2,604 research outputs found
Model Predictive Control for Signal Temporal Logic Specification
We present a mathematical programming-based method for model predictive
control of cyber-physical systems subject to signal temporal logic (STL)
specifications. We describe the use of STL to specify a wide range of
properties of these systems, including safety, response and bounded liveness.
For synthesis, we encode STL specifications as mixed integer-linear constraints
on the system variables in the optimization problem at each step of a receding
horizon control framework. We prove correctness of our algorithms, and present
experimental results for controller synthesis for building energy and climate
control
An Assurance Framework for Independent Co-assurance of Safety and Security
Integrated safety and security assurance for complex systems is difficult for
many technical and socio-technical reasons such as mismatched processes,
inadequate information, differing use of language and philosophies, etc.. Many
co-assurance techniques rely on disregarding some of these challenges in order
to present a unified methodology. Even with this simplification, no methodology
has been widely adopted primarily because this approach is unrealistic when met
with the complexity of real-world system development.
This paper presents an alternate approach by providing a Safety-Security
Assurance Framework (SSAF) based on a core set of assurance principles. This is
done so that safety and security can be co-assured independently, as opposed to
unified co-assurance which has been shown to have significant drawbacks. This
also allows for separate processes and expertise from practitioners in each
domain. With this structure, the focus is shifted from simplified unification
to integration through exchanging the correct information at the right time
using synchronisation activities
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware
Graphical User Interface (GUI) Development for an Optical Communication Simulator
Modeling and simulation tools have been an integral part of engineering world for a long time. Various Electronic Design Automation (EDA) tools have been extensively used in various industries and research to evaluate the performance of electronic systems. The advancement of such design tools also has influenced the optical communication sector such that there has been a continuous progress on the Photonic Design Automation (PDA) tools. Currently, many software for simulating optical communications are available. However, they are very expensive and conceal the information on how components are modeled. To avoid these constraints, we developed our own PDA software for optical communication. This thesis delves into the development of Graphical User Interface (GUI) of our software. The studied GUI software conforms to the feature of standard simulation software and assists the users to perform a system-level simulation of fiber optic communication. The developed GUI allows the users to design their layout, run the simulation and view the results in the form of data or plot. The GUI is explained with respect to the graphical layout and the interactive features of the components. The detailed structure is described along with the Java library used to build them. The interactive aspects of GUI are investigated, for adding the hierarchical feature to our GUI software. In addition, a plotting tool is created for the GUI. The thesis provides comprehensive information on working principle of GUI for simulation software and describes the addition of plotting tool and hierarchical design in detail
Recommended from our members
The European Union as a Cybersecurity Actor
The working paper discusses the challenges facing the European Union as it seeks to become a more active player in the field of cybersecurity. It outlines the concept of cybersecurity and the various approaches to cybersecurity governance. It then discusses the EU’s approach to cybersecurity issues, focusing on three elements: cybercrime, network and information security, and cyber-defence. Although a relative newcomer on the scene, the EU has made strides towards establishing a coherent policy framework across these areas. The EU is also developing a role in cyber defence, a field that has been largely left to the Member States. It finally analyses the external dimension of cybersecurity policy, and argues that the EU can influence the development of international norms. EU policy must also deal with the political and diplomatic dimension, especially as threats of state-sponsored cyber attacks increase
- …