Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2024
Evaluation of Automotive OTA Updates Using Assurance Cases
MODELS Companion '24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and SystemsPages 720–724https://doi.org/10.1145/3652620.3687815Software-intensive vehicles require regular over-the-air (OTA) updates. To ensure that OTA updates do not compromise system safety, such updates should be assured. Automotive safety engineers need to efficiently estimate the effort it would take to ...
- research-articleMay 2024
Software in the Manufacturing Industry: Emerging Security Challenge Areas for IIoT Platforms
ICSE-SEIP '24: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in PracticePages 118–121https://doi.org/10.1145/3639477.3639724Industrial Internet of Things (IIoT) platforms connect services and computation resources to industrial devices. They increase flexibility, scalability, and provide a wider application portfolio for automated production. However, in a growing ecosystem ...
- research-articleNovember 2024
Position Paper: Computer-Related Health Risks
HealthSec '24: Proceedings of the 2024 Workshop on Cybersecurity in HealthcarePages 1–9https://doi.org/10.1145/3689942.3694749This is a summary of recent risks related to healthcare from the ACM Forum on Risks to the Public on Computers and Related Subjects, which I created in August 1985 and have moderated since then. The complete set of RISKS archives is at http://...
Trustworthy Runtime Verification via Bisimulation (Experience Report)
Proceedings of the ACM on Programming Languages (PACMPL), Volume 7, Issue ICFPArticle No.: 199, Pages 305–321https://doi.org/10.1145/3607841When runtime verification is used to monitor safety-critical systems, it is essential that monitoring code behaves correctly. The Copilot runtime verification framework pursues this goal by automatically generating C monitor programs from a high-level ...
- research-articleJune 2023
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing
ACM Journal on Emerging Technologies in Computing Systems (JETC), Volume 19, Issue 3Article No.: 25, Pages 1–23https://doi.org/10.1145/3592795System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks often acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans that may ...
-
- research-articleApril 2023
Remote Attestation Assurance Arguments for Trusted Execution Environments
SaT-CPS '23: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Cyber-Physical SystemsPages 33–42https://doi.org/10.1145/3579988.3585056Remote attestation (RA) is emerging as an important security mechanism for cyber-physical systems with strict security requirements. Trusted computing at large and Trusted Execution Environments (TEEs) in particular have been identified as key ...
- research-articleNovember 2022
Towards the adoption of model based system safety engineering in the automotive industry
MODELS '22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion ProceedingsPages 579–587https://doi.org/10.1145/3550356.3563130Model-Driven Engineering techniques are becoming increasingly common for use in automotive software engineering, particularly to enable architectural modeling as well as safety analysis, especially fault tree analysis (FTA). One common MDE tool is ...
- research-articleJanuary 2022
Perspectives on the system-level design of a safe autonomous driving stack
- Majd Hawasly,
- Jonathan Sadeghi,
- Morris Antonello,
- Stefano V. Albrecht,
- John Redford,
- Subramanian Ramamoorthy,
- Stefano V. Albrecht,
- Michael Woolridge
Achieving safe and robust autonomy is the key bottleneck on the path towards broader adoption of autonomous vehicles technology. This motivates going beyond extrinsic metrics such as miles between disengagement, and calls for approaches that embody ...
Estimating residual risk in greybox fuzzing
ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 230–241https://doi.org/10.1145/3468264.3468570For any errorless fuzzing campaign, no matter how long, there is always some residual risk that a software error would be discovered if only the campaign was run for just a bit longer. Recently, greybox fuzzing tools have found widespread adoption. Yet, ...
- research-articleJune 2021
Social acceptability of personal data utilization business according to data controllers and purposes
WebSci '21: Proceedings of the 13th ACM Web Science Conference 2021Pages 262–271https://doi.org/10.1145/3447535.3462493The rapid development of data analysis technology has enabled various uses of data, including some cases in which data usage cannot be accepted socially. Digital platform operators find it difficult to estimate the reputational risk of releasing new ...
- research-articleMay 2021
Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges
ACM Computing Surveys (CSUR), Volume 54, Issue 5Article No.: 111, Pages 1–39https://doi.org/10.1145/3453444Machine learning has evolved into an enabling technology for a wide range of highly successful applications. The potential for this success to continue and accelerate has placed machine learning (ML) at the top of research, economic, and political ...
- invited-talkFebruary 2020
Establishing Trust in Microelectronics
FPGA '20: Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate ArraysPage 21https://doi.org/10.1145/3373087.3375883In recent years, substantial attention has been drawn to vulnerabilities in the architectural design of microelectronics, as well as the security of their global supply chains. In reality, establishing trust in microelectronics requires broader ...
- surveyJanuary 2018
Quality Control in Crowdsourcing: A Survey of Quality Attributes, Assessment Techniques, and Assurance Actions
ACM Computing Surveys (CSUR), Volume 51, Issue 1Article No.: 7, Pages 1–40https://doi.org/10.1145/3148148Crowdsourcing enables one to leverage on the intelligence and wisdom of potentially large groups of individuals toward solving problems. Common problems approached with crowdsourcing are labeling images, translating or transcribing text, providing ...
- research-articleJune 2017
Measuring Software Security from the Design of Software
CompSysTech '17: Proceedings of the 18th International Conference on Computer Systems and TechnologiesPages 179–186https://doi.org/10.1145/3134302.3134334With the increasing use of mobile phones in contemporary society, more and more networked computers are connected to each other. This has brought along security issues. To solve these issues, both research and development communities are trying to build ...
- articleJanuary 2016
The ontological status of trust in information security
Scientific and Technical Information Processing (SPSTIP), Volume 43, Issue 1Pages 58–65https://doi.org/10.3103/S0147688216010123This article provides the rationale for the ontological status of trust in information security on the basis of the ontological, anthropological, methodological, axiological, and worldview aspects of the information-security concept and an ...
- research-articleDecember 2015
Enforcing security and assurance properties in cloud environment
- Aline Bousquet,
- Jérémy Briffaut,
- Eddy Caron,
- Eva María Dominguez,
- Javier Franco,
- Arnaud Lefray,
- Oscar López,
- Saioa Ros,
- Jonathan Rouzaud-Cornabas,
- Christian Toinard,
- Mikel Uriarte
UCC '15: Proceedings of the 8th International Conference on Utility and Cloud ComputingPages 271–280Before deploying their infrastructure (resources, data, communications, ...) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security ...
- ArticleAugust 2015
Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement
Achieving security and privacy in the cloud is not a trivial exercise. Indeed, the difficulties associated with achieving this goal are both many and highly complex, and present one of the major barriers to the uptake of cloud computing. Yet, we know ...
- ArticleAugust 2015
Enhancing Cloud Security and Privacy: Broadening the Service Level Agreement
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01Pages 1088–1093https://doi.org/10.1109/Trustcom.2015.487Achieving security and privacy in the cloud is not a trivial exercise. Indeed, the difficulties associated with achieving this goal are both many and highly complex, and present one of the major barriers to the uptake of cloud computing. Yet, we know ...
- research-articleJune 2015
An Autonomic Cloud Management System for Enforcing Security and Assurance Properties
CLHS '15: Proceedings of the 2015 Workshop on Changing Landscapes in HPC SecurityPages 1–8https://doi.org/10.1145/2752499.2752500Enforcing security properties in a Cloud is a difficult task, which requires expertise. However, it is not the only security-related challenge met by a company migrating to a Cloud environment. Indeed, the tenant must also have assurance that the ...