Publikationen VS: Bibliographie 2020 BibTeX
@inproceedings {INPROC-2020-36,
author = {Milan Tepic\&\#769; and Mohamed Abdelaal and Marc Weber and Kurt Rothermel},
title = {{AutoSec: Multidimensional Timing-Based Anomaly Detection for Automotive Cybersecurity}},
booktitle = {Proceedings of the 26th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’20), August 2020},
publisher = {IEEE},
institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
pages = {1--10},
type = {Konferenz-Beitrag},
month = {August},
year = {2020},
language = {Englisch},
cr-category = {C.2.4 Distributed Systems},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2020-36/INPROC-2020-36.pdf},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme},
abstract = {Nowadays, autonomous driving and driver assistance applications are being
developed at an accelerated pace. This rapid growth is primarily driven by the
potential of such smart applications to significantly improve safety on public
roads and offer new possibilities for modern transportation concepts. Such
indispensable applications typically require wireless connectivity between the
vehicles and their surroundings, i.e. roadside infrastructure and cloud
services. Nevertheless, such connectivity to external networks exposes the
internal systems of individual vehicles to threats from remotely-launched
attacks. In this realm, it is highly crucial to identify any misbehavior of the
software components which might occur owing to either these threats or even
software/hardware malfunctioning.
In this paper, we introduce $\backslash$PaperAcronym, a host-based anomaly detection
algorithm which relies on observing four timing parameters of the executed
software components to accurately detect malicious behavior on the operating
system level. To this end, $\backslash$PaperAcronym formulates the task of detecting
anomalistic executions as a clustering problem. Specifically, $\backslash$PaperAcronym
devises a hybrid clustering algorithm for grouping a set of collected timing
traces resulted from executing the legitimate code. During the runtime,
$\backslash$PaperAcronym simply classifies a certain execution as an anomaly, if its
timing parameters are distant enough from the boundaries of the predefined
clusters. To show the effectiveness of $\backslash$PaperAcronym, we collected timing
traces from a testbed composed of a set of real and virtual control units
communicating over a CAN bus. We show that using our proposed $\backslash$PaperAcronym,
compared to baseline methods, we can identify up to 21$\backslash$\% less false positives
and 18$\backslash$\% less false negatives.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2020-36&engl=0}
}
@inproceedings {INPROC-2020-29,
author = {Ahmad Slo and Sukanya Bhowmik and Kurt Rothermel},
title = {{hSPICE: State-Aware Event Shedding in Complex Event Processing}},
booktitle = {Proceedings of the 14th ACM International Conference on Distributed and Event-based Systems (DEBS '20), July 13--17, 2020, Virtual Event, QC, Canada.},
publisher = {ACM},
institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
pages = {1--12},
type = {Konferenz-Beitrag},
month = {Juli},
year = {2020},
language = {Englisch},
cr-category = {C.2.4 Distributed Systems},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2020-29/INPROC-2020-29.pdf},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme},
abstract = {In complex event processing (CEP), load shedding is performed to maintain a
given latency bound during overload situations when there is a limitation on
resources. However, shedding load implies degradation in the quality of results
(QoR). Therefore, it is crucial to perform load shedding in a way that has the
lowest impact on QoR. Researchers, in the CEP domain, propose to drop either
events or partial matches (PMs) in overload cases. They assign utilities to
events or PMs by considering either the importance of events or the importance
of PMs but not both together. In this paper, we propose a load shedding
approach for CEP systems that combines these approaches by assigning a utility
to an event by considering both the event importance and the importance of PMs.
We adopt a probabilistic model that uses the type and position of an event in a
window and the state of a PM to assign a utility to an event corresponding to
each PM. We, also, propose an approach to predict a utility threshold that is
used to drop the required amount of events to maintain a given latency bound.
By extensive evaluations on two real-world datasets and several representative
queries, we show that, in the majority of cases, our load shedding approach
outperforms state-of-the-art load shedding approaches, w.r.t. QoR.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2020-29&engl=0}
}
@inproceedings {INPROC-2020-28,
author = {Jonathan Falk and Frank D{\"u}rr and Kurt Rothermel},
title = {{Time-Triggered Traffic Planning for Data Networks with Conflict Graphs}},
booktitle = {26th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2020)},
address = {Sydney, Australia},
publisher = {IEEE},
institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
type = {Konferenz-Beitrag},
month = {April},
year = {2020},
keywords = {Real-Time; Traffic-Planning; Time-Triggered},
language = {Englisch},
cr-category = {C.2.4 Distributed Systems},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2020-28/INPROC-2020-28.pdf},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme},
abstract = {Traffic planning is the key enabler of time-triggered real-time communication
in distributed systems, and it is known to be notoriously hard. Current
approaches predominantly tackle the problem in the domain of the traffic
planning problem, e.g., by formulating constraints on the transmission
schedules for individual data streams, or the links used by the data streams.
This results in a high degree of coupling of the configuration of an individual
data stream and the global (network-wide) traffic configuration with
detrimental effects on the scalability and runtime of the planning phase.
In contrast, we present a configuration-conflict graph based approach, which
solves the original traffic planning problem by searching an independent vertex
set in the conflict graph. We show how to derive the configuration-conflict
graph, and discuss the conceptual advantages of this approach. To show the
practical advantages of the conflict-graph based traffic planning approach we
additionally present a proof-of-concept implementation and evaluate it against
a reference ILP-based implementation. In our evaluations, our proof-of-concept
implementation of the conflict-graph based approach outperforms the reference
ILP and is more memory efficient, making it a promising alternative to current
constraint-based traffic planning approaches.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2020-28&engl=0}
}
@inproceedings {INPROC-2020-05,
author = {Ben William Carabelli and Frank D{\"u}rr and Kurt Rothermel},
title = {{SCRaM -- State-Consistent Replication Management for Networked Control Systems}},
booktitle = {11th IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS)},
address = {Sydney, NSW, Australia},
publisher = {IEEE},
institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
type = {Konferenz-Beitrag},
month = {April},
year = {2020},
language = {Englisch},
cr-category = {C.2.4 Distributed Systems,
C.4 Performance of Systems},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2020-05/INPROC-2020-05.pdf},
contact = {Ben Carabelli ben.carabelli@ipvs.uni-stuttgart.de},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme},
abstract = {Networked control systems (NCS) consist of sensors and actuators that are
connected to a controller through a packet-switched network in a feedback loop
to control physical systems in diverse application areas such as industry,
automotive, or power infrastructure. The control of critical real-time systems
places strong requirements on the latency and reliability of both the
communication network and the controller. In this paper, we consider the
problem of increasing the reliability of an NCS subject to crash failures and
message loss by replicating the controller component. Previous replication
schemes for real-time systems have focused on ensuring that no conflicting
values are sent to the actuators by different replicas. Since this property,
which we call output consistency, only refers to the values within one time
step, it is insufficient for reasoning about the formal conditions under which
a group of replicated controllers behaves equivalent to a non-replicated
controller. Therefore, we propose the stronger state consistency property,
which ensures that the sequence of values produced by the replicated controller
exhibits the same dynamical behaviour as a non-replicated controller. Moreover,
we present SCRaM, a protocol for replicating generic periodically sampled
controllers that satisfies both of these consistency requirements. To
demonstrate the effectiveness of our approach, we evaluated it experimentally
for the control of a cart-driven inverted pendulum.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2020-05&engl=0}
}
@inproceedings {INPROC-2020-02,
author = {David Hellmanns and Jonathan Falk and Alexander Glavackij and Ren{\'e} Hummen and Stephan Kehrer and Frank D{\"u}rr},
title = {{On the Performance of Stream-based, Class-based Time-aware Shaping and Frame Preemption in TSN}},
booktitle = {Proceedings of 2020 IEEE International Conference on Industrial Technology (ICIT), Buenos Aires, Argentinia, February 26–28, 2020},
address = {Buenos Aires},
publisher = {IEEE Xplore},
institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Germany},
pages = {1--6},
type = {Konferenz-Beitrag},
month = {Februar},
year = {2020},
language = {Englisch},
cr-category = {C.2.4 Distributed Systems},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2020-02/INPROC-2020-02.pdf},
contact = {david.hellmanns@ipvs.uni-stuttgart.de},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte H{\"o}chstleistungsrechner, Verteilte Systeme},
abstract = {Time-sensitive Networking (TSN) is an evolving group of IEEE standards for
deterministic real-time communication making standard Ethernet technology
applicable to safety-critical application domains such as manufacturing or
automotive systems. TSN includes several mechanisms influencing the timely
forwarding of traffic, in particular, a time-triggered scheduling mechanism
called time-aware shaper (TAS) and frame preemption to reduce the blocking time
of high-priority traffic by low-priority traffic. Although these mechanisms
have been standardized and products implementing them begin to enter the
market, it is still hard for practitioners to select and apply suitable
mechanisms fitting the problem at hand. For instance, TAS schedules can be
calculated for individual streams or classes of traffic, and frame preemption
with strict priority scheduling (w/o TAS) might seem to be an option in
networks with extremely high data rates. In this paper, we make a first step
towards assisting practitioners in making an informed decision when choosing
between stream-based TAS, class-based TAS, and frame preemption by comparing
these mechanisms in selected scenarios using our TSN network simulation tool
NeSTiNg. Moreover, to facilitate the application of class-based TAS, we derive
a formula for calculating class-based TAS configuration.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2020-02&engl=0}
}
@inproceedings {INPROC-2020-01,
author = {Mohamed Abdelaal and Mustafa Karadeniz and Frank Duerr and Kurt Rothermel},
title = {{liteNDN: QoS-Aware Packet Forwarding and Caching for Named Data Networks}},
booktitle = {Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC)},
address = {Las Vegas, USA},
publisher = {IEEE},
institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
pages = {1--9},
type = {Konferenz-Beitrag},
month = {Januar},
year = {2020},
keywords = {Named Data Networking; Forwarding Strategy; Caching Policy; Quality of Service},
language = {Englisch},
cr-category = {C.2.2 Network Protocols},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/INPROC-2020-01/INPROC-2020-01.pdf},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme},
abstract = {Recently, named data networking (NDN) has been introduced to connect the world
of computing devices via naming data instead of their containers. Through this
strategic change, NDN brings several new features to network communication,
including in-network caching, multipath forwarding, built-in multicast, and
data security. Despite these unique features of NDN networking, there exist
plenty of opportunities for continuing developments, especially with packet
forwarding and caching. In this context, we introduce liteNDN, a novel
forwarding and caching strategy for NDN networks. liteNDN comprises a
cooperative forwarding strategy through which NDN routers share their
knowledge, i.e. data names and interfaces, to optimize their packet forwarding
decisions. Subsequently, liteNDN leverages that knowledge to estimate the
probability of each downstream path to swiftly retrieve the requested data.
Additionally, liteNDN exploits heuristics, such as routing costs and data
significance, to make proper decisions about caching normal as well as
segmented packets. The proposed approach has been extensively evaluated in
terms of the data retrieval latency, network utilization, and the cache hit
rate. The results showed that liteNDN, compared to conventional NDN forwarding
and caching strategies, achieves much less latency while reducing the
unnecessary traffic and caching activities.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2020-01&engl=0}
}
@article {ART-2020-21,
author = {Ahmad Slo and Sukanya Bhowmik and Kurt Rothermel},
title = {{State-Aware Load Shedding from Input Event Streams in Complex Event Processing}},
journal = {IEEE Transactions on Big Data},
publisher = {IEEE},
pages = {1--18},
type = {Artikel in Zeitschrift},
month = {Dezember},
year = {2020},
isbn = {10.1109/TBDATA.2020.3047438},
language = {Englisch},
cr-category = {C.2.4 Distributed Systems},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/ART-2020-21/ART-2020-21.pdf},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme},
abstract = {In complex event processing (CEP), load shedding is performed to maintain a
given latency bound during overload situations when there is a limitation on
resources. However, shedding load implies degradation in the quality of results
(QoR). Therefore, it is crucial to perform load shedding in a way that has the
lowest impact on QoR. Researchers, in the CEP domain, propose to drop either
events or partial matches (PMs) in overload cases. They assign utilities to
events or PMs by considering either the importance of events or the importance
of PMs but not both together. In this paper, we combine these approaches where
we propose to assign a utility to an event by considering both the event
importance and the importance of PMs. We propose two load shedding approaches
for CEP systems. The first approach drops events from PMs, while the second
approach drops events from windows. We adopt a probabilistic model that uses
the type and position of an event in a window and the state of a PM to assign a
utility to an event. We, also, propose an approach to predict a utility
threshold that is used to drop the required amount of events to maintain a
given latency bound. By extensive evaluations on two real-world datasets and
several representative queries, we show that, in the majority of cases, our
load shedding approach outperforms state-of-the-art load shedding approaches,
w.r.t. QoR.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=ART-2020-21&engl=0}
}
@article {ART-2020-03,
author = {Mohamed Abdelaal and Suriya Sekar and Frank Duerr and Susanne Becker and Kurt Rothermel and Dieter Fritsch},
title = {{MapSense: Grammar-Supported Inference of Indoor Objects from Crowd-Sourced 3D Point Clouds}},
journal = {Transactions on Internet of Things (TIOT)},
publisher = {ACM (Online)},
pages = {1--28},
type = {Artikel in Zeitschrift},
month = {Januar},
year = {2020},
doi = {10.1145/3379342},
keywords = {Indoor Mapping; Crowd-sensing; Machine Learning; Formal Grammars; QoS-aware Sensing},
language = {Englisch},
cr-category = {C.2.4 Distributed Systems},
ee = {ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/ART-2020-03/ART-2020-03.pdf},
department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Verteilte Systeme},
abstract = {Recently, indoor modeling has gained increased attention thanks to the immense
need for realizing efficient indoor location-based services. Indoor
environments de facto differ from outdoor spaces in two aspects: spaces are
smaller and there are many structural objects such as walls, doors, and
furniture. To model the indoor environments in a proper manner, novel data
acquisition concepts and data modeling algorithms have been devised to meet the
requirements of indoor spatial applications. In this realm, several research
efforts have been exerted. Nevertheless, these efforts mostly suffer either
from adopting impractical data acquisition methods or from being limited to 2D
modeling.
To overcome these limitations, we introduce the MapSense approach that
automatically derives indoor models from 3D point clouds collected by
individuals using mobile devices, such as Google Tango, Apple ARKit, and
Microsoft HoloLens. To this end, MapSense leverages several computer vision and
machine learning algorithms for precisely inferring the structural objects. In
MapSense, we mainly focus on improving the modeling accuracy through adopting
formal grammars which encode design-time knowledge, i.e. structural information
about the building. In addition to modeling accuracy, MapSense considers the
energy overhead on the mobile devices via developing a probabilistic quality
model through which the mobile devices solely upload high-quality point clouds
to the crowd-sensing servers. To demonstrate the performance of MapSense, we
implemented a crowdsensing Android App to collect 3D point clouds from two
different buildings by six volunteers. The results showed that MapSense can
accurately infer the various structural objects together with drastically
reducing the energy overhead on the mobile devices.},
url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=ART-2020-03&engl=0}
}