Retour au site du LAAS-CNRS

Laboratoire d’analyse et d’architecture des systèmes

Publications de l'équipe TSF

Choisir la langue : FR | EN

1458documents trouvés

18057
22/06/2018

Tomographic Node Placement Strategies and the Impact of the Routing Model

Y.A.PIGNOLET, S.SCHMID, G.TREDAN

ABB CRC, Switzerland, AAU, TSF

Manifestation avec acte : ACM Sigmetrics 2018 du 18 juin au 22 juin 2018, Irvine (USA), Juin 2018, 28p. , N° 18057

Lien : https://hal.archives-ouvertes.fr/hal-01644582

Diffusable

Plus d'informations

Abstract

Fault-tolerant computer networks rely on mechanisms supporting the fast detection of link failures. Tomo-graphic techniques can be used to implement such mechanisms at low cost: it is often sufficient to deploy a small number of tomography nodes exchanging probe messages along paths between them and detect link failures based on these messages. Our paper studies a practically relevant aspect of network tomography: the impact of the routing model. While the relevance of the routing model on path diversity and hence tomog-raphy cost is obvious and well-known on an anecdotal level, we lack an analytical framework to quantify the influence of different routing models (such as destination-based routing) exists. This paper fills this gap and introduces a formal model for asymmetric network tomography and a taxonomy of path routing models. This facilitates algorithmic reasoning about tomographic placement problems and quantifying the difference between routing models. In particular, we provide optimal and near-optimal algorithms to deploy a minimal number of asymmetric and symmetric tomography nodes for basic network topologies (modelled as graphs) under different routing model classes. Interestingly, we find that in many cases routing according to a more restrictive routing model gives better results: compared to a more general routing model, computing a good placement is algorithmically more tractable and does not entail high monitoring costs, a desirable trade-off in practice.

142813
18094
20/06/2018

SRide: A Privacy-Preserving Ridesharing System

U.M.AIVODJI, K.HUGUENIN, M.J.HUGUET, M.O.KILLIJIAN

TSF, HEC Lausanne, ROC

Manifestation avec acte : ACM Conference on Security and Privacy in Wireless and Mobile Networks ( WiSec ) 2018 du 18 juin au 20 juin 2018, Stockholm (Suède), Juin 2018 , N° 18094

Lien : https://hal.archives-ouvertes.fr/hal-01762436

Diffusable

143253
18136
11/06/2018

Adaptation dans les systèmes dynamiques : une vision informatique de la résilience

M.ROY

TSF

Habilitation à diriger des recherches : Juin 2018, 83p., Rapporteurs: P.FELBER, R.NAMYST, P.SENS, Examinateurs: L.DUCHIEN, A.FERNANDEZ ANTA, M.HERLIHY, P.QEUINNEC, Correspondant: J.C.FABRE , N° 18136

Lien : https://tel.archives-ouvertes.fr/tel-01801677

Diffusable

Plus d'informations

Abstract

Mes travaux comme chargé de recherche CNRS au LAAS-CNRS dans l’équipe Tolérance aux fautes et Sûreté de Fonctionnement informatique se sont articulés autour de l’adaptation dans les systèmes informatiques dynamiques, proposant une vision informatique du concept de résilience. Les contributions majeures développées lors de mes recherches s’organisent selon quatre axes : 1) l’architecture des systèmes leur permettant d’évoluer de manière sûre, à la fois pour la conception ex nihilo d’un système, que pour l’addition a posteriori de capacités adaptatives. 2) le déploiement de capacités d’observation et de vérification à l’exécution de propriétés pour permettre au système d’évaluer son état. 3) le développement d’algorithmes pour les systèmes répartis dynamiques prenant en compte la variation de la charge (concurrence) et la distribution dans l’espace physique. 4) la mesure et l’étude des systèmes informatiques (trans)portés par les humains. Les perspectives de ces travaux sont multiples et peuvent par exemple être organisées selon deux thèmes : 1) Comprendre les évolutions des systèmes dynamiques, dont le taux de pénétration dans la société, la taille et le niveau de criticité ne cesse d’augmenter. Il est nécessaire de capturer ces dynamiques nouvelles, en particulier issues de la dynamique humaine, pour fournir des jeux de données utilisables librement par les chercheurs, et proposer des modèles descriptifs et prédictifs de ces dynamiques. 2) Développer des mécanismes permettant de fournir des systèmes adaptables sûrs. L’avènement des multi-cœurs dans des domaines critiques (avionique, automobile) pose des défis immenses car ces puces augmentent la variabilité à l’exécution et donc la dynamique du système.

Mots-Clés / Keywords
Distributed computing; Dependability; Resilience; Adaptation; Mobile computing; Human Interactions;

143717
18111
03/05/2018

Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing Systems

A.MOSTEFAOUI, M.RAYNAL, M.ROY

LS2N, IRISA, TSF

Revue Scientifique : Computing, 16p., Mai 2018 , N° 18111

Lien : https://hal.laas.fr/hal-01784210

Diffusable

Plus d'informations

Abstract

The atomic register is one of the most basic and useful object of computing science, and its simple read-write semantics is appealing when programming distributed systems. Hence, its implementation on top of crash-prone asynchronous message-passing systems has received a lot of attention. It was shown that having a strict minority of processes that may crash is a necessary and sufficient requirement to build an atomic register on top of a crash-prone asynchronous message-passing system. This paper visits the notion of a fast implementation of an atomic register, and presents a new time-efficient asynchronous algorithm that reduces latency in many cases: a write operation always costs a round-trip delay, while a read operation costs a round-trip delay in favorable circumstances (intuitively, when it is not concurrent with a write). When designing this algorithm, the design spirit was to be as close as possible to the original algorithm proposed by Attiya, Bar-Noy, and Dolev.

143413
17013
01/05/2018

SMOF - A Safety MOnitoring Framework for Autonomous Systems

M.MACHIN, J.GUIOCHET, H.WAESELYNCK, J.P.BLANQUART, M.ROY, L.MASSON

TSF, ASTRIUM

Revue Scientifique : IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol.48, N°5, pp.702-715, Mai 2018, doi 10.1109/TSMC.2016.2633291 , N° 17013

Lien : https://hal.archives-ouvertes.fr/hal-01394139

Diffusable

Plus d'informations

Abstract

Safety critical systems with decisional abilities, such as autonomous robots, are about to enter our everyday life. Nevertheless, confidence in their behavior is still limited, particularly regarding safety. Considering the variety of hazards that can affect these systems, many techniques might be used to increase their safety. Among them, active safety monitors are a means to maintain the system safety in spite of faults or adverse situations. The specification of the safety rules implemented in such devices is of crucial importance, but has been hardly explored so far. In this paper, we propose a complete framework for the generation of these safety rules based on the concept of safety margin. The approach starts from a hazard analysis, and uses formal verification techniques to automatically synthesize the safety rules. It has been successfully applied to an industrial use case, a mobile manipulator robot for co-working.

142412
18058
01/05/2018

Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned

C.SAUVANAUD, M.KAANICHE, K.KANOUN, K.LAZRI, G.DA SILVA SILVESTRE

TSF, Orange Labs, , ENAC

Revue Scientifique : Journal of Systems and Software, Vol.139, pp.84-106, Mai 2018 , N° 18058

Lien : https://hal.laas.fr/hal-01720819

Diffusable

Plus d'informations

Abstract

The dependability of cloud computing services is a major concern of cloud providers. In particular, anomaly detection techniques are crucial to detect anomalous service behaviors that may lead to the violation of service level agreements (SLAs) drawn with users. This paper describes an anomaly detec- tion system (ADS) designed to detect errors related to the erroneous behavior of the service, and SLA violations in cloud services. One major objective is to help providers to diagnose the anomalous virtual machines (VMs) on which a service is deployed as well as the type of error associated to the anomaly. Our ADS includes a system monitoring entity that collects software counters characterizing the cloud service, as well as a detection entity based on machine learning models. Additionally, a fault injection entity is integrated into the ADS for the training the machine learning models. This entity is also used to validate the ADS and to assess its anomaly detection and diagnosis performance. We validated our ADS with two case studies deployments: a NoSQL database, and a virtual IP Multimedia Subsystem developed implementing a virtual network function. Experimental results show that our ADS can achieve a high detection and diagnosis performance

142817
18109
30/04/2018

Architecture E/E et Logicielle pour les Systèmes Temps-Réels à Criticité Multiple : Etude Bibliographique

D.LOCHE

TSF

Rapport LAAS N°18109, Avril 2018, 29p.

Lien : https://hal.laas.fr/hal-01765190

Diffusable

Plus d'informations

Abstract

Cette étude bibliographique vise à présenter une première vue d'en-semble sur les architectures Matérielles et Logicielles ainsi que les diffé-rentes problématiques inhérentes aux architectures modernes, notam-ment dans le domaine automobile. Cela s'inscrit dans le contexte du démarrage d'une thèse CIFRE entre le Groupe Renault et le LAAS-CNRS, intitulée "Conception E/E et Logicielle pour la voiture connec-tée et autonome". L'étude bibliographique est organisée comme suit : contextualisation et motivation qui amène à notre problématique, Ar-chitectures Actuelles (matérielle, logicielle ainsi que les processus de développement associés), analyses temps-réel mono et multi-coeur, et perspectives d'adaptation dynamique qui ouvrent sur les possibles pistes à suivre pour la thèse.

143378
18092
23/04/2018

Smart-TV security: risk analysis and experiments on Smart-TV communication channels

Y.BACHY, V.NICOMETTE, M.KAANICHE, E.ALATA

TSF

Rapport LAAS N°18092, DOI 10.1007/s11416-018-0320-3, Avril 2018, 16p.

Lien : https://hal.archives-ouvertes.fr/hal-01761974

Diffusable

Plus d'informations

Abstract

This paper focuses on the security threats related to smart-TV communication channels. A risk analysis is carried out to have a global view of potential risks that need to be addressed in the context of Smart-TV communication links. The feasibility of several identified risks is investigated experimentally. The experiments show some relevant security-related vulnerabili-ties on Smart-TV communications channels. Countermeasures to address these vulnerabilities are also investigated .

143238
17416
17/04/2018

Tuning permissiveness for active safety monitoring

L.MASSON, J.GUIOCHET, H.WAESELYNCK, K.CABRERA CASTILLOS, S.CASSEL, M.TORNGREN

TSF, Uppsala, KTH

Manifestation avec acte : Nasa Formal Methods ( NFM ) 2018 du 17 avril au 19 avril 2018, Newport News (USA), Avril 2018, 8p. , N° 17416

Lien : https://hal.laas.fr/hal-01637277

Diffusable

Plus d'informations

Abstract

Robots and autonomous system have become a part of our everyday life, therefore guaranteeing their safety is a crucial issue. Among the possible methods for guaranteeing safety, monitoring is widely used, but few methods exist to generate safety rules to implement such monitors. Particularly, building safety monitors that do not constrain excessively the system's ability to perform its tasks is necessary as those systems operate with few human interventions. We propose in this paper a method to take into account the system's desired tasks in the specification of strategies for monitors and apply it to a case study. We show that we can synthesize a more important number of strategies and we facilitate the reasoning about the trade-off between safety and function-alities.

142594
18030
02/03/2018

Malware Detection in PDF Files Using Machine Learning

B.CUAN, A.DAMIEN, C.DELAPLACE, M.VALOIS

INSA Lyon, TSF, CRIStAL, GREYC

Rapport LAAS N°18030, Mars 2018, 16p.

Lien : https://hal.archives-ouvertes.fr/hal-01704766

Diffusable

Plus d'informations

Abstract

In this report we present how we used machine learning techniques to detect malicious behaviours in PDF files. At this aim, we first set up a SVM (Support Machine Vector) classifier that was able to detect 99.7% of malware. However, this classifier was easy to lure with malicious PDF, we forged to make them look like clean ones. We first proposed a very naive attack, that was easily stopped by the establishment of a threshold. We also implemented a gradientdescent attack to evade this SVM. This attack was almost 100% successful. In order to fix this problem, we provided counter-measures to the latter attack. A more elaborated features selection, and the use of a threshold, allowed us to stop up to 99.99% of these attacks. Finally, using adversarial learning techniques, we were able to prevent gradient descent attacks by iteratively feeding the SVM with malicious forged PDF. We found that after 3 iterations, every gradient-descent forged PDF were detected, completely preventing the attack.

142586
Les informations recueillies font l’objet d’un traitement informatique destiné à des statistiques d'utilisation du formulaire de recherche dans la base de données des publications scientifiques. Les destinataires des données sont : le service de documentation du LAAS.Conformément à la loi « informatique et libertés » du 6 janvier 1978 modifiée en 2004, vous bénéficiez d’un droit d’accès et de rectification aux informations qui vous concernent, que vous pouvez exercer en vous adressant à
Pour recevoir une copie des documents, contacter doc@laas.fr en mentionnant le n° de rapport LAAS et votre adresse postale. Signalez tout problème de dysfonctionnement à sysadmin@laas.fr. http://www.laas.fr/pulman/pulman-isens/web/app.php/