Skip to main content

Showing 1–9 of 9 results for author: Troubitsyna, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.13458  [pdf, other

    cs.CR cs.PF

    Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems

    Authors: Rodothea Myrsini Tsoupidi, Elena Troubitsyna, Panagiotis Papadimitratos

    Abstract: Embedded devices are increasingly present in our everyday life. They often process critical information, and hence, rely on cryptographic protocols to achieve security. However, embedded devices remain vulnerable to attackers seeking to hijack their operation and extract sensitive information by exploiting side channels and code reuse. Code-Reuse Attacks (CRAs) can steer the execution of a program… ▽ More

    Submitted 7 August, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

  2. Verifying Safety of Behaviour Trees in Event-B

    Authors: Matteo Tadiello, Elena Troubitsyna

    Abstract: Behavior Trees (BT) are becoming increasingly popular in the robotics community. The BT tool is well suited for decision-making applications allowing a robot to perform complex behavior while being explainable to humans as well. Verifying that BTs used are well constructed with respect to safety and reliability requirements is essential, especially for robots operating in critical environments. In… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

    Comments: In Proceedings FMAS2022 ASYDE2022, arXiv:2209.13181

    Journal ref: EPTCS 371, 2022, pp. 139-155

  3. arXiv:2207.02614  [pdf, other

    cs.CR cs.AI

    Securing Optimized Code Against Power Side Channels

    Authors: Rodothea Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos

    Abstract: Side-channel attacks impose a serious threat to cryptographic algorithms, including widely employed ones, such as AES and RSA. These attacks take advantage of the algorithm implementation in hardware or software to extract secret information via side channels. Software masking is a mitigation approach against power side-channel attacks aiming at hiding the secret-revealing dependencies from the po… ▽ More

    Submitted 3 December, 2022; v1 submitted 6 July, 2022; originally announced July 2022.

  4. arXiv:1912.09288  [pdf, other

    cs.RO eess.SP

    Online Path Generation and Navigation for Swarms of UAVs

    Authors: Adnan Ashraf, Amin Majd, Elena Troubitsyna

    Abstract: With the growing popularity of Unmanned Aerial Vehicles (UAVs) for consumer applications, the number of accidents involving UAVs is also increasing rapidly. Therefore, motion safety of UAVs has become a prime concern for UAV operators. For a swarm of UAVs, a safe operation can not be guaranteed without preventing the UAVs from colliding with one another and with static and dynamically appearing, m… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

    Comments: Accepted manuscript in Scientific Programming

  5. Towards Integrated Modelling of Dynamic Access Control with UML and Event-B

    Authors: Inna Vistbakka, Elena Troubitsyna

    Abstract: Role-Based Access Control (RBAC) is a popular authorization model used to manage data-access constraints in a wide range of systems. RBAC usually defines the static view on the access rights. However, to ensure dependability of a system, it is often necessary to model and verify state-dependent access rights. Such a modelling allows us to explicitly define the dependencies between the system state… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: In Proceedings IMPEX 2017 and FM&MDD 2017, arXiv:1805.04636

    ACM Class: D.2; F.3

    Journal ref: EPTCS 271, 2018, pp. 105-116

  6. Securing Open Source Clouds Using Models

    Authors: Irum Rauf, Elena Troubitsyna

    Abstract: The widespread adoption of cloud computing has resulted in the proliferation of open source cloud computing frameworks that give more control to enterprises over their data and networks. Though the benefits of open source software are widely recognized, there is a growing concern over their security assurance. Often open source software is a subject of frequent updates. The updates might introduce… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: In Proceedings IMPEX 2017 and FM&MDD 2017, arXiv:1805.04636

    ACM Class: D.2 SOFTWARE ENGINEERING; F.3 LOGICS AND MEANINGS OF PROGRAMS

    Journal ref: EPTCS 271, 2018, pp. 80-94

  7. arXiv:1805.04636   

    cs.LO cs.SE

    Proceedings Joint Workshop on Handling IMPlicit and EXplicit knowledge in formal system development (IMPEX) and Formal and Model-Driven Techniques for Develo** Trustworthy Systems (FM&MDD)

    Authors: Régine Laleau, Dominique Méry, Shin Nakajima, Elena Troubitsyna

    Abstract: This volume contains the joint proceedings of IMPEX 2017, the first workshop on Handling IMPlicit and EXplicit knowledge in formal system development and FM&MDD, the second workshop on Formal and Model-Driven Techniques for Develo** Trustworthy Systems (FM&MDD) held together on November 16, 2017 in Xi'an, China, as part of ICFEM 2017, 19th International Conference on Formal Engineering Method… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

    Journal ref: EPTCS 271, 2018

  8. arXiv:1210.7035  [pdf, ps, other

    cs.SE

    Development of Fault Tolerant MAS with Cooperative Error Recovery by Refinement in Event-B

    Authors: Inna Pereverzeva, Elena Troubitsyna, Linas Laibinis

    Abstract: Designing fault tolerance mechanisms for multi-agent systems is a notoriously difficult task. In this paper we present an approach to formal development of a fault tolerant multi-agent system by refinement in Event-B. We demonstrate how to formally specify cooperative error recovery and dynamic reconfiguration in Event-B. Moreover, we discuss how to express and verify essential properties of a fau… ▽ More

    Submitted 25 October, 2012; originally announced October 2012.

    Comments: In Proceedings of DS-Event-B 2012: Workshop on the experience of and advances in develo** dependable systems in Event-B, in conjunction with ICFEM 2012 - Kyoto, Japan, November 13, 2012

  9. arXiv:1210.7032  [pdf, ps, other

    cs.SE

    Dependability-Explicit Engineering with Event-B: Overview of Recent Achievements

    Authors: Elena Troubitsyna

    Abstract: Event-B has been actively used within the EU Deploy project to model dependable systems from various application domains. As a result, we have created a number of formal approaches to explicitly reason about dependability in the refinement process. In this paper we overview the work on formal engineering of dependable systems carried out in the Deploy project. We outline our approaches to integrat… ▽ More

    Submitted 25 October, 2012; originally announced October 2012.

    Comments: In Proceedings of DS-Event-B 2012: Workshop on the experience of and advances in develo** dependable systems in Event-B, in conjunction with ICFEM 2012 - Kyoto, Japan, November 13, 2012