1,615 research outputs found

    Software Engineering Challenges for Investigating Cyber-Physical Incidents

    Get PDF
    Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm. An increasing number of cyber-physical incidents may occur depending on the configuration of the physical and digital spaces and their interplay. Traditional investigation processes are not adequate to investigate these incidents, as they may overlook the extended attack surface resulting from such interplay, leading to relevant evidence being missed and testing flawed hypotheses explaining the incidents. The software engineering research community can contribute to addressing this problem, by deploying existing formalisms to model digital and physical spaces, and using analysis techniques to reason about their interplay and evolution. In this paper, supported by a motivating example, we describe some emerging software engineering challenges to support investigations of cyber-physical incidents. We review and critique existing research proposed to address these challenges, and sketch an initial solution based on a meta-model to represent cyber-physical incidents and a representation of the topology of digital and physical spaces that supports reasoning about their interplay

    2019 Technical Report: a Review of Age Verification Mechanism for 10 Social Media Apps

    Get PDF
    This technical report analyzes the 10 most used apps among children aged 8-12: Snapchat, Instagram, Tiktok, Viber, Skype, Facebook, HouseParty, Discord, Messenger, WhatsApp. For each application we assess whether the terms of use specify a minimum age that is compliant with the GDPR and whether the specified age is the same across all EU countries. We also verify whether each app provides mechanisms to verify the age of the user and how easy is to circumvent the verification mechanisms. The remainder of this report discusses the results of our study providing evidence to support the answers provided for each question

    On the Automated Management of Security Incidents in Smart Space

    Get PDF
    The proliferation of smart spaces, such as smart buildings, is increasing opportunities for offenders to exploit the interplay between cyber and physical components, in order to trigger security incidents. Organizations are obliged to report security incidents to comply with recent data protection regulations. Organizations can also use incident reports to improve security of the smart spaces where they operate. Incident reporting is often documented in structured natural language. However, reports often do not capture relevant information about cyber and physical vulnerabilities present in a smart space that are exploited during an incident. Moreover, sharing information about security incidents can be difficult, or even impossible, since a report may contain sensitive information about an organization. In previous work, we provided a meta-model to represent security incidents in smart spaces. We also developed an automated approach to share incident knowledge across different organizations. In this paper we focus on incident reporting. We provide a System Editor to represent smart buildings where incidents can occur. Our editor allows us to represent cyber and physical components within a smart building and their interplay. We also propose an Incident Editor to represent the activities of an incident, including —for each activity— the target and the resources exploited, the location where the activity occurred, and the activity initiator. Building on our previous work, incidents represented using our editor can be shared across various organizations, and instantiated in different smart spaces to assess how they can re-occur. We also propose an Incident Filter component that allows viewing and prioritizing the most relevant incident instantiations, for example, involving a minimum number of activities. We assess the feasibility of our approach in assisting incident reporting using an example of a security incident that occurred in a research center

    Service-Oriented Dynamic Software Product Lines

    Get PDF
    An operational example of controls in a smart home demonstrates the potential of a solution that combines the Common Variability Language and a dynamic extension of the Business Process Execution Language to address the need to manage software system variability at runtime

    Engineering topology aware adaptive security: preventing requirements violations at runtime

    Get PDF
    Adaptive security systems aim to protect critical assets in the face of changes in their operational environment. We have argued that incorporating an explicit representation of the environment’s topology enables reasoning on the location of assets being protected and the proximity of potentially harmful agents. This paper proposes to engineer topology aware adaptive security systems by identifying violations of security requirementsthat may be caused by topological changes, and selecting a setof security controls that prevent such violations. Our approach focuses on physical topologies; it maintains at runtime a live representation of the topology which is updated when assets or agents move, or when the structure of the physical space is altered. When the topology changes, we look ahead at a subset of the future system states. These states are reachable when the agents move within the physical space. If security requirements can be violated in future system states, a configuration of security controls is proactively applied to prevent the system from reaching those states. Thus, the system continuously adapts to topological stimuli, while maintaining requirements satisfaction. Security requirements are formally expressed using a propositional temporal logic, encoding spatial properties in Computation Tree Logic (CTL). The Ambient Calculus is used to represent the topology of the operational environment - including location of assets and agents - as well as to identify future system states that are reachable from the current one. The approach is demonstrated and evaluated using a substantive example concerned with physical access control

    Metabolic syndrome and nephrolithiasis: can we hypotize a common background?

    Get PDF
    Metabolic syndrome and nephrolithiasis are quite common disorders presenting similar epidemiological characteristics. Belonging to genetic, environmental and hormonal interaction, they have high incidence and prevalence in the adult population of industrialised countries and are characterised by a high level of morbidity and mortality if not adequately identified and treated. Despite metabolic syndrome is considered a fundamental risk factor for chronic kidney diseases, is not actually known whether it is associated with nephrolithiasis beyond the effect of its individual components, in particular obesity, glucose intolerance, and hypertension. In this paper, the possible pathogenetic links between metabolic syndrome and nephrolithiasis will be presented and discussed

    Digital Age of Consent and Age Verification: Can They Protect Children?

    Get PDF
    Children are increasingly accessing social media content through mobile devices. Existing data protection regulations have focused on defining the digital age of consent, in order to limit collection of children’s personal data by organizations. However, children can easily bypass the mechanisms adopted by apps to verify their age, and thereby be exposed to privacy and safety threats. We conducted a study to identify how the top 10 social and communication apps among underage users apply age limits in their Terms of Use. We also assess the robustness of the mechanisms these apps put in place to verify the age of their users. Moreover, we discuss how automated age recognition techniques can be adopted to increase the effectiveness of the age verification process. Finally, we provide recommendations to app providers and developers to specify the Terms of Use and implement robust age verification mechanisms

    User-centric Adaptation Analysis of Multi-tenant Services

    Get PDF
    Multi-tenancy is a key pillar of cloud services. It allows different users to share computing and virtual resources transparently, meanwhile guaranteeing substantial cost savings. Due to the tradeoff between scalability and customization, one of the major drawbacks of multi-tenancy is limited configurability. Since users may often have conflicting configuration preferences, offering the best user experience is an open challenge for service providers. In addition, the users, their preferences, and the operational environment may change during the service operation, thus jeopardizing the satisfaction of user preferences. In this article, we present an approach to support user-centric adaptation of multi-tenant services. We describe how to engineer the activities of the Monitoring, Analysis, Planning, Execution (MAPE) loop to support user-centric adaptation, and we focus on adaptation analysis. Our analysis computes a service configuration that optimizes user satisfaction, complies with infrastructural constraints, and minimizes reconfiguration obtrusiveness when user- or service-related changes take place. To support our analysis, we model multitenant services and user preferences by using feature and preference models, respectively. We illustrate our approach by utilizing different cases of virtual desktops. Our results demonstrate the effectiveness of the analysis in improving user preferences satisfaction in negligible time.Ministerio de Economía y Competitividad TIN2012-32273Junta de Andalucía P12--TIC--1867Junta de Andalucía TIC-590

    Copper electrodeposition from an acidic plating bath containing accelerating and inhibiting organic additives

    Get PDF
    Copper electrodeposition on copper from still plating solutions of different compositions was investi- gated utilising electrochemical impedance spectroscopy (EIS), cyclic voltammetry, and scanning electron microscopy (SEM). An acid copper sulphate plating base solution was employed either with or without sodium chloride in the presence of a single additive, either polyethylene glycol (PEG) or 3-mercapto-2- propanesulphonic acid (MPSA), and their mixture. Thallium underpotential deposition/anodic stripping was employed to determine the adsorption capability of additives on copper. In the absence of chloride ions, MPSA shows a moderate adsorption on copper, whereas PEG is slightly adsorbed. At low cathodic overpotentials, the simultaneous presence of MPSA and chloride ions accelerates copper electrodeposition through the formation of an MPSA-chloride ion complex in the solution, particularly for about 220 mM sodium chloride. The reverse effect occurs in PEG-sodium chloride plating solutions. In this case, from EIS data the formation of a film that interferes with copper electrodeposition can be inferred. At higher cathodic overpotentials, when copper electrodeposition is under mass transport control, the cathode coverage by a PEG-copper chloride-mediated film becomes either partially or completely detached as the concentration of chloride ions at the negatively charged copper surface diminishes. The copper cathode grain topography at the mm scale depends on the cathodic overpotential, plating solution composition and average current density. Available data about the solution constituents and their adsorption on copper make it possible to propose a likely complex mechanism to understand copper electrodeposition from these media, including the accelerating effect of MPSA and the dynamics of PEG-copper chloride complex adsorbate interfering with the surface mobility of depositing copper ad-ions/ad-atoms.Instituto de Investigaciones Fisicoquímicas Teóricas y Aplicadas (INIFTA)Facultad de Ciencias Exacta
    corecore