2016
Authors
Ren, XL; Blanton, RD; Tavares, VG;
Publication
2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
Abstract
Security is becoming an essential problem for integrated circuits (ICs). Various attacks, such as reverse engineering and dumping on-chip data, have been reported to undermine IC security. IEEE 1149.1, also known as JTAG, is primarily used for IC manufacturing test but inevitably provides a "backdoor" that can be exploited to attack ICs. Encryption has been used extensively as an effective mean to protect ICs through authentication, but a few weaknesses subsist, such as key leakage. Signature-based techniques ensure security using a database that includes known attacks, but fail to detect attacks that are not contained by the database. To overcome these drawbacks, a two-layer learning-based protection scheme is proposed. Specifically, the scheme monitors the execution of JTAG instructions and uses support vector machines (SVM) to identify abnormal instruction sequences. The use of machine learning enables the detection of unseen attacks without the need for key-based authentication. The experiments based on the OpenSPARC T2 platform demonstrate that the proposed scheme improves the accuracy of detecting unseen attacks by 50% on average when compared to previous work.
2016
Authors
Morgado, IC; Paiva, ACR;
Publication
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS
Abstract
The iMPAcT tool combines the benefits of existing user recurring behaviour (User Interface Patterns) on mobile applications to facilitate the test automation of Android mobile applications. It uses an automatic exploration process combined with reverse engineering to identify the existing user interface patterns on a mobile application and then tests those patterns with generic test strategies (designated Test Patterns). The Test Patterns are defined in a catalogue that can be reused for testing other applications. However the results obtained by the iMPAcT tool depend on the exploration mode and on the order in which the test strategies are applied. This paper describes an experiment conducted to evaluate the impact of using different exploration modes and of changing the order by which UI patterns are searched and subsequently tested on the failures found and on the number of events fired. (C) 2016 The Authors. Published by Elsevier B.V.
2016
Authors
Shafie Khah, M; Shoreh, MH; Siano, P; Fitiwi, DZ; Godina, R; Osorio, GJ; Lujano Rojas, J; Catalao, JPS;
Publication
2016 IEEE International Energy Conference, ENERGYCON 2016
Abstract
In this paper, an agent-based model is proposed to improve market efficiency by using different Demand Response Programs (DRPs) in the day-ahead electricity market. To this end, both incentive-based and price-based DRPs are considered. On this basis, time of use, real time pricing, emergency demand response program, interruptible/curtailable services and critical peak pricing are investigated. The tariffs of the considered price-based programs and the amount of incentive in the incentive-based programs are optimized through the proposed model. Furthermore, a market power index, i.e., Share Weighted Average Lerner Index (SWALI) and the operation cost are used to evaluate the market efficiency and the market power. The proposed model optimizes the DRPs to improve the electricity market efficiency by using a multi-attribute decision-making approach. The results show that the market operator can mitigate the potential occurrence of market power in a power system by finding the optimal DRP. © 2016 IEEE.
2016
Authors
Fachada, N; Rodrigues, J; Lopes, VV; Martins, RC; Rosa, AC;
Publication
R JOURNAL
Abstract
The R package micompr implements a procedure for assessing if two or more multivariate samples are drawn from the same distribution. The procedure uses principal component analysis to convert multivariate observations into a set of linearly uncorrelated statistical measures, which are then compared using a number of statistical methods. This technique is independent of the distributional properties of samples and automatically selects features that best explain their differences. The procedure is appropriate for comparing samples of time series, images, spectrometric measures or similar high-dimension multivariate observations.
2016
Authors
Martins, J; Goncalves, R; Branco, F; Pereira, J; Peixoto, C; Rocha, T;
Publication
NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2
Abstract
The current urge on using Internet for both social and professional tasks, alongside with the existence of over 80 million European citizens with some sort of disability as led to the need for an accessible Web [1]. Given, the also increasing thrive for searching the web for health related information and the assumption of heath care institutions as the creators of this type of information, a research study was developed in order to evaluate the accessibility levels of the Iberian health care institutions. From this study, that used ACESSWEB as the evaluation platform, it was possible to perceive that none of the evaluated websites was WCAG 2.0 compliant and that, despite the poor results, Spanish websites presented more accessibility concerns than the Portuguese. Hence, the situation is critical and a significant effort must be done in order to allow citizens with disabilities to have access to the much needed health related information.
2016
Authors
do Souto, PF; Portugal, P; Vasques, F;
Publication
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Abstract
X-by-wire applications have extremely demanding reliability requirements that are increasingly being addressed through the adoption of distributed and fault-tolerant architectures. The development of these applications is facilitated by the availability of high-level services such as agreement or reliable broadcast (RB). Some dependable communication buses, e.g., TTP-C, already provide these services, whereas FlexRay does not. In this paper, we present an approach to evaluate the reliability of a family of RB protocols implemented both on top of FlexRay and on top of ordinary time-division multiple access (TDMA). In particular, we evaluate the impact of the acknowledgment policy on the reliability of these protocols. We express the reliability as the probability of violation of the agreement and validity properties of the protocol during a mission. For that, we develop an analytical model based on discrete-time Markov chains, which considers a comprehensive set of faults (permanent, transient, omissive, and asymmetric) affecting both nodes and channels, and their effects on the protocol execution. The structure of the model is quite flexible and easily adaptable to other TDMA-based protocols. To assess the sensitivity of the protocol to both internal and external factors, we carried out a large number of experiments considering several network configurations and fault rates. The results show that for FlexRay, the negative-acknowledgment policy provides the same reliability as the positive-acknowledgment policy. However, for TDMA-based protocols that lack FlexRay's ability to distinguish silence from the loss of a message, the negative-acknowledgment policy leads to lower reliability, and its fitness for safety-critical applications depends on the system configuration and environment conditions.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.