Skip to main content

Showing 1–30 of 30 results for author: Poskitt, C M

.
  1. arXiv:2404.07527  [pdf, other

    cs.CR

    Security Modelling for Cyber-Physical Systems: A Systematic Literature Review

    Authors: Shaofei Huang, Christopher M. Poskitt, Lwin Khin Shar

    Abstract: Cyber-physical systems (CPS) are at the intersection of digital technology and engineering domains, rendering them high-value targets of sophisticated and well-funded cybersecurity threat actors. Prominent cybersecurity attacks on CPS have brought attention to the vulnerability of these systems, and the soft underbelly of critical infrastructure reliant on CPS. Security modelling for CPS is an imp… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: Preprint under submission

  2. ACAV: A Framework for Automatic Causality Analysis in Autonomous Vehicle Accident Recordings

    Authors: Huijia Sun, Christopher M. Poskitt, Yang Sun, Jun Sun, Yuqi Chen

    Abstract: The rapid progress of autonomous vehicles~(AVs) has brought the prospect of a driverless future closer than ever. Recent fatalities, however, have emphasized the importance of safety validation through large-scale testing. Multiple approaches achieve this fully automatically using high-fidelity simulators, i.e., by generating diverse driving scenarios and evaluating autonomous driving systems~(ADS… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: Accepted by the IEEE/ACM 46th International Conference on Software Engineering (ICSE 2024)

    Journal ref: Proc. ICSE'24, Article No. 102, pages 1-13. ACM, 2024

  3. REDriver: Runtime Enforcement for Autonomous Vehicles

    Authors: Yang Sun, Christopher M. Poskitt, Xiaodong Zhang, Jun Sun

    Abstract: Autonomous driving systems (ADSs) integrate sensing, perception, drive control, and several other critical tasks in autonomous vehicles, motivating research into techniques for assessing their safety. While there are several approaches for testing and analysing them in high-fidelity simulators, ADSs may still encounter additional critical scenarios beyond those covered once they are deployed on re… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: Accepted by the IEEE/ACM 46th International Conference on Software Engineering (ICSE 2024)

    Journal ref: Proc. ICSE'24, Article No. 176, pages 1-12. ACM, 2024

  4. Fixing Your Own Smells: Adding a Mistake-Based Familiarisation Step When Teaching Code Refactoring

    Authors: Ivan Tan, Christopher M. Poskitt

    Abstract: Programming problems can be solved in a multitude of functionally correct ways, but the quality of these solutions (e.g. readability, maintainability) can vary immensely. When code quality is poor, symptoms emerge in the form of 'code smells', which are specific negative characteristics (e.g. duplicate code) that can be resolved by applying refactoring patterns. Many undergraduate computing curric… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Comments: Accepted by the 55th ACM Technical Symposium on Computer Science Education (SIGCSE'24)

    Journal ref: Proc. SIGCSE'24, pages 1307-1313. ACM, 2024

  5. How Helpful do Novice Programmers Find the Feedback of an Automated Repair Tool?

    Authors: Oka Kurniawan, Christopher M. Poskitt, Ismam Al Hoque, Norman Tiong Seng Lee, Cyrille Jégourel, Nachamma Sockalingam

    Abstract: Immediate feedback has been shown to improve student learning. In programming courses, immediate, automated feedback is typically provided in the form of pre-defined test cases run by a submission platform. While these are excellent for highlighting the presence of logical errors, they do not provide novice programmers enough scaffolding to help them identify where an error is or how to fix it. To… ▽ More

    Submitted 7 October, 2023; v1 submitted 2 October, 2023; originally announced October 2023.

    Comments: Experience report accepted by the International Conference on Teaching, Assessment, and Learning for Engineering (TALE'23)

    Journal ref: Proc. TALE'23. IEEE, 2023

  6. arXiv:2308.04177  [pdf, other

    cs.CV cs.CR

    How Generalizable are Deepfake Detectors? An Empirical Study

    Authors: Boquan Li, Jun Sun, Christopher M. Poskitt

    Abstract: Deepfake videos and images are becoming increasingly credible, posing a significant threat given their potential to facilitate fraud or bypass access control systems. This has motivated the development of deepfake detection methods, in which deep learning models are trained to distinguish between real and synthesized footage. Unfortunately, existing detection models struggle to generalize to deepf… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  7. Finding Causally Different Tests for an Industrial Control System

    Authors: Christopher M. Poskitt, Yuqi Chen, Jun Sun, Yu Jiang

    Abstract: Industrial control systems (ICSs) are types of cyber-physical systems in which programs, written in languages such as ladder logic or structured text, control industrial processes through sensing and actuating. Given the use of ICSs in critical infrastructure, it is important to test their resilience against manipulations of sensor/actuator inputs. Unfortunately, existing methods fail to test them… ▽ More

    Submitted 10 February, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: Accepted by the 45th IEEE/ACM International Conference on Software Engineering (ICSE 2023)

    Journal ref: Proc. ICSE'23, pages 2578-2590. IEEE, 2023

  8. arXiv:2212.10975   

    cs.LO cs.PL cs.SE

    Proceedings of the Thirteenth International Workshop on Graph Computation Models

    Authors: Reiko Heckel, Christopher M. Poskitt

    Abstract: This volume contains the post-proceedings of the Thirteenth International Workshop on Graph Computation Models (GCM 2022). The workshop took place in Nantes, France on 6th July 2022 as part of STAF 2022 (Software Technologies: Applications and Foundations). Graphs are common mathematical structures that are visual and intuitive. They constitute a natural and seamless way for system modelling in sc… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Journal ref: EPTCS 374, 2022

  9. LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles

    Authors: Yang Sun, Christopher M. Poskitt, Jun Sun, Yuqi Chen, Zijiang Yang

    Abstract: Autonomous driving systems (ADSs) must be tested thoroughly before they can be deployed in autonomous vehicles. High-fidelity simulators allow them to be tested against diverse scenarios, including those that are difficult to recreate in real-world testing grounds. While previous approaches have shown that test cases can be generated automatically, they tend to focus on weak oracles (e.g. reaching… ▽ More

    Submitted 24 October, 2022; v1 submitted 31 August, 2022; originally announced August 2022.

    Comments: Accepted by the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022)

    Journal ref: Proc. ASE'22, Article No. 62, pages 1-12. ACM, 2022

  10. arXiv:2204.12416  [pdf, other

    cs.CR cs.CY cs.SE

    XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner

    Authors: Lwin Khin Shar, Christopher M. Poskitt, Kyong ** Shim, Li Ying Leonard Wong

    Abstract: Cybersecurity education is considered an important part of undergraduate computing curricula, but many institutions teach it only in dedicated courses or tracks. This optionality risks students graduating with limited exposure to secure coding practices that are expected in industry. An alternative approach is to integrate cybersecurity concepts across non-security courses, so as to expose student… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: Accepted by the 27th annual conference on Innovation and Technology in Computer Science Education (ITiCSE 2022)

    Journal ref: Proc. ITiCSE'22, pages 463-469. ACM, 2022

  11. K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs

    Authors: Kun Wang, **gyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng

    Abstract: Programmable Logic Controllers (PLCs) are responsible for automating process control in many industrial systems (e.g. in manufacturing and public infrastructure), and thus it is critical to ensure that they operate correctly and safely. The majority of PLCs are programmed in languages such as Structured Text (ST). However, a lack of formal semantics makes it difficult to ascertain the correctness… ▽ More

    Submitted 11 September, 2023; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: Accepted by IEEE Transactions on Software Engineering

    Journal ref: IEEE Trans. Software Eng., 2023

  12. Mind the Gap: Reimagining an Interactive Programming Course for the Synchronous Hybrid Classroom

    Authors: Christopher M. Poskitt, Kyong ** Shim, Yi Meng Lau, Hong Seng Ong

    Abstract: COVID-19 has significantly affected universities, forcing many courses to be delivered entirely online. As countries bring the pandemic under control, a potential way to safely resume some face-to-face teaching is the synchronous hybrid classroom, in which physically and remotely attending students are taught simultaneously. This comes with challenges, however, including the risk that remotely att… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: Accepted by the 34th Conference on Software Engineering Education and Training (CSEE&T 2022): Special Track of the 55th Hawaii International Conference on System Sciences (HICSS 2022)

    Journal ref: Proc. HICSS 2022, pages 931-940. ScholarSpace, 2022

  13. Steps Before Syntax: Hel** Novice Programmers Solve Problems using the PCDIT Framework

    Authors: Oka Kurniawan, Cyrille Jégourel, Norman Tiong Seng Lee, Matthieu De Mari, Christopher M. Poskitt

    Abstract: Novice programmers often struggle with problem solving due to the high cognitive loads they face. Furthermore, many introductory programming courses do not explicitly teach it, assuming that problem solving skills are acquired along the way. In this paper, we present 'PCDIT', a non-linear problem solving framework that provides scaffolding to guide novice programmers through the process of transfo… ▽ More

    Submitted 18 September, 2021; originally announced September 2021.

    Comments: Accepted by the 34th Conference on Software Engineering Education and Training (CSEE&T 2022): Special Track of the 55th Hawaii International Conference on System Sciences (HICSS 2022)

    Journal ref: Proc. HICSS 2022, pages 982-991. ScholarSpace, 2022

  14. Code Integrity Attestation for PLCs using Black Box Neural Network Predictions

    Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun

    Abstract: Cyber-physical systems (CPSs) are widespread in critical domains, and significant damage can be caused if an attacker is able to modify the code of their programmable logic controllers (PLCs). Unfortunately, traditional techniques for attesting code integrity (i.e. verifying that it has not been modified) rely on firmware access or roots-of-trust, neither of which proprietary or legacy PLCs are li… ▽ More

    Submitted 17 July, 2021; v1 submitted 14 June, 2021; originally announced June 2021.

    Comments: Accepted by the 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2021)

    Journal ref: Proc. ESEC/FSE 2021, pages 32-44. ACM, 2021

  15. arXiv:2105.10707  [pdf, other

    cs.CR cs.AI cs.LG cs.SE

    Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems

    Authors: Yifan Jia, **gyi Wang, Christopher M. Poskitt, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen

    Abstract: The threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated research into a multitude of attack detection mechanisms, including anomaly detectors based on neural network models. The effectiveness of anomaly detectors can be assessed by subjecting them to test suites of attacks, but less consideration has been given to adversarial attackers that craft noise specific… ▽ More

    Submitted 22 May, 2021; originally announced May 2021.

    Comments: Accepted by the International Journal of Critical Infrastructure Protection (IJCIP)

    Journal ref: Int. J. Crit. Infrastructure Prot. 34:100452, 2021

  16. Incorrectness Logic for Graph Programs

    Authors: Christopher M. Poskitt

    Abstract: Program logics typically reason about an over-approximation of program behaviour to prove the absence of bugs. Recently, program logics have been proposed that instead prove the presence of bugs by means of under-approximate reasoning, which has the promise of better scalability. In this paper, we present an under-approximate program logic for a nondeterministic graph programming language, and sho… ▽ More

    Submitted 13 March, 2022; v1 submitted 10 May, 2021; originally announced May 2021.

    Comments: Accepted by the 14th International Conference on Graph Transformation (ICGT 2021)

    Journal ref: Proc. ICGT 2021, volume 12741 of LNCS, pages 81-101. Springer, 2021

  17. Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems

    Authors: Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt

    Abstract: The threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated the development of different attack detection mechanisms, such as those that monitor for violations of invariants, i.e. properties that always hold in normal operation. Given the complexity of CPSs, several existing approaches focus on deriving invariants automatically from data logs, but these can miss po… ▽ More

    Submitted 25 September, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: Accepted by the ACM Cyber-Physical System Security Workshop (CPSS 2020)

    Journal ref: In Proc. ACM Cyber-Physical System Security Workshop (CPSS 2020), pages 11-22. ACM, 2020

  18. arXiv:2005.14124  [pdf, other

    cs.SE cs.CR cs.LG

    Active Fuzzing for Testing and Securing Cyber-Physical Systems

    Authors: Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang

    Abstract: Cyber-physical systems (CPSs) in critical infrastructure face a pervasive threat from attackers, motivating research into a variety of countermeasures for securing them. Assessing the effectiveness of these countermeasures is challenging, however, as realistic benchmarks of attacks are difficult to manually construct, blindly testing is ineffective due to the enormous search spaces and resource re… ▽ More

    Submitted 16 July, 2020; v1 submitted 28 May, 2020; originally announced May 2020.

    Comments: Accepted by the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020)

    Journal ref: In Proc. ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2020), pages 14-26. ACM, 2020

  19. Securing Bring-Your-Own-Device (BYOD) Programming Exams

    Authors: Oka Kurniawan, Norman Tiong Seng Lee, Christopher M. Poskitt

    Abstract: Traditional pen and paper exams are inadequate for modern university programming courses as they are misaligned with pedagogies and learning objectives that target practical coding ability. Unfortunately, many institutions lack the resources or space to be able to run assessments in dedicated computer labs. This has motivated the development of bring-your-own-device (BYOD) exam formats, allowing s… ▽ More

    Submitted 12 January, 2020; originally announced January 2020.

    Comments: Accepted by SIGCSE 2020

    Journal ref: In Proc. ACM Technical Symposium on Computer Science Education (SIGCSE 2020), pages 880-886. ACM, 2020

  20. Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences

    Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang

    Abstract: The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, m… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    Comments: Accepted by ASE 2019

    Journal ref: In Proc. IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), pages 962-973. IEEE, 2019

  21. arXiv:1801.00903  [pdf, other

    cs.SE cs.CR cs.LG

    Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System

    Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun

    Abstract: Cyber-physical systems (CPS) consist of sensors, actuators, and controllers all communicating over a network; if any subset becomes compromised, an attacker could cause significant damage. With access to data logs and a model of the CPS, the physical effects of an attack could potentially be detected before any damage is done. Manually building a model that is accurate enough in practice, however,… ▽ More

    Submitted 13 June, 2018; v1 submitted 3 January, 2018; originally announced January 2018.

    Comments: Accepted by IEEE S&P 2018

    Journal ref: In Proc. IEEE Symposium on Security & Privacy (S&P 2018), pages 648-660. IEEE, 2018

  22. arXiv:1710.03928  [pdf, other

    cs.SE cs.DC cs.LO cs.PL

    A Semantics Comparison Workbench for a Concurrent, Asynchronous, Distributed Programming Language

    Authors: Claudio Corrodi, Alexander Heußner, Christopher M. Poskitt

    Abstract: A number of high-level languages and libraries have been proposed that offer novel and simple to use abstractions for concurrent, asynchronous, and distributed programming. The execution models that realise them, however, often change over time---whether to improve performance, or to extend them to new language features---potentially affecting behavioural and safety properties of existing programs… ▽ More

    Submitted 11 October, 2017; originally announced October 2017.

    Comments: Accepted by Formal Aspects of Computing

    Journal ref: Formal Asp. Comput. 30(1): 163-192 (2018)

  23. Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning

    Authors: Jun Inoue, Yoriyuki Yamagata, Yuqi Chen, Christopher M. Poskitt, Jun Sun

    Abstract: In this paper, we propose and evaluate the application of unsupervised machine learning to anomaly detection for a Cyber-Physical System (CPS). We compare two methods: Deep Neural Networks (DNN) adapted to time series data generated by a CPS, and one-class Support Vector Machines (SVM). These methods are evaluated against data from the Secure Water Treatment (SWaT) testbed, a scaled-down but fully… ▽ More

    Submitted 25 September, 2017; v1 submitted 15 September, 2017; originally announced September 2017.

    Journal ref: Proc. IEEE International Conference on Data Mining Workshops (ICDMW 2017): Data Mining for Cyberphysical and Industrial Systems (DMCIS 2017), pages 1058-1065. IEEE, 2017

  24. Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation

    Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun

    Abstract: Cyber-physical systems (CPS), which integrate algorithmic control with physical processes, often consist of physically distributed components communicating over a network. A malfunctioning or compromised component in such a CPS can lead to costly consequences, especially in the context of public infrastructure. In this short paper, we argue for the importance of constructing invariants (or models)… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

    Comments: Short paper accepted by the 21st International Symposium on Formal Methods (FM 2016)

    Journal ref: In Proc. International Symposium on Formal Methods (FM 2016), volume 9995 of LNCS, pages 155-163. Springer, 2016

  25. An Interference-Free Programming Model for Network Objects

    Authors: Mischael Schill, Christopher M. Poskitt, Bertrand Meyer

    Abstract: Network objects are a simple and natural abstraction for distributed object-oriented programming. Languages that support network objects, however, often leave synchronization to the user, along with its associated pitfalls, such as data races and the possibility of failure. In this paper, we present D-SCOOP, a distributed programming model that allows for interference-free and transaction-like rea… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

    Journal ref: In Proc. International Conference on Coordination Models and Languages (COORDINATION 2016), volume 9686 of LNCS, pages 227-244. Springer, 2016

  26. arXiv:1603.00307  [pdf, other

    cs.SE cs.DC cs.LO cs.PL

    A Graph-Based Semantics Workbench for Concurrent Asynchronous Programs

    Authors: Claudio Corrodi, Alexander Heußner, Christopher M. Poskitt

    Abstract: A number of novel programming languages and libraries have been proposed that offer simpler-to-use models of concurrency than threads. It is challenging, however, to devise execution models that successfully realise their abstractions without forfeiting performance or introducing unintended behaviours. This is exemplified by SCOOP---a concurrent object-oriented message-passing language---which has… ▽ More

    Submitted 1 March, 2016; originally announced March 2016.

    Comments: Accepted for publication in the proceedings of FASE 2016 (to appear)

    Journal ref: Proc. International Conference on Fundamental Approaches to Software Engineering (FASE 2016), volume 9633 of LNCS, pages 31-48. Springer, 2016

  27. arXiv:1508.03895  [pdf, other

    cs.SE cs.HC cs.LO

    The AutoProof Verifier: Usability by Non-Experts and on Standard Code

    Authors: Carlo A. Furia, Christopher M. Poskitt, Julian Tschannen

    Abstract: Formal verification tools are often developed by experts for experts; as a result, their usability by programmers with little formal methods experience may be severely limited. In this paper, we discuss this general phenomenon with reference to AutoProof: a tool that can verify the full functional correctness of object-oriented software. In particular, we present our experiences of using AutoProof… ▽ More

    Submitted 16 August, 2015; originally announced August 2015.

    Comments: In Proceedings F-IDE 2015, arXiv:1508.03388

    Journal ref: EPTCS 187, 2015, pp. 42-55

  28. arXiv:1504.02611  [pdf, other

    cs.SE cs.DC cs.LO cs.PL

    Towards Practical Graph-Based Verification for an Object-Oriented Concurrency Model

    Authors: Alexander Heußner, Christopher M. Poskitt, Claudio Corrodi, Benjamin Morandi

    Abstract: To harness the power of multi-core and distributed platforms, and to make the development of concurrent software more accessible to software engineers, different object-oriented concurrency models such as SCOOP have been proposed. Despite the practical importance of analysing SCOOP programs, there are currently no general verification approaches that operate directly on program code without additi… ▽ More

    Submitted 10 April, 2015; originally announced April 2015.

    Comments: In Proceedings GaM 2015, arXiv:1504.02448

    Journal ref: EPTCS 181, 2015, pp. 32-47

  29. Contract-Based General-Purpose GPU Programming

    Authors: Alexey Kolesnichenko, Christopher M. Poskitt, Sebastian Nanz, Bertrand Meyer

    Abstract: Using GPUs as general-purpose processors has revolutionized parallel computing by offering, for a large and growing set of algorithms, massive data-parallelization on desktop machines. An obstacle to widespread adoption, however, is the difficulty of programming them and the low-level control of the hardware required to achieve good performance. This paper suggests a programming library, SafeGPU,… ▽ More

    Submitted 21 August, 2015; v1 submitted 24 October, 2014; originally announced October 2014.

    ACM Class: D.3.2; D.3.4

    Journal ref: Proc. International Conference on Generative Programming: Concepts and Experiences (GPCE 2015), pages 75-84. ACM, 2015

  30. Verifying Monadic Second-Order Properties of Graph Programs

    Authors: Christopher M. Poskitt, Detlef Plump

    Abstract: The core challenge in a Hoare- or Dijkstra-style proof system for graph programs is in defining a weakest liberal precondition construction with respect to a rule and a postcondition. Previous work addressing this has focused on assertion languages for first-order properties, which are unable to express important global properties of graphs such as acyclicity, connectedness, or existence of paths.… ▽ More

    Submitted 16 June, 2014; v1 submitted 22 May, 2014; originally announced May 2014.

    Comments: Extended version of a paper to appear at ICGT 2014

    Journal ref: Proc. International Conference on Graph Transformation (ICGT 2014), volume 8571 of LNCS, pages 33-48. Springer, 2014