983 research outputs found
TrustZone based attestation in secure runtime verification for embedded systems
Dissertação de mestrado integrado em Engenharia InformáticaARM TrustZone é um “Ambiente de Execução Confiável” disponibilizado em processadores da ARM, que
equipam grande parte dos sistemas embebidos. Este mecanismo permite assegurar que componentes
críticos de uma aplicação executem num ambiente que garante a confidencialidade dos dados e integridade
do código, mesmo que componentes maliciosos estejam instalados no mesmo dispositivo. Neste projecto
pretende-se tirar partido do TrustZone no contexto de uma framework segura de monitorização em tempo
real de sistemas embebidos. Especificamente, pretende-se recorrer a components como o ARM Trusted
Firmware, responsável pelo processo de secure boot em sistemas ARM, para desenvolver um mecanismo
de atestação que providencie garantias de computação segura a entidades remotas.ARM TrustZone is a security extension present on ARM processors that enables the development of hardware
based Trusted Execution Environments (TEEs). This mechanism allows the critical components of an
application to execute in an environment that guarantees data confidentiality and code integrity, even when a
malicious agent is installed on the device. This projects aims to harness TrustZone in the context of a secure
runtime verification framework for embedded devices. Specifically, it aims to harness existing components,
namely ARM Trusted Firmware, responsible for the secure boot process of ARM devices, to implement an
attestation mechanism that provides proof of secure computation to remote parties.This work has been partially supported by the Portuguese Foundation for Science and
Technology (FCT), project REASSURE (PTDC/EEI-COM/28550/2017), co-financed by
the European Regional Development Fund (FEDER), through the North Regional Operational Program (NORTE 2020)
The state of adoption and the challenges of systematic variability management in industry
Handling large-scale software variability is still a challenge for many organizations. After decades of research on variability management concepts, many industrial organizations have introduced techniques known from research, but still lament that pure textbook approaches are not applicable or efficient. For instance, software product line engineering—an approach to systematically develop portfolios of products—is difficult to adopt given the high upfront investments; and even when adopted, organizations are challenged by evolving their complex product lines. Consequently, the research community now mainly focuses on re-engineering and evolution techniques for product lines; yet, understanding the current state of adoption and the industrial challenges for organizations is necessary to conceive effective techniques. In this multiple-case study, we analyze the current adoption of variability management techniques in twelve medium- to large-scale industrial cases in domains such as automotive, aerospace or railway systems. We identify the current state of variability management, emphasizing the techniques and concepts they adopted. We elicit the needs and challenges expressed for these cases, triangulated with results from a literature review. We believe our results help to understand the current state of adoption and shed light on gaps to address in industrial practice.This work is supported by Vinnova Sweden, Fond Unique Interminist´eriel (FUI) France, and the Swedish Research Council.
Open access funding provided by University of Gothenbur
7. GI/ITG KuVS Fachgespräch Drahtlose Sensornetze
In dem vorliegenden Tagungsband sind die Beiträge des Fachgesprächs Drahtlose Sensornetze 2008 zusammengefasst. Ziel dieses Fachgesprächs ist es, Wissenschaftlerinnen und Wissenschaftler aus diesem Gebiet die Möglichkeit zu einem informellen Austausch zu geben – wobei immer auch Teilnehmer aus der Industrieforschung willkommen sind, die auch in diesem Jahr wieder teilnehmen.Das Fachgespräch ist eine betont informelle Veranstaltung der GI/ITG-Fachgruppe „Kommunikation und Verteilte Systeme“ (www.kuvs.de). Es ist ausdrücklich keine weitere Konferenz mit ihrem großen Overhead und der Anforderung, fertige und möglichst „wasserdichte“ Ergebnisse zu präsentieren, sondern es dient auch ganz explizit dazu, mit Neueinsteigern auf der Suche nach ihrem Thema zu diskutieren und herauszufinden, wo die Herausforderungen an die zukünftige Forschung überhaupt liegen.Das Fachgespräch Drahtlose Sensornetze 2008 findet in Berlin statt, in den Räumen der Freien Universität Berlin, aber in Kooperation mit der ScatterWeb GmbH. Auch dies ein Novum, es zeigt, dass das Fachgespräch doch deutlich mehr als nur ein nettes Beisammensein unter einem Motto ist.Für die Organisation des Rahmens und der Abendveranstaltung gebührt Dank den beiden Mitgliedern im Organisationskomitee, Kirsten Terfloth und Georg Wittenburg, aber auch Stefanie Bahe, welche die redaktionelle Betreuung des Tagungsbands übernommen hat, vielen anderen Mitgliedern der AG Technische Informatik der FU Berlin und natürlich auch ihrem Leiter, Prof. Jochen Schiller
Control Behavior Integrity for Distributed Cyber-Physical Systems
Cyber-physical control systems, such as industrial control systems (ICS), are
increasingly targeted by cyberattacks. Such attacks can potentially cause
tremendous damage, affect critical infrastructure or even jeopardize human life
when the system does not behave as intended. Cyberattacks, however, are not new
and decades of security research have developed plenty of solutions to thwart
them. Unfortunately, many of these solutions cannot be easily applied to
safety-critical cyber-physical systems. Further, the attack surface of ICS is
quite different from what can be commonly assumed in classical IT systems.
We present Scadman, a system with the goal to preserve the Control Behavior
Integrity (CBI) of distributed cyber-physical systems. By observing the
system-wide behavior, the correctness of individual controllers in the system
can be verified. This allows Scadman to detect a wide range of attacks against
controllers, like programmable logic controller (PLCs), including malware
attacks, code-reuse and data-only attacks. We implemented and evaluated Scadman
based on a real-world water treatment testbed for research and training on ICS
security. Our results show that we can detect a wide range of
attacks--including attacks that have previously been undetectable by typical
state estimation techniques--while causing no false-positive warning for
nominal threshold values.Comment: 15 pages, 8 figure
NETWORK FOR MULTIMEDIA APPLICATION
International audienceFor the last four decades, the number and sophistication of electronic systems in vehicles have shown an exponential increase. One high-growth area is telematics systems-the convergence of mobile telecommunications and information processing in cars (radios, Web browsers, CD/DVD players, telematics, and infotainment systems). There is the need for a high-speed serial interface for future vehicles, able to share audio-video sources between all passengers and able to connect automotive electronic world with consumer electronic world. Different networks are available for multimedia automotive applications. Because of their capabilities IDB-1394b and Most are strong candidate. IDB 1394 is the automotive version of IEEE 1394 version b. It is designed for high-speed multimedia applications that require large amounts of information to be moved quickly in a vehicle. Key features include hot plug capability, compatibility with consumer electronics and the ability to use small, flexible, and inexpensive cables and connectors. Its flexible topology supports both branching and daisy-chaining of nodes. MOST (Media Oriented Systems Transport) is a Multimedia optical fiber system transport that is designed for the automotive environment. This paper presents the main characteristics of these two multimedia protocols. It includes the electrical characteristics, topology, transmission media, software layers… It includes as well some examples of applications and platform developmen
Flora Robotica – Mixed Societies of Symbiotic Robot-Plant Bio-Hybrids
Besides the life-as-it-could-be driver of artificial life research there is also the concept of extending natural life by creating hybrids or mixed societies that are built from both natural and artificial components. In this paper, we motivate and present the research program of the project flora robotica. We present our concepts of control, hardware de-sign, modeling, and human interaction along with preliminary experiments. Our objective is to develop and to investigate closely linked symbiotic relationships between robots and natural plants and to explore the potentials of a plant-robot society able to produce archi-tectural artifacts and living spaces. These robot-plant bio-hybrids create synergies that allow for new functions of plants and robots. They also create novel design opportunities for an architecture that fuses the design and construction phase. The bio-hybrid is an example of mixed societies between ‘hard artificial and ‘wet natural life, which enables an interaction between natural and artificial ecologies. They form an embodied, self-organizing, and distributed cognitive system which is supposed to grow and develop over long periods of time resulting in the creation of meaningful architectural structures. A key idea is to assign equal roles to robots and plants in order to create a highly integrated, symbiotic system. Besides the gain of knowledge, this project has the objective to cre-ate a bio-hybrid system with a defined function and application – growing architectural artifacts
- …