2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)最新文献

筛选
英文 中文
The Effect of Motion on PPG Heart Rate Sensors 运动对PPG心率传感器的影响
Daniel Hu, Calvin Henry, S. Bagchi
{"title":"The Effect of Motion on PPG Heart Rate Sensors","authors":"Daniel Hu, Calvin Henry, S. Bagchi","doi":"10.1109/dsn-s50200.2020.00032","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00032","url":null,"abstract":"As smartwatches become more commonly used for keeping track of health data, their accuracy becomes more and more important. In this paper, we investigate the accuracy of smartwatch heart rate sensors and how it depends on the movement of the wearer. Some additional steps were taken in being able to predict whether a smart watch will report an accurate heart rate based on motion using a support vector machine.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Consensus Generation with Distributed DoH 分布式DoH的安全共识生成
Philipp Jeitner, Haya Shulman, M. Waidner
{"title":"Secure Consensus Generation with Distributed DoH","authors":"Philipp Jeitner, Haya Shulman, M. Waidner","doi":"10.1109/DSN-S50200.2020.00023","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00023","url":null,"abstract":"Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by doing plain DNS queries. A recent off-path attack [1] against NTP and security enhanced NTP with Chronos [2] showed that relying on DNS for generating the pool of NTP servers introduces a weak link. In this work, we propose a secure, backward-compatible address pool generation method using distributed DNS-over-HTTPS (DoH) resolvers which is aimed to prevent such attacks against server pool generation.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116964304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment CanvasMirror: WebVR环境下第三方库的安全集成
Jiyeon Lee
{"title":"CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment","authors":"Jiyeon Lee","doi":"10.1109/dsn-s50200.2020.00040","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00040","url":null,"abstract":"Web technology has evolved to offer 360-degree immersive browsing experiences. This new technology, called WebVR, enables virtual reality by rendering a three-dimensional world on an HTML canvas. Unfortunately, there exists no browser-supported way of sharing this canvas between different parties. As a result, third-party library providers with ill intent (e.g., stealing sensitive information from end-users) can easily distort the entire WebVR site. To mitigate the new threats posed in WebVR, we propose CanvasMirror, which allows publishers to specify the behaviors of third-party libraries and enforce this specification. We show that CanvasMirror effectively separates the third-party context from the host origin by leveraging the privilege separation technique and safely integrates VR contents on a shared canvas.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129687075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Industry Track Programme Committee 行业跟踪计划委员会
{"title":"Industry Track Programme Committee","authors":"","doi":"10.1109/dsn-s50200.2020.00006","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00006","url":null,"abstract":"","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page iii 第三页标题
{"title":"Title Page iii","authors":"","doi":"10.1109/dsn-s50200.2020.00002","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00002","url":null,"abstract":"","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134051531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale 迈向实用的大规模保护隐私的协作机器学习
Rania Talbi
{"title":"Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale","authors":"Rania Talbi","doi":"10.1109/dsn-s50200.2020.00037","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00037","url":null,"abstract":"Collaborative machine learning allows multiple participants to get a global and valuable insight over their joint data. Nonetheless, in data-sensitive applications, it is crucial to maintain confidentiality across the end-to-end path the data follows from model training phase to the inference phase, preventing any form of information leakage about training data, the learned model, or the inference queries. In this paper, we present our approach to addressing this problem through PrivML, a framework for end-to-end outsourced privacy-preserving data classification over encrypted data. We provide some preliminary results comparing our proposal with state of the art solutions as well as some insight on our prospective research plan.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129805443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology Configuration Management for Knowledge-Centric Systems Engineering in Industry 面向工业知识中心系统工程的本体配置管理
Borja López, J. Rodríguez, Eugenio Parra, J. Vara
{"title":"Ontology Configuration Management for Knowledge-Centric Systems Engineering in Industry","authors":"Borja López, J. Rodríguez, Eugenio Parra, J. Vara","doi":"10.1109/dsn-s50200.2020.00022","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00022","url":null,"abstract":"The engineering of safety-critical systems is a complex process whose cost-effectiveness is very important. Reuse of system artefacts is an activity that can contribute to improving quality and to saving costs during the process. Reuse must pay attention to artefact configuration management, as an artefact evolves through different versions and such an evolution must be properly managed. An artefact type that is used nowadays in industry for the engineering of safety-critical systems and can be reused is ontologies, which represent system domain information via knowledge representations. However, academic approaches for ontology reuse do not meet industrial needs for their application for systems engineering. As a solution, this paper presents an industrial approach to define and operate ontologies as libraries of knowledge to enable ontology configuration management. The approach supports the reuse and exploitation of domain knowledge through operations for mapping, alignment, and merge of ontology elements. The proposed approach, the current implementation, and validation activities are presented on top of the Knowledge Manager tool.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SIMBA: An Efficient Simulator for Blockchain Applications SIMBA:区块链应用程序的高效模拟器
S. Fattahi, A. Makanju, A. M. Fard
{"title":"SIMBA: An Efficient Simulator for Blockchain Applications","authors":"S. Fattahi, A. Makanju, A. M. Fard","doi":"10.1109/dsn-s50200.2020.00028","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00028","url":null,"abstract":"Predicting the performance of a blockchain application during the design phase is difficult and evaluation after it is built could be expensive. The ability to simulate a blockchain network during the design stage in order to evaluate it is therefore a necessity. In this paper, we present a simulator for blockchain applications, called SIMBA (SIMulator for Blockchain Applications). SIMBA extends an existing simulator by adding the Merkle tree feature to blockchain nodes to improve efficiency and allowing more realistic evaluations not possible with the base tool to be performed. Results of our experiments show that the inclusion of Merkle trees has a high impact of up to 30 times reduction in the verification time of block transactions without an impact on block propagation delay. Since block verification is a critical part of the computational load of nodes on the network, this performance improvement significantly affects the overall performance of each node and consequently the entire network.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133250238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cross-Layer Soft-Error Resilience Analysis of Computing Systems 计算系统的跨层软错误弹性分析
A. Bosio, R. Canal, S. Carlo, D. Gizopoulos, A. Savino
{"title":"Cross-Layer Soft-Error Resilience Analysis of Computing Systems","authors":"A. Bosio, R. Canal, S. Carlo, D. Gizopoulos, A. Savino","doi":"10.1109/dsn-s50200.2020.00042","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00042","url":null,"abstract":"In a world with computation at the epicenter of every activity, computing systems must be highly resilient to errors even if miniaturization makes the underlying hardware unreliable. Techniques able to guarantee high reliability are associated to high costs. Early resilience analysis has the potential to support informed design decisions to maximize system-level reliability while minimizing the associated costs. This tutorial focuses on early cross-layer (hardware and software) resilience analysis considering the full computing continuum (from IoT/CPS to HPC applications) with emphasis on soft errors.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Monitor as Key Architecture Element for Safe Self-Driving Cars 监视器是安全自动驾驶汽车的关键架构元素
Ayhan Mehmed, Moritz Antlanger, W. Steiner
{"title":"The Monitor as Key Architecture Element for Safe Self-Driving Cars","authors":"Ayhan Mehmed, Moritz Antlanger, W. Steiner","doi":"10.1109/dsn-s50200.2020.00015","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00015","url":null,"abstract":"While research in self-driving cars continuous to boom, research of their dependability aspects is only emerging. In particular, trade-off studies on fault-tolerant architectures for safe self-driving cars are largely missing, but desperately needed by the automotive industry. In this paper we give a brief overview of some possible architecture designs, and argue in favour of those architectures that implement a monitor element. We also formulate open research questions with respect to monitor construction and permissible interfaces from the monitor to other elements that constitute the architecture.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114405594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信