Certificateless integrity auditing scheme for sensitive information protection in cloud storage
Data integrity auditing provides a method for checking the integrity of outsourced data in cloud storage. However, outsourced data often contain sensitive information (such as names), posing risks of exposure during data sharing. To address this ...
Secure pairing-free certificateless aggregate signcryption scheme for IoT
The widespread application of wireless sensor technology in the Internet of Things (IoT) industry significantly enhances productivity. However, the large scale deployment of IoT and the inherent vulnerabilities of wireless communication methods ...
Datacenter optimization methods for Softwarized Network Services
This paper tackles the problem of optimum Virtual Machine placement, focusing on an industrial use-case dealing with capacity planning for Virtualized Network Functions. The work is framed within an industrial collaboration with the Vodafone ...
Energy-aware reliability guarantee scheduling with semi-clairvoyant in mixed-criticality systems
The management of energy in mixed-criticality systems (MCS) has been widely accomplished through Dynamic Voltage and Frequency Scaling (DVFS) techniques. Nevertheless, recent studies indicated that the DVFS has a negative impact on the ...
Computation of tight bounds for the worst-case end-to-end delay on Avionics Full-Duplex Switched Ethernet
Avionics Full-Duplex Switched Ethernet (AFDX) is a fault-tolerant real-time communication bus for safety–critical applications in aircraft. AFDX configures communication channels, denoted as virtual links (VLs), ensuring bounded message delays ...
DUDS: Diversity-aware unbiased device selection for federated learning on Non-IID and unbalanced data
Federated Learning (FL) is a distributed machine learning approach that preserves privacy by allowing numerous devices to collaboratively train a global model without sharing raw data. However, the frequent exchange of model updates between ...
VCSA: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption
As a novel distributed learning framework for protecting personal data privacy, federated learning, (FL) has attained widespread attention through sharing gradients among users without collecting their data. However, an untrusted cloud server may ...
Cloud security in the age of adaptive adversaries: A game theoretic approach to hypervisor-based intrusion detection
Recent advancements in cloud computing have underscored the critical need for robust security mechanisms to counter evolving cyber-threats. Traditional security solutions such as Intrusion Detection Systems (IDSs) often fall short due to their ...
SAR: Sharpness-Aware minimization for enhancing DNNs’ Robustness against bit-flip errors
As Deep Neural Networks (DNNs) are increasingly deployed in safety-critical scenarios, there is a growing need to address bit-flip errors occurring in hardware, such as memory. These errors can lead to changes in DNN weights, potentially ...
Highlights
- The first work to uncover the DNNs’ intrinsic robustness against bit-flip errors.
- The first work to adopt Sharpness-Aware Minimization to resist bit-flip errors.
- A valuable and lightweight framework for security-critical scenarios.
BIDS: An efficient Intrusion Detection System for in-vehicle networks using a two-stage Binarised Neural Network on low-cost FPGA
Automotive networks are crucial for ensuring safety as the number of Electronic Control Units (ECUs) grows to support vehicle intelligence. The Controller Area Network (CAN) is commonly used for efficient in-vehicle communication among ECUs. ...
On the degree of parallelism for parallel real-time tasks
The degree of parallelism, which measures how a task can execute concurrently, is an important characterization in scheduling. This paper studies the degree of parallelism in the domain of real-time scheduling of parallel tasks, including the DAG ...
Highlights
- The first work to study the degree of parallelism (DOP) for a conditional DAG task.
- The definition and the algorithm are provided for the DOP of a conditional DAG task.
- Based on DOP, a real-time scheduling approach for conditional ...
Verifiable privacy-preserving semantic retrieval scheme in the edge computing
Edge computing, with its characteristics of low latency and low transmission costs, addresses the storage and computation challenges arising from the surge in network edge traffic. It enables users to leverage nearby edge servers for data ...
A survey on unmanned aerial systems cybersecurity
Unmanned aerial systems (UASs) have recently seen widespread use in both military and civilian applications due to their flexibility and versatility. As embedded systems integrating communications, computing and control, UASs are vulnerable due ...
Toward Linux-based safety-critical systems—Execution time variability analysis of Linux system calls
Modern transportation and industrial domain safety-critical applications, such as autonomous vehicles and collaborative robots, exhibit a combination of escalating software complexity and the need to integrate diverse software stacks and machine ...
HyFAR: A hypervisor-based fault tolerance approach for heterogeneous automotive real-time systems
Fault tolerance is a key aspect for fully autonomous vehicles, as there is no human driver available to take control of the vehicle as a backup. Such autonomous vehicles incorporate signal-oriented and service-oriented hardware and software ...
A convolutional autoencoder architecture for robust network intrusion detection in embedded systems
Security threats are becoming an increasingly relevant concern in cyber–physical systems. Cyber attacks on these systems are not only common today but also increasingly sophisticated and constantly evolving. One way to secure the system against ...
TaPaFuzz: Hardware-accelerated RISC-V bare-metal firmware fuzzing using rapid job launches
Fuzz testing serves as a key technique in software security aimed at identifying unexpected program behaviors by repeatedly executing the target program with auto-generated random inputs. Testing is integral to IoT device security but is hampered ...
The rCOS framework for multi-dimensional separation of concerns in model-driven engineering
The software industry increasingly turns to Model-Driven Engineering (MDE) to mitigate complexity by automating model creation and transformation. Many organisations are pursuing Integrated Development Platforms (IDPs) to enhance automation in ...