Research Organization

news

Visible to the public 2018 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems: 10 April 2018, Porto, Portugal

Dear Colleagues,

It is my pleasure to invite you to the upcoming Workshop on Modeling and Simulation of Cyber-Physical Energy Systems!

http://www.palensky.org/mscpes/2018

After Berkeley, Berlin, Seattle, Vienna, and Pittsburgh, we are this time in beautiful Porto, Portugal, again co-located with the annual Cyber-Physical Systems Week.

Full paper submission deadline is 4th February 2018. Accepted and presented papers will be submitted to IEEE Xplore digital library.

file

Visible to the public ACTIVE: A Tool for Integrating Analysis Contracts

Abstract: Development of modern Cyber-Physical Systems (CPS) relies on a number of analysis tools to verify critical properties. The Architecture Analysis and Design Language (AADL) standard provides a common architectural model to which multiple CPS analyses can be applied. Unfortunately, interaction between these analyses can invalidate their results. In this paper we present ACTIVE, a tool developed within the OSATE/AADL infrastructure to solve this problem.

file

Visible to the public Bringing Roots of Trust to Reality

Abstract:

One of the key themes in the security community over the last few years has been how to create a strong root of trust, particularly in the mobile space. After all, a strong root of trust enables a wide variety of capabilities across a number of industries. Some researchers have responded to this call with various solutions across the mobile and traditional computing worlds, while other researchers have shown how we can use these technologies in various protocols and system designs.

file

Visible to the public A Cut Principle for Information Flow

Presented as part of the 2015 HCSS conference.

Abstract:

We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the graph structure of a system constrains the propagation ofinformation through it.