871 research outputs found

    Beyond Physical Integrity

    Get PDF

    Which attacks lead to hazards? Combining safety and security analysis for cyber-physical systems

    Get PDF
    Cyber-Physical Systems (CPS) are exposed to a plethora of attacks and their attack surface is only increasing. However, whilst many attack paths are possible, only some can threaten the system's safety and potentially lead to loss of life. Identifying them is of essence. We propose a methodology and develop a tool-chain to systematically analyse and enumerate the attacks leading to safety violations. This is achieved by lazily combining threat modelling and safety analysis with formal verification and with attack graph analysis. We also identify the minimum sets of privileges that must be protected to preserve safety. We demonstrate the effectiveness of our methodology to discover threat scenarios by applying it to a Communication Based Train Control System. Our design choices emphasise compatibility with existing safety and security frameworks, whilst remaining agnostic to specific tools or attack graphs representations

    An adaptive policy-based framework for network services management

    No full text
    This paper presents a framework for specifying policies for the management of network services. Although policy-based management has been the subject of considerable research, proposed solutions are often restricted to condition-action rules, where conditions are matched against incoming traffic flows. This results in static policy configurations where manual intervention is required to cater for configuration changes and to enable policy deployment. The framework presented in this paper supports automated policy deployment and flexible event triggers to permit dynamic policy configuration. While current research focuses mostly on rules for low-level device configuration, significant challenges remain to be addressed in order to:a) provide policy specification and adaptation across different abstraction layers; and, b) provide tools and services for the engineering of policy-driven systems. In particular, this paper focuses on solutions for dynamic adaptation of policies in response to changes within the managed environment. Policy adaptation includes both dynamically changing policy parameters and reconfiguring the policy objects. Access control for network services is also discussed.Accepted versio

    Medical students mental health

    Get PDF
    University Center of Primary Health Care, Nicolae Testemitsanu State University of Medicine and Pharmacy, Chisinau, the Republic of MoldovaBackground: Youth is the driving force of society and they contribute to its economic and social development. Health maintenance and improvement activities focused on the younger generation present a major challenge for health policy at the global, regional and local levels. In these circumstances is increasing the role of youth health monitoring and particularly of medical students. Mental health, assessed by such psychological phenomena as anxiety and depression, is an essential component of health monitoring. Having studied the available specialized literature, national and international normative acts and PubMed medical database, we concluded that the prevalence of psychological phenomena in medical students is higher than in general population and peers. The prevalence of anxiety and depression of the medical students during their university training is higher in I-II and V-VI years, being lower in the fourth year. This fact highlights the importance of an ongoing assessment of the students’ mental health throughout the training period and the development of recommendations on medico-psychological assistance for the future doctors. Most studies found higher levels of anxiety and depression prevalence of non-medical students. Conclusions: Analysis of available data shows that the state of mental health of medical students in the South-East European countries is not fully studied. In the Republic of Moldova in this respect have been studied only some aspects of health of a small group

    Neutron diffraction studies of magnetostrictive Fe–Ga alloy ribbons

    Get PDF
    Melt-spun Fe–Ga ribbons were prepared and some ribbons were annealed at 1000 °C for 1 h then slowly cooled to room temperature. X-ray diffraction patterns revealed no evidence of texture and only bcc phase in the as-quenched ribbons. However, high-resolution neutron diffraction patterns gave more information on the structure of these ribbons. Only diffractions from the disordered bcc A2 phase were found in as-quenched ribbons with 15, 17.5, and 19.5 at. % Ga content, without any trace of satellite peaks or splitting peaks from the proposed Ga–Ga pairing superlattice structure. The broadening of the base of the �110� peaks for all samples except the as-quenched 15 at. % Ga ribbon might indicate the existence of some kind of short range ordering. Ribbons developed L12 phase after annealing especially in the Fe 19.5 at. % Ga ribbon where the formation of L12 phase reduced the Ga content in the remaining A2 phase and decreased its lattice parameter dramatically. D03 phase formed in the as-quenched 22.5 at. % Ga ribbon and the following annealing treatment transformed more A2 phase into D03 phase

    Helping forensic analysts to attribute cyber-attacks: an argumentation-based reasoner

    Get PDF
    Discovering who performed a cyber-attack or from where it originated is essential in order to determine an appropriate response and future risk mitigation measures. In this work, we propose a novel argumentation-based reasoner for analyzing and attributing cyber-attacks that combines both technical and social evidence. Our reasoner helps the digital forensics analyst during the analysis of the forensic evidence by providing to the analyst the possible culprits of the attack, new derived evidence, hints about missing evidence, and insights about other paths of investigation. The proposed reasoner is flexible, deals with conflicting and incomplete evidence, and was tested on real cyber-attacks cases

    Determining Resilience Gains from Anomaly Detection for Event Integrity in Wireless Sensor Networks

    Get PDF
    Measurements collected in a wireless sensor network (WSN) can be maliciously compromised through several attacks, but anomaly detection algorithms may provide resilience by detecting inconsistencies in the data. Anomaly detection can identify severe threats to WSN applications, provided that there is a sufficient amount of genuine information. This article presents a novel method to calculate an assurance measure for the network by estimating the maximum number of malicious measurements that can be tolerated. In previous work, the resilience of anomaly detection to malicious measurements has been tested only against arbitrary attacks, which are not necessarily sophisticated. The novel method presented here is based on an optimization algorithm, which maximizes the attack’s chance of staying undetected while causing damage to the application, thus seeking the worst-case scenario for the anomaly detection algorithm. The algorithm is tested on a wildfire monitoring WSN to estimate the benefits of anomaly detection on the system’s resilience. The algorithm also returns the measurements that the attacker needs to synthesize, which are studied to highlight the weak spots of anomaly detection. Finally, this article presents a novel methodology that takes in input the degree of resilience required and automatically designs the deployment that satisfies such a requirement

    Universal adversarial robustness of texture and shape-biased models

    Get PDF
    Increasing shape-bias in deep neural networks has been shown to improve robustness to common corruptions and noise. In this paper we analyze the adversarial robustness of texture and shape-biased models to Universal Adversarial Perturbations (UAPs). We use UAPs to evaluate the robustness of DNN models with varying degrees of shape-based training. We find that shape-biased models do not markedly improve adversarial robustness, and we show that ensembles of texture and shape-biased models can improve universal adversarial robustness while maintaining strong performance

    Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

    Get PDF
    Machine learning has become an important component for many systems and applications including computer vision, spam filtering, malware and network intrusion detection, among others. Despite the capabilities of machine learning algorithms to extract valuable information from data and produce accurate predictions, it has been shown that these algorithms are vulnerable to attacks. Data poisoning is one of the most relevant security threats against machine learning systems, where attackers can subvert the learning process by injecting malicious samples in the training data. Recent work in adversarial machine learning has shown that the so-called optimal attack strategies can successfully poison linear classifiers, degrading the performance of the system dramatically after compromising a small fraction of the training dataset. In this paper we propose a defence mechanism to mitigate the effect of these optimal poisoning attacks based on outlier detection. We show empirically that the adversarial examples generated by these attack strategies are quite different from genuine points, as no detectability constrains are considered to craft the attack. Hence, they can be detected with an appropriate pre-filtering of the training dataset
    • …
    corecore