prediction heuristics. By exploiting these opportunities, we propose two techniques to reduce the number of inserted codes at common paths and simplify control flow checking of irregular patterns with minimal overheads. Experimental results on a variety of applications demonstrate that our approaches could reduce checking overhead by almost 2.5x on average while leading to similar fault coverage compared to traditional control flow checking.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal Problems 基于混合自动机的室内温度变化建模及热问题检测
Zhengguo Yang, Toshiaki Aoki, Yasuo Tan
{"title":"Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal Problems","authors":"Zhengguo Yang, Toshiaki Aoki, Yasuo Tan","doi":"10.1109/PRDC.2018.00024","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00024","url":null,"abstract":"Hybrid automata are a formal model for dynamical systems with discrete and continuous components. This paper exploits the capability of hybrid automata to model the required indoor temperature change for comprehensively detecting thermal problems. The requirement is to specify the changes in the indoor temperature by considering thermal discomfort that ranges from uncomfortable to serious. We first devise an example of home appliance control service for indoor temperature adjustment. Then, based on the example, this paper proposes the modeling of the required indoor temperature change by hybrid automata. To this end, we represent different states of the hybrid automata, which correspond to different thermal sensations of indoor temperature change, by resorting to various indices. Then, the required indoor temperature change is prescribed by heat exchange between indoor and outdoor. Experiment results demonstrate the capability of hybrid automata to model the required indoor temperature change.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"71 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134019423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Data Error Detection Technique for Dependable Embedded Software 一种改进的可靠嵌入式软件数据错误检测技术
Venu Babu Thati, J. Vankeirsbilck, Niels Penneman, D. Pissoort, J. Boydens
{"title":"An Improved Data Error Detection Technique for Dependable Embedded Software","authors":"Venu Babu Thati, J. Vankeirsbilck, Niels Penneman, D. Pissoort, J. Boydens","doi":"10.1109/PRDC.2018.00037","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00037","url":null,"abstract":"This paper presents a new software-implemented data error detection technique called Full Duplication and Selective Comparison. Our technique combines the ideas of existing techniques in order to increase the fault detection ratio, decrease the imposed code size and execution time overhead. As the name gives away, we opt to duplicate the entire code base and place comparison instructions in critical basic blocks only. The critical basic blocks are the blocks with two or more incoming edges. We evaluate our technique by implementing it for several case studies and by performing fault injection experiments. Next, we compared the obtained results to the parameters of three established techniques: Error Detection by Diverse Data and Duplicated Instructions, Critical Block Duplication and Software Implemented Fault Tolerance. The results show an average increase of 20.5% in fault detection ratio and an average decrease in code size and execution time overhead of 12.6% and 0.5%, respectively.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130934188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems 确定保护网络物理系统安全的可容忍攻击面
C. Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, W. G. Temple, W. Sanders
{"title":"Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems","authors":"C. Cheh, Ahmed M. Fawaz, Mohammad A. Noureddine, Binbin Chen, W. G. Temple, W. Sanders","doi":"10.1109/PRDC.2018.00023","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00023","url":null,"abstract":"As safety-critical systems become increasingly interconnected, a system's operations depend on the reliability and security of the computing components and the interconnections among them. Therefore, a growing body of research seeks to tie safety analysis to security analysis. Specifically, it is important to analyze system safety under different attacker models. In this paper, we develop generic parameterizable state automaton templates to model the effects of an attack. Then, given an attacker model, we generate a state automaton that represents the system operation under the threat of the attacker model. We use a railway signaling system as our case study and consider threats to the communication protocol and the commands issued to physical devices. Our results show that while less skilled attackers are not able to violate system safety, more dedicated and skilled attackers can affect system safety. We also consider several countermeasures and show how well they can deter attacks.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信