Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
A domain-specific language to design false data injection tests for air traffic control systems
Abstract

The ADS-B—automatic dependent surveillance-broadcast—technology requires aircraft to broadcast their position and velocity periodically. As compared to legacy radar technologies, coupled with alarming cyber security issues (the ADS-B protocol ...

research-article
Bringing runtime verification home: a case study on the hierarchical monitoring of smart homes using decentralized specifications
Abstract

We use runtime verification (RV) to check various specifications in a smart apartment. The specifications can be broken down into three types: behavioral correctness of the apartment sensors, detection of specific user activities (known as ...

research-article
Multi-level privacy analysis of business processes: the Pleak toolset
Abstract

Privacy regulations, such as GDPR, impose strict requirements to organizations that store and process private data. Privacy-enhancing technologies (PETs), such as secure multi-party computation and differential privacy, provide mechanisms to ...

research-article
SaBRe: load-time selective binary rewriting
Abstract

Binary rewriting consists in disassembling a program to modify its instructions. However, existing solutions suffer from shortcomings in terms of soundness and performance. We present SaBRe, a load-time system for selective binary rewriting. SaBRe ...

research-article
Interface control document modeling with Citrus (avionics systems interfaces)
Abstract

Avionics systems integration based on interfaces control documents (ICDs) may be well handled when leveraging the strength of the model based-engineering. Indeed, avionics systems and their internal hardware and software components interfaces, ...

research-article
Supporting safe metamodel evolution with edelta
Abstract

Metamodels play a crucial role in any model-based application. They underpin the definition of models and tools, and the development of model management operations, including model transformations and analysis. Like any software artifacts, ...

research-article
Software test results exploration and visualization with continuous integration and nightly testing
Abstract

Software testing is key for quality assurance of embedded systems. However, with increased development pace, the amount of test results data risks growing to a level where exploration and visualization of the results are unmanageable. This paper ...

research-article
Parameterized verification of systems with component identities, using view abstraction
Abstract

The parameterized verification problem seeks to verify all members of some collection of systems. We consider the parameterized verification problem applied to systems that are composed of an arbitrary number of component processes, together with ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.