2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS) 2014
DOI: 10.1109/percomw.2014.6815195
|View full text |Cite
|
Sign up to set email alerts
|

Physically informed assertions for cyber physical systems development and debugging

Abstract: Abstract-Cyber Physical Systems (CPS), widely used in pervasive computing, integrate computation in the cyber world with control of physical processes. Developing CPS is challenging because interactions between physical and cyber components are complex and often unpredictable. Traditional debugging techniques can detect bugs in the cyber world, but bugs introduced from physical components and induced by limitations in the software interface to physical hardware are still difficult to detect. My research will c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
2

Relationship

4
3

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…However, there are no existing algorithms to generate monitors from metric temporal logic [77], [84]. Combined with the promise that run-time assertions demonstrated in our studies, we expect that a run-time assertion checking framework [110] that captures the essence in MTL (e.g., specifying latency) combined with a high-level modeling language similar to Java modeling language [64] would be more accessible to developers in annotating CPS programs. Such automatically generated monitors would enable CPS validation at run-time in a nonintrusive manner with respect to functional and nonfunctional behaviors of the CPS applications under study.…”
Section: Run-time Verificationmentioning
confidence: 98%
“…However, there are no existing algorithms to generate monitors from metric temporal logic [77], [84]. Combined with the promise that run-time assertions demonstrated in our studies, we expect that a run-time assertion checking framework [110] that captures the essence in MTL (e.g., specifying latency) combined with a high-level modeling language similar to Java modeling language [64] would be more accessible to developers in annotating CPS programs. Such automatically generated monitors would enable CPS validation at run-time in a nonintrusive manner with respect to functional and nonfunctional behaviors of the CPS applications under study.…”
Section: Run-time Verificationmentioning
confidence: 98%
“…2) Real-time Simulation and Formal Verification: On a separate regard, the industry is adopting real-time simulation and formal verification as part of security compliance check for intelligent vehicles [78], [202], [203]. In real-time simulation, computer models are used to accurately re-create repetitive and flexible test environment for vehicular systems [160] while formal verification provides security guarantee [204], [205].…”
Section: High Accuracy Computational Complexitymentioning
confidence: 99%
“…Confidentiality ensures that the sensitive data and information are not disclosed to unauthorized individual, devices or the system. In the cloud computing environment the computing resources (e.g., services, storage, servers, and database) reside in the cloud service provider's premises [20]. This sharing of computing resources with a number of users increase the secuirty risk and possibly violates the confidentiality of each customer.…”
Section: Data Confidentialitymentioning
confidence: 99%
“…Cloud computing is a broad topic with equally broad security issues and surrounding threats and challenges. In order to protect the cloud computing service providers and cloud consumer, effective runtime verification [23,24,20,6,25] along with anomaly and signature based intrusion detections system are strongly recommended to handle the emerging and evolving security threats in cloud computing [9,12]. Anomaly based intrusion detection system analyzes all the network traffics and detects the abnormal behaviors of network packets and applications.…”
Section: Shared Technology Issuesmentioning
confidence: 99%