Biblio

Found 2465 results

Filters: First Letter Of Title is S  [Clear All Filters]
2016-12-05
Rogerio de Lemos, Holger Giese, Hausi Muller, Mary Shaw, Jesper Andersson, Marin Litoiu, Bradley Schmerl, Gabriel Tamura, Norha Villegas, Thomas Vogel et al..  2013.  Software engineering for self-adaptive systems: A second research roadmap.

The goal of this roadmap paper is to summarize the stateof-the-art and identify research challenges when developing, deploying and managing self-adaptive software systems. Instead of dealing with a wide range of topics associated with the field, we focus on four essential topics of self-adaptation: design space for self-adaptive solutions, software engineering processes for self-adaptive systems, from centralized to decentralized control, and practical run-time verification & validation for self-adaptive systems. For each topic, we present an overview, suggest future directions, and focus on selected challenges. This paper complements and extends a previous roadmap on software engineering for self-adaptive systems published in 2009 covering a different set of topics, and reflecting in part on the previous paper. This roadmap is one of the many results of the Dagstuhl Seminar 10431 on Software Engineering for Self-Adaptive Systems, which took place in October 2010.

2018-05-27
Cem Aksoylar, George K. Atia, Venkatesh Saligrama.  2013.  Sparse signal processing with linear and non-linear observations: A unified shannon theoretic approach. 2013 {IEEE} Information Theory Workshop, {ITW} 2013, Sevilla, Spain, September 9-13, 2013. :1–5.
Delaram Motamedvaziri, Mohammad H. Rohban, Venkatesh Saligrama.  2013.  Sparse signal recovery under Poisson statistics. 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013, Allerton Park {&} Retreat Center, Monticello, IL, USA, October 2-4, 2013. :1450–1457.
Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi, Venkatesh Saligrama.  2013.  Stochastic threshold group testing. 2013 {IEEE} Information Theory Workshop, {ITW} 2013, Sevilla, Spain, September 9-13, 2013. :1–5.
Kirill Trapeznikov, Venkatesh Saligrama.  2013.  Supervised Sequential Classification Under Budget Constraints. Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics, {AISTATS} 2013, Scottsdale, AZ, USA, April 29 - May 1, 2013. 31:581–589.
2017-02-03
Hui Lin, University of Illinois at Urbana-Champaign, Adam Slagell, University of Illinois at Urbana-Champaign, Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, Peter W. Sauer, University of Illinois at Urbana-Champaign, Ravishankar K. Iyer, University of Illinois at Urbana-Champaign.  2013.  Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids. First ACM Workshop on Smart Engergy Grid Security.

In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes that traditional contingency analysis does not consider and remedial action schemes cannot handle. To detect such malicious commands, we propose a semantic analysis framework based on a distributed network of intrusion detection systems (IDSes). The framework combines system knowledge of both cyber and physical infrastructure in power grid to help IDS to estimate execution consequences of control commands, thus to reveal attacker’s malicious intentions. We evaluated the approach on the IEEE 30-bus system. Our experiments demonstrate that: (i) by opening 3 transmission lines, an attacker can avoid detection by the traditional contingency analysis and instantly put the tested 30-bus system into an insecure state and (ii) the semantic analysis provides reliable detection of malicious commands with a small amount of analysis time.

2014-09-17
Szekeres, L., Payer, M., Tao Wei, Song, D..  2013.  SoK: Eternal War in Memory. Security and Privacy (SP), 2013 IEEE Symposium on. :48-62.

Memory corruption bugs in software written in low-level languages like C or C++ are one of the oldest problems in computer security. The lack of safety in these languages allows attackers to alter the program's behavior or take full control over it by hijacking its control flow. This problem has existed for more than 30 years and a vast number of potential solutions have been proposed, yet memory corruption attacks continue to pose a serious threat. Real world exploits show that all currently deployed protections can be defeated. This paper sheds light on the primary reasons for this by describing attacks that succeed on today's systems. We systematize the current knowledge about various protection techniques by setting up a general model for memory corruption attacks. Using this model we show what policies can stop which attacks. The model identifies weaknesses of currently deployed techniques, as well as other proposed protections enforcing stricter policies. We analyze the reasons why protection mechanisms implementing stricter polices are not deployed. To achieve wide adoption, protection mechanisms must support a multitude of features and must satisfy a host of requirements. Especially important is performance, as experience shows that only solutions whose overhead is in reasonable bounds get deployed. A comparison of different enforceable policies helps designers of new protection mechanisms in finding the balance between effectiveness (security) and efficiency. We identify some open research problems, and provide suggestions on improving the adoption of newer techniques.

2014-10-24
Fulton, Nathan.  2012.  Security Through Extensible Type Systems. Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity. :107–108.
Researchers interested in security often wish to introduce new primitives into a language. Extensible languages hold promise in such scenarios, but only if the extension mechanism is sufficiently safe and expressive. This paper describes several modifications to an extensible language motivated by end-to-end security concerns.
2022-04-20
Wang, Yuying, Zhou, Xingshe, Liang, Dongfang.  2012.  Study on Integrated Modeling Methods toward Co-Simulation of Cyber-Physical System. 2012 IEEE 14th International Conference on High Performance Computing and Communication 2012 IEEE 9th International Conference on Embedded Software and Systems. :1736–1740.
Cyber-physical systems are particularly difficult to model and simulate because their components mix many different system modalities. In this paper we address the main technical challenges on system simulation taking into account by new characters of CPS, and provide a comprehensive view of the simulation modeling methods for integration of continuous-discrete model. Regards to UML and Simulink, two most widely accepted modeling methods in industrial designs, we study on three methods to perform the cooperation of these two kinds of heterogeneous models for co-simulation. The solution of an implementation of co-simulation method for CPS was designed under three levels architecture.
2018-05-27
Cem Aksoylar, George K. Atia, Venkatesh Saligrama.  2012.  Sample complexity of salient feature identification for sparse signal processing. {IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor, MI, USA, August 5-8, 2012. :329–332.
Song Tan, Wen-Zhan Song, Dong, Qifen, Lang Tong.  2012.  SCORE: Smart-Grid Common Open Research Emulator. The 3rd IEEE International Conference on Smart Grid Communications (IEEE SmartGridComm).
2018-05-23
2018-05-27
Zachary Sun, W. Clem Karl, Prakash Ishwar, Venkatesh Saligrama.  2012.  Sensing aware dimensionality reduction for nearest neighbor classification of high dimensional signals. {IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor, MI, USA, August 5-8, 2012. :405–408.
2018-05-23
2020-03-09
Farquharson, J., Wang, A., Howard, J..  2012.  Smart Grid Cyber Security and Substation Network Security. 2012 IEEE PES Innovative Smart Grid Technologies (ISGT). :1–5.

A successful Smart Grid system requires purpose-built security architecture which is explicitly designed to protect customer data confidentiality. In addition to the investment on electric power infrastructure for protecting the privacy of Smart Grid-related data, entities need to actively participate in the NIST interoperability framework process; establish policies and oversight structure for the enforcement of cyber security controls of the data through adoption of security best practices, personnel training, cyber vulnerability assessments, and consumer privacy audits.

2018-05-23
A. Ayoub, B. Kim, I. Lee, O. Sokolsky.  2012.  A Systematic Approach to Justifying Sufficient Confidence in Software Safety Arguments. International Conference on Computer Safety, Reliability and Security ({SAFECOMP 2012}).
2016-12-05
Jiri Simsa, Randy Bryant, Garth Gibson, Jason Hickey.  2012.  Scalable Dynamic Partial Order Reduction. International Conference on Runtime Verification - RV12.

The use of shared mutable state, commonly seen in object-oriented systems, is often problematic due to the potential conflicting interactions between aliases to the same state. We present a substructural type system outfitted with a novel lightweight interference control mechanism, rely-guarantee protocols, that enables controlled aliasing of shared resources. By assigning each alias separate roles, encoded in a novel protocol abstraction in the spirit of rely-guarantee reasoning, our type system ensures that challenging uses of shared state will never interfere in an unsafe fashion. In particular, rely-guarantee protocols ensure that each alias will never observe an unexpected value, or type, when inspecting shared memory regardless of how the changes to that shared state (originating from potentially unknown program contexts) are interleaved at run-time.

2016-12-06
Maria Riaz, Laurie Williams.  2012.  Security Requirements Patterns: Understanding the Science Behind the Art of Pattern Writing. 2012 Second IEEE International Workshop on Requirements Patterns (RePa).

Security requirements engineering ideally combines expertise in software security with proficiency in requirements engineering to provide a foundation for developing secure systems. However, security requirements are often inadequately understood and improperly specified, often due to lack of security expertise and a lack of emphasis on security during early stages of system development. Software systems often have common and recurrent security requirements in addition to system-specific security needs. Security requirements patterns can provide a means of capturing common security requirements while documenting the context in which a requirement manifests itself and the tradeoffs involved. The objective of this paper is to aid in understanding of the process for pattern development and provide considerations for writing effective security requirements patterns. We analyzed existing literature on software patterns, problem solving and cognition to outline the process for developing software patterns. We also reviewed strategies for specifying reusable security requirements and security requirements patterns. Our proposed considerations can aid pattern writers in capturing necessary contextual information when documenting security requirements patterns to facilitate application and integration of security requirements.

2018-05-23
A. Ayoub, B. Kim, I. Lee, O. Sokolsky.  2012.  A Safety Case Pattern for Model-Based Development Approach. Proceedings of the 4$^{th}$ NASA Formal Methods Symposium. :223–243.
2018-07-06
Kloft, Marius, Laskov, Pavel.  2012.  Security Analysis of Online Centroid Anomaly Detection. J. Mach. Learn. Res.. 13:3681–3724.

Security issues are crucial in a number of machine learning applications, especially in scenarios dealing with human activity rather than natural phenomena (e.g., information ranking, spam detection, malware detection, etc.). In such cases, learning algorithms may have to cope with manipulated data aimed at hampering decision making. Although some previous work addressed the issue of handling malicious data in the context of supervised learning, very little is known about the behavior of anomaly detection methods in such scenarios. In this contribution, we analyze the performance of a particular method–online centroid anomaly detection–in the presence of adversarial noise. Our analysis addresses the following security-related issues: formalization of learning and attack processes, derivation of an optimal attack, and analysis of attack efficiency and limitations. We derive bounds on the effectiveness of a poisoning attack against centroid anomaly detection under different conditions: attacker's full or limited control over the traffic and bounded false positive rate. Our bounds show that whereas a poisoning attack can be effectively staged in the unconstrained case, it can be made arbitrarily difficult (a strict upper bound on the attacker's gain) if external constraints are properly used. Our experimental evaluation, carried out on real traces of HTTP and exploit traffic, confirms the tightness of our theoretical bounds and the practicality of our protection mechanisms.

2018-05-23
2018-05-27
Burkay Orten, Prakash Ishwar, William Clement Karl, Venkatesh Saligrama.  2011.  Sensing structure in learning-based binary classification of high-dimensional data. 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park {&} Retreat Center, Monticello, IL, USA, 28-30 September, 2011. :1521–1528.
Burkay Orten, Prakash Ishwar, W. Clem Karl, Venkatesh Saligrama, Homer H. Pien.  2011.  Sensing-aware classification with high-dimensional data. Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2011, May 22-27, 2011, Prague Congress Center, Prague, Czech Republic. :3700–3703.
Joseph Wang, Venkatesh Saligrama, David A. Castañón.  2011.  Structural similarity and distance in learning. 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park {&} Retreat Center, Monticello, IL, USA, 28-30 September, 2011. :744–751.