Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2025

Enhancing Gamified LMS with the Integration of Games Experiences

Autores
Queirós, R;

Publicação
ADVANCED RESEARCH IN TECHNOLOGIES, INFORMATION, INNOVATION AND SUSTAINABILITY, ARTIIS 2024 INTERNATIONAL WORKSHOPS, PT I

Abstract
This paper presents the guidelines for game experiences integration into Learning Management Systems (LMS) through the IMS LTI (Learning Tools Interoperability) specification. At the same time, it also introduces a dynamic scoring formula, based on a given taxonomy, that goes beyond traditional metrics, allowing for the inclusion of any number of game elements, such as levels, challenges, hints used, and time taken, within the game framework. These elements are assigned weight factors, which can be configured by instructors within the LMS platform, facilitating personalized assessment criteria tailored to specific learning objectives. In order to apply these approach in a real educational scenario, an Escape Room (ER) for math skills testing was used. Using the LTI specification for integration in combination with the dynamic scoring formula provides a comprehensive assessment of student performance, giving a single score which will be vital to enhance the LMS gamified workflow. This research contributes to the field of gamification in education, offering insights into the integration of (serious or regular) games in LMS platforms.

2025

A quantitative approach to global state composition

Autores
Alves, S; Kesner, D; Ramos, M;

Publicação
MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE

Abstract
We show that recent approaches to quantitative analysis based on non-idempotent typing systems can be extended to programming languages with effects. In particular, we consider two cases: the weak open call-by-name (CBN) and call-by-value (CBV) variants of the $\lambda$ -calculus, equipped with operations to write and read from a global state. In order to capture quantitative information with respect to time and space for both CBN and CBV, we design for each of them a quantitative type system based on a (tight) multi-type system. One key observation of this work is how CBN and CBV influence the composition of state types. That is, each type system is developed by taking into account how each language manages the global state: in CBN, the composition of state types is almost straightforward, since function application does not require evaluation of its argument; in CBV, however, the interaction between functions and arguments makes the composition of state types more subtle since only values can be passed as actual arguments. The main contribution of this paper is the design of type systems capturing quantitative information about effectful CBN and CBV programming languages. Indeed, we develop type systems that are qualitatively and quantitatively sound and complete.

2025

Extending the Quantitative Pattern-Matching Paradigm

Autores
Alves, S; Kesner, D; Ramos, M;

Publicação
PROGRAMMING LANGUAGES AND SYSTEMS, APLAS 2024

Abstract
We show how (well-established) type systems based on non-idempotent intersection types can be extended to characterize termination properties of functional programming languages with pattern matching features. To model such programming languages, we use a (weak and closed) lambda-calculus integrating a pattern matching mechanism on algebraic data types (ADTs). Remarkably, we also show that this language not only encodes Plotkin's CBV and CBN lambda-calculus as well as other subsuming frameworks, such as the bang-calculus, but can also be used to interpret the semantics of effectful languages with exceptions. After a thorough study of the untyped language, we introduce a type system based on intersection types, and we show through purely logical methods that the set of terminating terms of the language corresponds exactly to that of well-typed terms. Moreover, by considering non-idempotent intersection types, this characterization turns out to be quantitative, i.e. the size of the type derivation of a term t gives an upper bound for the number of evaluation steps from t to its normal form.

2025

Function-Oriented Programming Attacks on ARM Cortex-M Processors

Autores
Cirne, A; Sousa, PR; Antunes, L; Resende, JS;

Publicação
IEEE ACCESS

Abstract
In recent years, code-reuse attacks have been used to exploit software vulnerabilities and gain control of numerous software programs and embedded devices. Several measures have been put in place to prevent this type of attack, such as Control-Flow Integrity (CFI) systems, and some of these systems have already been integrated into hardware. Nevertheless, Function-Oriented Programming (FOP) attacks, a form of code-reuse that chains functions to carry out malicious actions, continue to persist. In this work, we present the first analysis of the implications and feasibility of FOP attacks on microcontrollers, focusing on ARM Cortex-M processors that support PACBTI, that is, a hardware feature designed for CFI system implementation. During this process, we identified multiple dispatch gadgets in two common Real-time Operating System (RTOS). Since these gadgets reside within core OS functionalities, they are inherently included in a broad range of embedded operating systems. Furthermore, we also present CortexMFopper - a tool specially built to identify FOP gadgets in embedded devices and to raise awareness of this technique.

2025

Geo-Indistinguishability

Autores
Mendes, R; Vilela, P;

Publicação
Encyclopedia of Cryptography, Security and Privacy, Third Edition

Abstract
[No abstract available]

2025

Computational complexity-constrained spectral efficiency analysis for 6G waveforms

Autores
Queiroz, S; Vilela, JP; Ng, BKK; Lam, C; Monteiro, E;

Publicação
ITU Journal on Future and Evolving Technologies

Abstract
In this work, we present a tutorial on how to account for the computational time complexity overhead of signal processing in the Spectral Efficiency (SE) analysis of wireless waveforms. Our methodology is particularly relevant in scenarios where achieving higher SE entails a penalty in complexity, a common trade-off present in 6G candidate waveforms. We consider that SE derives from the bit rate, which is impacted by time-dependent overheads. Thus, neglecting the computational complexity overhead in the SE analysis grants an unfair advantage to more computationally complex waveforms, as they require larger computational resources to meet a signal processing runtime below the symbol period. We demonstrate our points with two case studies. In the first, we refer to IEEE 802.11a-compliant baseband processors from the literature to show that their runtime significantly impacts the SE perceived by upper layers. In the second case study, we show that waveforms considered less efficient in terms of SE can outperform their more computationally expensive counterparts, if provided with equivalent high-performance computational resources. Based on these cases, we believe our tutorial can address the comparative SE analysis of waveforms that operate under different computational resource constraints.

  • 8
  • 206