Retour au site du LAAS-CNRS

Laboratoire d’analyse et d’architecture des systèmes
Choisir la langue : FR | EN

402documents trouvés

17460
18/12/2017

Modelling confidence in railway safety case

R.WANG, J.GUIOCHET, G.MOTET, W.SCHON

TSF, UTC

Revue Scientifique : Safety Science, 34p., Décembre 2017, https://doi.org/10.1016/j.ssci.2017.11.012 , N° 17460

Diffusable

Plus d'informations

Abstract

Railway standard EN50129 clarifies the safety acceptance conditions of safety-related electronic systems for signalling. It requires using a structured argumentation, named Safety Case, to present the fulfilment of these conditions. As guidance for building the Safety Case, this standard provides the structure of high-level safety objectives and the recommendations of development techniques according to different Safety Integrity Levels (SIL). Nevertheless, the rationale connecting these techniques to the high-level safety objectives is not explicit. The proposed techniques stem from experts belief in the effectiveness and efficiency of these techniques to achieve the underlying safety objectives. So, how should one formalize and assess this belief? And as a result how much confidence can we have in the safety of railway systems when these standards are used? To deal with these questions, the paper successively addresses two aspects: 1) making explicit the safety assurance rationale by modelling the Safety Case with GSN (Goal Structuring Notation) according to EN5012x standards ; 2) proposing a quantitative framework based on Dempster-Shafer theory to formalize and assessing the confidence in the Safety Case. A survey amongst safety experts is carried out to estimate the confidence parameters. With these results, an application guidance of this framework is provided based on the Wheel Slide Protection (WSP) system.

141833
17109
11/12/2017

State of the art of network protocol reverse engineering tools

J.DUCHENE, C.LE GUERNIC, E.ALATA, V.NICOMETTE, M.KAANICHE

TSF, INRIA Rennes

Revue Scientifique : Journal of Computer Virology and Hacking Techniques, 27p., Décembre 2017, doi 10.1007/s11416-016-0289-8 , N° 17109

Lien : https://hal.inria.fr/hal-01496958

Diffusable

Plus d'informations

Abstract

Communication protocols enable structured information exchanges between different entities. A description, at different levels of detail, is necessary for many applications, such as interoperability or security audits. When such a description is not available, one can resort to protocol reverse engineering to infer the format of exchanged messages or a model of the protocol. During the past 12 years, several tools have been developed in order to automate, entirely or partially, the protocol inference process. Each of those tools has been developed with a specific application goal for the inferred model, leading to specific needs, and thus different strengths and limitations. After identifying key challenges, the paper presents a survey of protocol reverse engineering tools developed in the last decade. We consider tools focusing on the inference of the format of individual messages or of the grammar of sequences of messages. Finally, we propose a classification of these tools according to different criteria, that is aimed at providing relevant insights about the techniques used by each of these tools and comparatively to other tools, for the classification of messages, the inference of their format or of the grammar of the protocol. This classification also permits to identify technical areas that are not sufficiently explored so far and that require further development in the future.

141736
17416
05/12/2017

Tuning permissiveness for active safety monitoring

L.MASSON, J.GUIOCHET, H.WAESELYNCK, K.CABRERA CASTILLOS, S.CASSEL, M.TORNGREN

TSF, Uppsala, KTH

Rapport LAAS N°17416, Décembre 2017, 8p.

Lien : https://hal.laas.fr/hal-01637277

Diffusable

Plus d'informations

Abstract

Robots and autonomous system have become a part of our everyday life, therefore guaranteeing their safety is a crucial issue. Among the possible methods for guaranteeing safety, monitoring is widely used, but few methods exist to generate safety rules to implement such monitors. Particularly, building safety monitors that do not constrain excessively the system's ability to perform its tasks is necessary as those systems operate with few human interventions. We propose in this paper a method to take into account the system's desired tasks in the specification of strategies for monitors and apply it to a case study. We show that we can synthesize a more important number of strategies and we facilitate the reasoning about the trade-off between safety and function-alities.

141635
18004
30/11/2017

A lightweight snapshot-based DDoS detector

G.ROUDIERE, P.OWEZARSKI

TSF, SARA

Manifestation avec acte : International Conference on Network and Service Management ( CNSM ) 2017 du 26 novembre au 30 novembre 2017, Tokyo (Japon), Novembre 2017, 16p. , N° 18004

Lien : https://hal.laas.fr/hal-01676810

Diffusable

Plus d'informations

Abstract

Despite the efforts made from both the research community and the industry in inventing new methods to deal with distributed denial of service attacks, they stay a major threat in the Internet network. Those attacks are numerous, and can prevent, in most serious cases, the targeted system from answering any request from its clients. Detecting such attacks means dealing with several difficulties, such as their distributed nature or the several evasions techniques available to the attackers. The detection process has also a cost, which includes both the resources needed to perform the detection and the work of the network administrator. In this paper we introduce AATAC (Autonomous Algorithm for Traffic Anomaly Detection), an unsupervised DDoS detector that focuses on reducing the computational resources needed to process the traffic. It models the traffic using a set of regularly created snapshots. Each new snapshot is compared to this model using a k-NN based measure to detect significant deviations toward the usual traffic profile. Those snapshots are also used to provide the network administrator with an explicit and dynamic view of the traffic when an anomaly occurs. Our evaluation shows that AATAC is able to efficiently process real traces with low computational resources requirements, while achieving an efficient detection producing a low number of false-positives.

142078
17404
07/11/2017

Outil logiciel HAZOP-UML - Document des cas d'utilisation

J.M.Larré, K.CABRERA CASTILLOS, J.GUIOCHET

IDEA, TSF

Rapport LAAS N°17404, Novembre 2017, 18p.

Lien : https://hal.laas.fr/hal-01613787

Diffusable

141414
17375
27/10/2017

A co-simulation framework interoperability for Neo-campus project

Y.MOTIE, A.NKETSA, P.TRUILLET

ISI, IRIT-UPS

Manifestation avec acte : European Simulation and Modelling Conference ( ESM ) 2017 du 25 octobre au 27 octobre 2017, Lisbonne (Portugal), Octobre 2017, 7p. , N° 17375

Lien : https://hal.archives-ouvertes.fr/hal-01614348

Diffusable

Plus d'informations

Abstract

It is common accepted that complex systems or cyber-physical systems need co-simulation for their study. Further more, they are made of heterogeneous subsystems that have to exchange data. Usually each subsystem is modeled using specific tools, environments and sim-ulators. The simulators have to interoperate to realize all the simulation of the system. It is known that in-teroperativity is a broad and complex subject. Interop-erability is a strong commitment as the communication solution in heterogeneous systems. This paper describes a co-simulation framework interoperability based FMI (Functional Mock up Interface) standard for the structural part and data mediation for semantic part. We present a case study for Neo-Campus project that shows how the framework helps to build the semantic interop-erability of a cyberphysical system.

141259
17426
27/10/2017

Applying the model-driven architecture approach to dynamic structure applications

M.ZHU, C.FOUCHER, V.ALBERT, A.NKETSA

ISI

Manifestation avec acte : European Simulation and Modelling Conference ( ESM ) 2017 du 25 octobre au 27 octobre 2017, Lisbonne (Portugal), Octobre 2017, 8p. , N° 17426

Lien : https://hal.laas.fr/hal-01635791

Diffusable

Plus d'informations

Abstract

Model-Driven Architecture (MDA) is a system engineering approach which consists in separating the model description from the execution platform. It allows building a model without detailed knowledge of the target platform, as well as retargeting the execution platform without changing the model itself. We present a meta-model called Partial Reconfigurable DEVS (PRDEVS) that is able to represent dynamic structure changes of a model. We base our approach on the DEVS formalism, which is modular and hierarchical. Our description paradigm differs from the previous DEVS-based dynamic meta-models in that it explicitly deals with adding and removing components. This approach is closer to the general reconfigurable embedded system design methodology. Both a software and a FPGA-based hardware platform are considered as dynamic execution platforms.

141677
17317
24/10/2017

Reliability enhancement of redundancy management in AFDX networks

M.LI, G.ZHU, Y.SAVARIA, M.LAUER

Ecole Montréal, TSF

Revue Scientifique : IEEE Transactions on Industrial Informatics, Vol.13, N°5, pp.2118-2129, Octobre 2017, DOI: 10.1109/TII.2017.2732345 , N° 17317

Lien : https://hal.laas.fr/hal-01585141

Diffusable

Plus d'informations

Abstract

AFDX is a safety critical network in which a redundancy management mechanism is employed to enhance the reliability of the network. However, as stated in the ARINC664-P7 standard, there still exists a potential problem, which may fail redundant transmissions due to sequence inversion in the redundant channels. In this paper, we explore this phenomenon and provide its mathematical analysis. It is revealed that the variable jitter and the transmission latency difference between two successive frames are the two main sources of sequence inversion. Thus, two methods are proposed and investigated to mitigate the effects of jitter pessimism, which can eliminate the potential risk. A case study is carried out and the obtained results confirm the validity and applicability of the developed approaches.

141338
17295
23/10/2017

Experience Report: log mining using natural language processing and application to anomaly detection

C.BERTERO, M.ROY, C.SAUVANAUD, G.TREDAN

TSF

Manifestation avec acte : International Symposium on Software Reliability Engineering ( ISSRE ) 2017 du 23 octobre au 26 octobre 2017, Toulouse (France), Octobre 2017, 10p. , N° 17295

Lien : https://hal.laas.fr/hal-01576291

Diffusable

Plus d'informations

Abstract

Event logging is a key source of information on a system state. Reading logs provides insights on its activity, assess its correct state and allows to diagnose problems. However, reading does not scale: with the number of machines increasingly rising, and the complexification of systems, the task of auditing systems' health based on logfiles is becoming overwhelming for system administrators. This observation led to many proposals automating the processing of logs. However, most of these proposal still require some human intervention, for instance by tagging logs, parsing the source files generating the logs, etc. In this work, we target minimal human intervention for logfile processing and propose a new approach that considers logs as regular text (as opposed to related works that seek to exploit at best the little structure imposed by log formatting). This approach allows to leverage modern techniques from natural language processing. More specifically, we first apply a word embedding technique based on Google's word2vec algorithm: logfiles' words are mapped to a high dimensional metric space, that we then exploit as a feature space using standard classifiers. The resulting pipeline is very generic, computationally efficient, and requires very little intervention. We validate our approach by seeking stress patterns on an experimental platform. Results show a strong predictive performance (≈ 90% accuracy) using three out-of-the-box classifiers.

140787
17329
26/09/2017

Critical success factors for ERP requirement engineering perspective

N.OSMAN, A.E.K.SAHRAOUI

SUST, ISI

Rapport LAAS N°17329, Septembre 2017, 17p.

Diffusable

141014
Les informations recueillies font l’objet d’un traitement informatique destiné à des statistiques d'utilisation du formulaire de recherche dans la base de données des publications scientifiques. Les destinataires des données sont : le service de documentation du LAAS.Conformément à la loi « informatique et libertés » du 6 janvier 1978 modifiée en 2004, vous bénéficiez d’un droit d’accès et de rectification aux informations qui vous concernent, que vous pouvez exercer en vous adressant à
Pour recevoir une copie des documents, contacter doc@laas.fr en mentionnant le n° de rapport LAAS et votre adresse postale. Signalez tout problème de dysfonctionnement à sysadmin@laas.fr. http://www.laas.fr/pulman/pulman-isens/web/app.php/