{"title":"Simulation-based Testing for Early Safety-Validation of Robot Systems","authors":"Tom P. Huck, C. Ledermann, T. Kröger","doi":"10.1109/SPCE50045.2020.9296157","DOIUrl":"https://doi.org/10.1109/SPCE50045.2020.9296157","url":null,"abstract":"Industrial human-robot collaborative systems must be validated thoroughly with regard to safety. The sooner potential hazards for workers can be exposed, the less costly is the implementation of necessary changes. Due to the complexity of robot systems, safety flaws often stay hidden, especially at early design stages, when a physical implementation is not yet available for testing. Simulation-based testing is a possible way to identify hazards in an early stage. However, creating simulation conditions in which hazards become observable can be difficult. Brute-force or Monte-Carlo-approaches are often not viable for hazard identification, due to large search spaces. This work addresses this problem by using a human model and an optimization algorithm to generate high-risk human behavior in simulation, thereby exposing potential hazards. A proof of concept is shown in an application example where the method is used to find hazards in an industrial robot cell.","PeriodicalId":426226,"journal":{"name":"2020 IEEE Symposium on Product Compliance Engineering - (SPCE Portland)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graphical Programming Languages for Functional Safety","authors":"N. Berezowski, M. Haid, J. Biswas, Ishak Boyaci","doi":"10.1109/SPCE50045.2020.9296160","DOIUrl":"https://doi.org/10.1109/SPCE50045.2020.9296160","url":null,"abstract":"Summary:This work presents the current state of research into the development of recommendations for the application of graphic full variability programming languages in safety-related system developments.The basis for the development presents an analysis of existing safety-related standards to understand the way of implementation in text-based programming environments and fulfill applicable requirements.Based on the fundamental standard analysis, a list of different methods and procedures has been created. Their implementation in a graphical full variability programming language meets all requirements following the standards.Therefore, the core of this work essentially provides the development and validation of the recommendations for graphical programming languages to meet applicable standards and guidelines. The result of this development will be architecture and recommendations for programming guidelines.Finally, the received recommendations for a particular graphical programming language shall be used to provide practical proof of feasibility. Recommendations are applied to the concrete development environment LabVIEW with the programming language G. Implementation and validation in an evaluation project and verification through unique methods from the standards have been planned.","PeriodicalId":426226,"journal":{"name":"2020 IEEE Symposium on Product Compliance Engineering - (SPCE Portland)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133642043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open Source Medical Device Safety: Loop Artificial Pancreas Case Report*","authors":"Michael Dorin, H. Mortensen, Sergio Montenegro","doi":"10.1109/SPCE50045.2020.9296152","DOIUrl":"https://doi.org/10.1109/SPCE50045.2020.9296152","url":null,"abstract":"A persistent global challenge is the availability of affordable treatments for chronic conditions. The increasing sophistication of open-source hardware and software systems may provide hope. This report explores the Loop Open-Source Artificial Pancreas (APS). We consider the state of the software source code and report a case study for one individual using the system. Information presented here should be helpful for people with diabetes, considering the incorporation of Loop into their treatment regime or for those considering the development of an open-source medical system.","PeriodicalId":426226,"journal":{"name":"2020 IEEE Symposium on Product Compliance Engineering - (SPCE Portland)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water Infiltration in Common Residential and Commercial Power Cables Introduced by Capillary Action","authors":"A. Kattamis, P. Murphy, M. Pooley, A. Soane","doi":"10.1109/SPCE50045.2020.9296167","DOIUrl":"https://doi.org/10.1109/SPCE50045.2020.9296167","url":null,"abstract":"Damage to electrical power cables caused by complete or partial immersion in flood water in residential and commercial settings is a potentially serious safety concern. Electrical cables with unsealed ends are known to be susceptible to moisture infiltration via capillary action, however, there appears to be a lack of published experimental study of this phenomenon in cables commonly found in residential and commercial installations. This article presents the results of an experiment to quantify the extent of moisture infiltration in service entrance power cables. We cut straight 15 cm long cable sections with open ends from a reel of newly-purchased compact strand aluminum 4/0 XHHW cable. One end of each vertically oriented cable section was left submerged in 2.5 cm of an oxidizing liquid solution for several days. We observed evidence of water infiltration into the cable up to 7 cm above the initial liquid level. The ultimate extent of liquid infiltration and the progression of infiltration over time is expected to depend on the specifics of the cable geometry, design, termination style, and materials.","PeriodicalId":426226,"journal":{"name":"2020 IEEE Symposium on Product Compliance Engineering - (SPCE Portland)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PyLocky Ransomware Source Code Analysis","authors":"Adam Sorini, Gavin D. Scott","doi":"10.1109/SPCE50045.2020.9296183","DOIUrl":"https://doi.org/10.1109/SPCE50045.2020.9296183","url":null,"abstract":"We present an analysis of a recently developed ransomware called “PyLocky.” We first provide an overview of existing tools that may help companies or individuals recover from a “PyLocky.” attack. We also explain the limitations and operating principles of the recovery tools. We next analyze the PyLocky source code, which is now publicly available, and address numerous implementation flaws that may be exploited to speed up a brute force known-plaintext attack on the ransomware’s “two-key triple-DES” encryption scheme. The analysis illustrates general flaws in implementing cryptographic protocols that should be avoided by all software developers. Finally, we note a potentially useful cyber forensic attack on PyLocky that could be helpful for recovery efforts.","PeriodicalId":426226,"journal":{"name":"2020 IEEE Symposium on Product Compliance Engineering - (SPCE Portland)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}