2,812 research outputs found

    Closing the loop of SIEM analysis to Secure Critical Infrastructures

    Get PDF
    Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge. However, they currently present several limitations that have to be overcome. In this paper we propose an enhanced SIEM system in which we have introduced novel components to i) enable multiple layer data analysis; ii) resolve conflicts among security policies, and discover unauthorized data paths in such a way to be able to reconfigure network devices. Furthermore, the system is enriched by a Resilient Event Storage that ensures integrity and unforgeability of events stored.Comment: EDCC-2014, BIG4CIP-2014, Security Information and Event Management, Decision Support System, Hydroelectric Da

    Run-Time Verification of Black-Box Components Using Behavioral Specifications: An Experience Report on Tool Development

    Get PDF
    We introduce a generic component-based design of a run-time checker, identify its components and their requirements, and evaluate existing state of the art tools instantiating each component

    XMovie: Architecture and Implementation of a Distributed Movie System

    Full text link
    We describe a system for storing, transmitting and presenting digital movies in a computer network. The hardware used in the system is standard hardware, as found in typical workstations today; no special hardware is required. The movies are shown in windows of the X window system. This allows full integration with the classical components of computer applications such as text, color graphics, menus and icons. The XMovie system has several innovative features: First, it contains a new algorithm for the gradual adaptation of the color lookup table during the presentation of the movie to ensure optimal color quality on low-end workstations. Second, it is a multi-standard system supporting the compression techniques MPEG, H.261, Motion JPEG, and a newly developed extension to the well known Color Cell Compression method. Third, we introduce AdFEC, a new adaptable forward error correction method for our movie transmission protocol

    Enabling Constraint-based Binary Reconfiguration by Binary Analysis

    Get PDF
    Today’s adaptable architectures require configurabilityand adaptability to be supported already at design level.However, modern software products are often constructed outof reusable but non-adaptable and/or legacy software artifacts(e.g. libraries) to meet early time-to-market requirements. Thus,modern adaptable architectures are rarely used in commercialapplications, because the effort to add adaptability to the reusedsoftware artifacts is just too high. In this paper, we propose amethodology to semi-automatically configure existing binaries ona given set of constraints. It is based on building the annotatedcontrol flow graph to identify and remove unused code on staticbasic block level depending on different execution requirementsgiven as a set of constraints. This allows for adaptation of binariesafter compile time without the use of source code. We thenpropose a way of adding additional reconfiguration support tothese configured binary objects. With this approach, adaptionand reconfiguration can be added with a low effort to nonadaptivesoftware

    Real-time factored ConvNets: Extracting the x factor in human parsing

    Get PDF
    © 2017. The copyright of this document resides with its authors. We propose a real-time and lightweight multi-task style ConvNet (termed a Factored ConvNet) for human body parsing in images or video. Factored ConvNets have isolated areas which perform known sub-tasks, such as object localization or edge detection. We call this area and sub-task pair an X factor. Unlike multi-task ConvNets which have independent tasks, the Factored ConvNet’s sub-task has direct effect on the main task outcome. In this paper we show how to isolate the X factor of foreground/background (f/b) subtraction from the main task of segmenting human body images into 31 different body part types. Knowledge of this X factor leads to a number of benefits for the Factored ConvNet: 1) Ease of network transfer to other image domains, 2) ability to personalize to humans in video and 3) easy model performance boosts. All achieved by either efficient network update or replacement of the X factor whilst avoiding catastrophic forgetting of previously learnt body part dependencies and structure. We show these benefits on a large dataset of images and also on YouTube videos.SeeQuesto

    Real time embedded software system on a heterogeneous Digital Signal Processor and RISC processor architecture

    Get PDF
    International audienceThis paper discusses a generic telematics systems based on the OMAPTM (open multimedia application platform)heterogeneous ARMTM/DSP multiprocessor system. These 2 processors are integrated as SOC (system on chip)with a peripheral mix dedicated to the automotive requirements as a one chip solution. These processors are ableto run parallel various real time applications optimized either for the DSP or the ARM-RISC processor or sharedbetween both processors
    • …
    corecore