Biblio

Found 4176 results

Filters: First Letter Of Last Name is M  [Clear All Filters]
2018-05-23
Anitha Murugesan, Michael W. Whalen, Sanjai Rayadurgam, Mats Per Erik Heimdahl.  2013.  Compositional verification of a medical device system. Proceedings of the 2013 {ACM} SIGAda annual conference on High integrity language technology, {HILT} 2013. :51–64.
2020-01-20
Musca, Constantin, Mirica, Emma, Deaconescu, Razvan.  2013.  Detecting and Analyzing Zero-Day Attacks Using Honeypots. 2013 19th International Conference on Control Systems and Computer Science. :543–548.

Computer networks are overwhelmed by self propagating malware (worms, viruses, trojans). Although the number of security vulnerabilities grows every day, not the same thing can be said about the number of defense methods. But the most delicate problem in the information security domain remains detecting unknown attacks known as zero-day attacks. This paper presents methods for isolating the malicious traffic by using a honeypot system and analyzing it in order to automatically generate attack signatures for the Snort intrusion detection/prevention system. The honeypot is deployed as a virtual machine and its job is to log as much information as it can about the attacks. Then, using a protected machine, the logs are collected remotely, through a safe connection, for analysis. The challenge is to mitigate the risk we are exposed to and at the same time search for unknown attacks.

2018-05-14
David Broman, Christopher X. Brooks, Lev Greenberg, Edward A. Lee, Michael Masin, Stavros Tripakis, Michael Wetter.  2013.  Determinate composition of FMUs for co-simulation. Proceedings of the International Conference on Embedded Software, {EMSOFT} 2013, Montreal, QC, Canada, September 29 - Oct. 4, 2013. :2:1–2:12.
2018-05-23
R. Mangharam, M. Pajic.  2013.  Distributed Control for Cyber-Physical Systems. Journal of the Indian Institute of Science, Special Issue on Cyber-Physical Systems. 93
2018-05-27
Weicong Ding, Prakash Ishwar, Venkatesh Saligrama.  2013.  Dynamic topic discovery through sequential projections. 2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, November 3-6, 2013. :1100–1104.
2018-05-23
Kohl, Benjamin A., Chen, Sanjian, Mullen-Fortino, Margaret, Lee, Insup.  2013.  Evaluation and Enhancement of an Intraoperative Insulin Infusion Protocol via In-Silico Simulation. Proceedings of the 2013 IEEE International Conference on Healthcare Informatics (ICHI '13). :307–316.
2017-02-09
Mohammad Hossein Manshaei, Isfahan University of Technology, Quanyan Zhu, University of Illinois at Urbana-Champaign, Tansu Alpcan, University of Melbourne, Tamer Başar, University of Illinois at Urbana-Champaign, Jean-Pierre Hubaux, Ecole Polytechnique Federal de Lausanne.  2013.  Game Theory Meets Network Security and Privacy. ACM Computing Surveys. 45(3):06/2013.

This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in addressing different forms of security and privacy problems in computer networks and mobile applications. We organize the presented works in six main categories: security of the physical and MAC layers, security of self-organizing networks, intrusion detection systems, anonymity and privacy, economics of network security, and cryptography. In each category, we identify security problems, players, and game models. We summarize the main results of selected works, such as equilibrium analysis and security mechanism designs. In addition, we provide a discussion on the advantages, drawbacks, and future direction of using game theory in this field. In this survey, our goal is to instill in the reader an enhanced understanding of different research approaches in applying gametheoretic methods to network security. This survey can also help researchers from various fields develop game-theoretic solutions to current and emerging security problems in computer networking.

2018-06-04
2018-05-27
Mohammad H. Rohban, Prakash Ishwar, Burkay Orten, William Clement Karl, Venkatesh Saligrama.  2013.  An impossibility result for high dimensional supervised learning. 2013 {IEEE} Information Theory Workshop, {ITW} 2013, Sevilla, Spain, September 9-13, 2013. :1–5.
2018-05-14
2018-05-23
Mats Per Erik Heimdahl, Lian Duan, Anitha Murugesan, Sanjai Rayadurgam.  2013.  Modeling and requirements on the physical side of cyber-physical systems. 2nd International Workshop on the Twin Peaks of Requirements and Architecture, TwinPeaks@ICSE 2013. :1–7.
Anitha Murugesan, Sanjai Rayadurgam, Mats Per Erik Heimdahl.  2013.  Modes, features, and state-based modeling for clarity and flexibility. Proceedings of the 5th International Workshop on Modeling in Software Engineering, MiSE 2013. :13–17.
2018-05-27
2016-12-05
Rogerio de Lemos, Holger Giese, Hausi Muller, Mary Shaw, Jesper Andersson, Marin Litoiu, Bradley Schmerl, Gabriel Tamura, Norha Villegas, Thomas Vogel et al..  2013.  Software engineering for self-adaptive systems: A second research roadmap.

The goal of this roadmap paper is to summarize the stateof-the-art and identify research challenges when developing, deploying and managing self-adaptive software systems. Instead of dealing with a wide range of topics associated with the field, we focus on four essential topics of self-adaptation: design space for self-adaptive solutions, software engineering processes for self-adaptive systems, from centralized to decentralized control, and practical run-time verification & validation for self-adaptive systems. For each topic, we present an overview, suggest future directions, and focus on selected challenges. This paper complements and extends a previous roadmap on software engineering for self-adaptive systems published in 2009 covering a different set of topics, and reflecting in part on the previous paper. This roadmap is one of the many results of the Dagstuhl Seminar 10431 on Software Engineering for Self-Adaptive Systems, which took place in October 2010.

2018-05-27
Delaram Motamedvaziri, Mohammad H. Rohban, Venkatesh Saligrama.  2013.  Sparse signal recovery under Poisson statistics. 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013, Allerton Park {&} Retreat Center, Monticello, IL, USA, October 2-4, 2013. :1450–1457.
Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Venkatesh Saligrama.  2013.  Stochastic threshold group testing. 2013 {IEEE} Information Theory Workshop, {ITW} 2013, Sevilla, Spain, September 9-13, 2013. :1–5.
Weicong Ding, Mohammad Hossein Rohban, Prakash Ishwar, Venkatesh Saligrama.  2013.  Topic Discovery through Data Dependent and Random Projections. Proceedings of the 30th International Conference on Machine Learning, {ICML} 2013, Atlanta, GA, USA, 16-21 June 2013. 28:1202–1210.
Mohamed A. Elgharib, François Pitié, Anil C. Kokaram, Venkatesh Saligrama.  2013.  User-assisted reflection detection and feature point tracking. Conference on Visual Media Production 2013, {CVMP} '13, London, United Kingdom, November 6-7, 2013. :13:1–13:10.
2018-05-23
2017-02-03
Stanley Bak, University of Illinois at Urbana-Champaign, Fardin Abdi, University of Illinois at Urbana-Champaign, Zhenqi Huang, University of Illinois at Urbana-Champaign, Marco Caccamo, University of Illinois at Urbana-Champaign.  2013.  Using Run-Time Checking to Provide Safety and Progress for Distributed Cyber-Physical Systems. 2013 IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications.

Cyber-physical systems (CPS) may interact and manipulate objects in the physical world, and therefore ideally would have formal guarantees about their behavior. Performing statictime proofs of safety invariants, however, may be intractable for systems with distributed physical-world interactions. This is further complicated when realistic communication models are considered, for which there may not be bounds on message delays, or even that messages will eventually reach their destination. In this work, we address the challenge of proving safety and progress in distributed CPS communicating over an unreliable communication layer. This is done in two parts. First, we show that system safety can be verified by partially relying upon runtime checks, and that dropping messages if the run-time checks fail will maintain safety. Second, we use a notion of compatible action chains to guarantee system progress, despite unbounded message delays.We demonstrate the effectiveness of our approach on a multi-agent vehicle flocking system, and show that the overhead of the proposed run-time checks is not overbearing.

2016-12-05
Radu Vanciu, Marwan Abi-Antoun.  2013.  Extracting Dataflow Objects and other Flow Objects. Foundations of Object-Oriented Languages (FOOL) 2013.

Finding architectural flaws in object-oriented code requires a runtime architecture that shows multiple components of the same type that are used in different contexts. Previous work showed that a runtime architecture can be approximated by an abstract object graph that a static analysis extracts from code with Ownership Domain annotations. To find architectural flaws, it is not enough to reason about the presence or absence of communication. Additional work is needed to reason about the content of the communication. The contribution of this paper is a static analysis that extracts a hierarchical object graph with dataflow edges that refer to objects. The extraction analysis combines the aliasing precision provided by Ownership Domains with a domainsensitive value flow analysis. We evaluate the extraction analysis on an open-source Android application and discuss examples of dataflow edges that refer to objects that are in actual domains or to flow objects that are in domains corresponding to unique annotations.

2016-12-06
Radu Vanciu, Marwan Abi-Antoun.  2013.  Finding Security Vulnerabilities that are Architectural Flaws using Constraints. 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

During Architectural Risk Analysis (ARA), security architects use a runtime architecture to look for security vulnerabilities that are architectural flaws rather than coding defects. The current ARA process, however, is mostly informal and manual. In this paper, we propose Scoria, a semi-automated approach for finding architectural flaws. Scoria uses a sound, hierarchical object graph with abstract objects and dataflow edges, where edges can refer to nodes in the graph. The architects can augment the object graph with security properties, which can express security information unavailable in code. Scoria allows architects to write queries on the graph in terms of the hierarchy, reachability, and provenance of a dataflow object. Based on the query results, the architects enhance their knowledge of the system security and write expressive constraints. The expressiveness is richer than previous approaches that check only for the presence or absence of communication or do not track a dataflow as an object. To evaluate Scoria, we apply these constraints to several extended examples adapted from the CERT standard for Java to confirm that Scoria can detect injected architectural flaws. Next, we write constraints to enforce an Android security policy and find one architectural flaw in one Android application.