-
Fortify Your Defenses: Strategic Budget Allocation to Enhance Power Grid Cybersecurity
Authors:
Rounak Meyur,
Sumit Purohit,
Braden K. Webb
Abstract:
The abundance of cyber-physical components in modern day power grid with their diverse hardware and software vulnerabilities has made it difficult to protect them from advanced persistent threats (APTs). An attack graph depicting the propagation of potential cyber-attack sequences from the initial access point to the end objective is vital to identify critical weaknesses of any cyber-physical syst…
▽ More
The abundance of cyber-physical components in modern day power grid with their diverse hardware and software vulnerabilities has made it difficult to protect them from advanced persistent threats (APTs). An attack graph depicting the propagation of potential cyber-attack sequences from the initial access point to the end objective is vital to identify critical weaknesses of any cyber-physical system. A cyber security personnel can accordingly plan preventive mitigation measures for the identified weaknesses addressing the cyber-attack sequences. However, limitations on available cybersecurity budget restrict the choice of mitigation measures. We address this aspect through our framework, which solves the following problem: given potential cyber-attack sequences for a cyber-physical component in the power grid, find the optimal manner to allocate an available budget to implement necessary preventive mitigation measures. We formulate the problem as a mixed integer linear program (MILP) to identify the optimal budget partition and set of mitigation measures which minimize the vulnerability of cyber-physical components to potential attack sequences. We assume that the allocation of budget affects the efficacy of the mitigation measures. We show how altering the budget allocation for tasks such as asset management, cybersecurity infrastructure improvement, incident response planning and employee training affects the choice of the optimal set of preventive mitigation measures and modifies the associated cybersecurity risk. The proposed framework can be used by cyber policymakers and system owners to allocate optimal budgets for various tasks required to improve the overall security of a cyber-physical system.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
AntGrip -- Boosting Parallel Plate Gripper Performance Inspired by the Internal Hairs of Ant Mandibles
Authors:
Mohamed Sorour,
Barbara Webb
Abstract:
Ants use their mandibles - effectively a two-finger gripper - for a wide range of gras** activities. Here we investigate whether mimicking the internal hairs found on ant mandibles can improve performance of a two-finger parallel plate robot gripper. With bin picking applications in mind, the gripper fingers are long and slim, with interchangeable soft grip** pads that can be hairy or hairless…
▽ More
Ants use their mandibles - effectively a two-finger gripper - for a wide range of gras** activities. Here we investigate whether mimicking the internal hairs found on ant mandibles can improve performance of a two-finger parallel plate robot gripper. With bin picking applications in mind, the gripper fingers are long and slim, with interchangeable soft grip** pads that can be hairy or hairless. A total of 2400 video-documented experiments have been conducted, comparing hairless to hairy pads with different hair patterns. Simply by adding hairs, the grasp success rate was increased by at least 29%, and the number of objects that remain securely gripped during manipulation more than doubled. This result not only advances the state of the art in gras** technology, but also provides novel insight into the mechanical role of mandible hairs in ant biology.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
Vision-based route following by an embodied insect-inspired sparse neural network
Authors:
Lu Yihe,
Rana Alkhoury Maroun,
Barbara Webb
Abstract:
We compared the efficiency of the FlyHash model, an insect-inspired sparse neural network (Dasgupta et al., 2017), to similar but non-sparse models in an embodied navigation task. This requires a model to control steering by comparing current visual inputs to memories stored along a training route. We concluded the FlyHash model is more efficient than others, especially in terms of data encoding.
We compared the efficiency of the FlyHash model, an insect-inspired sparse neural network (Dasgupta et al., 2017), to similar but non-sparse models in an embodied navigation task. This requires a model to control steering by comparing current visual inputs to memories stored along a training route. We concluded the FlyHash model is more efficient than others, especially in terms of data encoding.
△ Less
Submitted 31 March, 2023; v1 submitted 14 March, 2023;
originally announced March 2023.
-
The persistent homology of genealogical networks
Authors:
Zachary M. Boyd,
Nick Callor,
Taylor Gledhill,
Abigail Jenkins,
Robert Snellman,
Benjamin Z. Webb,
Raelynn Wonnacott
Abstract:
Genealogical networks (i.e. family trees) are of growing interest, with the largest known data sets now including well over one billion individuals. Interest in family history also supports an 8.5 billion dollar industry whose size is projected to double within 7 years (FutureWise report HC1137). Yet little mathematical attention has been paid to the complex network properties of genealogical netw…
▽ More
Genealogical networks (i.e. family trees) are of growing interest, with the largest known data sets now including well over one billion individuals. Interest in family history also supports an 8.5 billion dollar industry whose size is projected to double within 7 years (FutureWise report HC1137). Yet little mathematical attention has been paid to the complex network properties of genealogical networks, especially at large scales.
The structure of genealogical networks is of particular interest due to the practice of forming unions, e.g. marriages, that are typically well outside one's immediate family. In most other networks, including other social networks, no equivalent restriction exists on the distance at which relationships form. To study the effect this has on genealogical networks we use persistent homology to identify and compare the structure of 101 genealogical and 31 other social networks. Specifically, we introduce the notion of a network's persistence curve, which encodes the network's set of persistence intervals. We find that the persistence curves of genealogical networks have a distinct structure when compared to other social networks. This difference in structure also extends to subnetworks of genealogical and social networks suggesting that, even with incomplete data, persistent homology can be used to meaningfully analyze genealogical networks. Here we also describe how concepts from genealogical networks, such as common ancestor cycles, are represented using persistent homology. We expect that persistent homology tools will become increasingly important in genealogical exploration as popular interest in ancestry research continues to expand.
△ Less
Submitted 27 January, 2023;
originally announced January 2023.
-
Verifying term graph optimizations using Isabelle/HOL
Authors:
Brae J. Webb,
Ian J. Hayes,
Mark Utting
Abstract:
Our objective is to formally verify the correctness of the hundreds of expression optimization rules used within the GraalVM compiler. When defining the semantics of a programming language, expressions naturally form abstract syntax trees, or, terms. However, in order to facilitate sharing of common subexpressions, modern compilers represent expressions as term graphs. Defining the semantics of te…
▽ More
Our objective is to formally verify the correctness of the hundreds of expression optimization rules used within the GraalVM compiler. When defining the semantics of a programming language, expressions naturally form abstract syntax trees, or, terms. However, in order to facilitate sharing of common subexpressions, modern compilers represent expressions as term graphs. Defining the semantics of term graphs is more complicated than defining the semantics of their equivalent term representations. More significantly, defining optimizations directly on term graphs and proving semantics preservation is considerably more complicated than on the equivalent term representations. On terms, optimizations can be expressed as conditional term rewriting rules, and proofs that the rewrites are semantics preserving are relatively straightforward. In this paper, we explore an approach to using term rewrites to verify term graph transformations of optimizations within the GraalVM compiler. This approach significantly reduces the overall verification effort and allows for simpler encoding of optimization rules.
△ Less
Submitted 13 December, 2022;
originally announced December 2022.
-
Differential Testing of a Verification Framework for Compiler Optimizations (Experience Paper)
Authors:
Mark Utting,
Brae J. Webb,
Ian J. Hayes
Abstract:
We want to verify the correctness of optimization phases in the GraalVM compiler, which consist of many thousands of lines of complex Java code performing sophisticated graph transformations. We have built high-level models of the data structures and operations of the code using the Isabelle/HOL theorem prover, and can formally verify the correctness of those high-level operations. But the remaini…
▽ More
We want to verify the correctness of optimization phases in the GraalVM compiler, which consist of many thousands of lines of complex Java code performing sophisticated graph transformations. We have built high-level models of the data structures and operations of the code using the Isabelle/HOL theorem prover, and can formally verify the correctness of those high-level operations. But the remaining challenge is: how can we be sure that those high-level operations accurately reflect what the Java is doing? This paper addresses that issue by applying several different kinds of differential testing to validate that the formal model and the Java code have the same semantics. Many of these validation techniques should be applicable to other projects that are building formal models of real-world code.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
A Formal Semantics of the GraalVM Intermediate Representation
Authors:
Brae J. Webb,
Mark Utting,
Ian J. Hayes
Abstract:
The optimization phase of a compiler is responsible for transforming an intermediate representation (IR) of a program into a more efficient form. Modern optimizers, such as that used in the GraalVM compiler, use an IR consisting of a sophisticated graph data structure that combines data flow and control flow into the one structure. As part of a wider project on the verification of optimization pas…
▽ More
The optimization phase of a compiler is responsible for transforming an intermediate representation (IR) of a program into a more efficient form. Modern optimizers, such as that used in the GraalVM compiler, use an IR consisting of a sophisticated graph data structure that combines data flow and control flow into the one structure. As part of a wider project on the verification of optimization passes of GraalVM, this paper describes a semantics for its IR within Isabelle/HOL. The semantics consists of a big-step operational semantics for data nodes (which are represented in a graph-based static single assignment (SSA) form) and a small-step operational semantics for handling control flow including heap-based reads and writes, exceptions, and method calls. We have proved a suite of canonicalization optimizations and conditional elimination optimizations with respect to the semantics.
△ Less
Submitted 5 July, 2021;
originally announced July 2021.
-
Using Social Networks to Improve Group Transition Prediction in Professional Sports
Authors:
Emily J. Evans,
Rebecca Jones,
Joseph Leung,
Benjamin Z. Webb
Abstract:
We examine whether social data can be used to predict how members of Major League Baseball (MLB) and members of the National Basketball Association (NBA) transition between teams during their career. We find that incorporating social data into various machine learning algorithms substantially improves the algorithms' ability to correctly determine these transitions. In particular, we measure how p…
▽ More
We examine whether social data can be used to predict how members of Major League Baseball (MLB) and members of the National Basketball Association (NBA) transition between teams during their career. We find that incorporating social data into various machine learning algorithms substantially improves the algorithms' ability to correctly determine these transitions. In particular, we measure how player performance, team fitness, and social data individually and collectively contribute to predicting these transitions. Incorporating individual performance and team fitness both improve the predictive accuracy of our algorithms. However, this improvement is dwarfed by the improvement seen when we include social data suggesting that social relationships have a comparatively large effect on player transitions in both MLB and in the NBA.
△ Less
Submitted 1 September, 2020;
originally announced September 2020.
-
Link Prediction in Networks Using Effective Transitions
Authors:
Bryn Balls-Barker,
Benjamin Webb
Abstract:
We introduce a new method for predicting the formation of links in real-world networks, which we refer to as the method of effective transitions. This method relies on the theory of isospectral matrix reductions to compute the probability of eventually transitioning from one vertex to another in a (biased) random walk on the network. Unlike the large majority of link prediction techniques, this me…
▽ More
We introduce a new method for predicting the formation of links in real-world networks, which we refer to as the method of effective transitions. This method relies on the theory of isospectral matrix reductions to compute the probability of eventually transitioning from one vertex to another in a (biased) random walk on the network. Unlike the large majority of link prediction techniques, this method can be used to predict links in networks that are directed or undirected which are either weighted or unweighted. We apply this method to a number of social, technological, and natural networks and show that it is competitive with other link predictors often outperforming them. We also provide a method of approximating our effective transition method and show that aside from having much lower temporal complexity, this approximation often provides more accurate predictions than the original effective transition method. We also, prove a number of mathematical results regarding our effective transition algorithm and its approximation.
△ Less
Submitted 12 August, 2019;
originally announced September 2019.
-
Visual Appearance Analysis of Forest Scenes for Monocular SLAM
Authors:
James Garforth,
Barbara Webb
Abstract:
Monocular simultaneous localisation and map** (SLAM) is a cheap and energy efficient way to enable Unmanned Aerial Vehicles (UAVs) to safely navigate managed forests and gather data crucial for monitoring tree health. SLAM research, however, has mostly been conducted in structured human environments, and as such is poorly adapted to unstructured forests. In this paper, we compare the performance…
▽ More
Monocular simultaneous localisation and map** (SLAM) is a cheap and energy efficient way to enable Unmanned Aerial Vehicles (UAVs) to safely navigate managed forests and gather data crucial for monitoring tree health. SLAM research, however, has mostly been conducted in structured human environments, and as such is poorly adapted to unstructured forests. In this paper, we compare the performance of state of the art monocular SLAM systems on forest data and use visual appearance statistics to characterise the differences between forests and other environments, including a photorealistic simulated forest. We find that SLAM systems struggle with all but the most straightforward forest terrain and identify key attributes (lighting changes and in-scene motion) which distinguish forest scenes from "classic" urban datasets. These differences offer an insight into what makes forests harder to map and open the way for targeted improvements. We also demonstrate that even simulations that look impressive to the human eye can fail to properly reflect the difficult attributes of the environment they simulate, and provide suggestions for more closely mimicking natural scenes.
△ Less
Submitted 5 July, 2019;
originally announced July 2019.
-
Hidden Symmetries in Real and Theoretical Networks
Authors:
Dallas Smith,
Benjamin Webb
Abstract:
Symmetries are ubiquitous in real networks and often characterize network features and functions. Here we present a generalization of network symmetry called \emph{latent symmetry}, which is an extension of the standard notion of symmetry. They are defined in terms of standard symmetries in a reduced version of the network. One unique aspect of latent symmetries is that each one is associated with…
▽ More
Symmetries are ubiquitous in real networks and often characterize network features and functions. Here we present a generalization of network symmetry called \emph{latent symmetry}, which is an extension of the standard notion of symmetry. They are defined in terms of standard symmetries in a reduced version of the network. One unique aspect of latent symmetries is that each one is associated with a \emph{size}, which provides a way of discussing symmetries at multiple scales in a network. We are able to demonstrate a number of examples of networks (graphs) which contain latent symmetry, including a number of real networks. In numerical experiments, we show that latent symmetries are found more frequently in graphs built using preferential attachment, a standard model of network growth, when compared to non-network like (Erd{\H o}s-Rényi) graphs. Finally we prove that if vertices in a network are latently symmetric, then they must have the same eigenvector centrality, similar to vertices which are symmetric in the standard sense. This suggests that the latent symmetries present in real-networks may serve the same structural and functional purpose standard symmetries do in these networks. We conclude from these facts and observations that \emph{latent symmetries} are present in real networks and provide useful information about the network potentially beyond standard symmetries as they can appear at multiple scales.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.
-
Uncovering Hierarchical Structure in Social Networks using Isospectral Reductions
Authors:
Chi-Jen Wang,
Seokjoo Chae,
Leonid A. Bunimovich,
Benjamin Z. Webb
Abstract:
We employ the recently developed theory of isospectral network reductions to analyze multi-mode social networks. This procedure allows us to uncover the hierarchical structure of the networks we consider as well as the hierarchical structure of each mode of the network. Additionally, by performing a dynamical analysis of these networks we are able to analyze the evolution of their structure allowi…
▽ More
We employ the recently developed theory of isospectral network reductions to analyze multi-mode social networks. This procedure allows us to uncover the hierarchical structure of the networks we consider as well as the hierarchical structure of each mode of the network. Additionally, by performing a dynamical analysis of these networks we are able to analyze the evolution of their structure allowing us to find a number of other network features. We apply both of these approaches to the Southern Women Data Set, one of the most studied social networks and demonstrate that these techniques provide new information, which complements previous findings.
△ Less
Submitted 5 December, 2017;
originally announced January 2018.
-
Specialization Models of Network Growth
Authors:
L. A. Bunimovich,
D. C. Smith,
B. Z. Webb
Abstract:
One of the most important features observed in real networks is that, as a network's topology evolves so does the network's ability to perform various complex tasks. To explain this, it has also been observed that as a network grows certain subnetworks begin to specialize the function(s) they perform. Here, we introduce a class of models of network growth based on this notion of specialization and…
▽ More
One of the most important features observed in real networks is that, as a network's topology evolves so does the network's ability to perform various complex tasks. To explain this, it has also been observed that as a network grows certain subnetworks begin to specialize the function(s) they perform. Here, we introduce a class of models of network growth based on this notion of specialization and show that as a network is specialized using this method its topology becomes increasingly sparse, modular, and hierarchical, each of which are important properties observed in real networks. This procedure is also highly flexible in that a network can be specialized over any subset of its elements. This flexibility allows those studying specific networks the ability to search for mechanisms that describe the growth of these particular networks. As an example, we find that by randomly selecting these elements a network's topology acquires some of the most well-known properties of real networks including the small-world property, disassortativity, power-law like degree distributions, and power-law like clustering coefficients. As far as the authors know, this is the first such class of models that creates an increasingly modular and hierarchical network topology with these properties.
△ Less
Submitted 5 December, 2017;
originally announced December 2017.
-
Fast link prediction for large networks using spectral embedding
Authors:
Benjamin Pachev,
Benjamin Webb
Abstract:
Many link prediction algorithms require the computation of a similarity metric on each vertex pair, which is quadratic in the number of vertices and infeasible for large networks. We develop a class of link prediction algorithms based on a spectral embedding and the k closest pairs algorithm that are scalable to very large networks. We compare the prediction accuracy and runtime of these methods t…
▽ More
Many link prediction algorithms require the computation of a similarity metric on each vertex pair, which is quadratic in the number of vertices and infeasible for large networks. We develop a class of link prediction algorithms based on a spectral embedding and the k closest pairs algorithm that are scalable to very large networks. We compare the prediction accuracy and runtime of these methods to existing algorithms on several large link prediction tasks. Our methods achieve comparable accuracy to standard algorithms but are significantly faster.
△ Less
Submitted 28 March, 2017;
originally announced March 2017.
-
Place Recognition with Event-based Cameras and a Neural Implementation of SeqSLAM
Authors:
Michael Milford,
Hanme Kim,
Michael Mangan,
Stefan Leutenegger,
Tom Stone,
Barbara Webb,
Andrew Davison
Abstract:
Event-based cameras offer much potential to the fields of robotics and computer vision, in part due to their large dynamic range and extremely high "frame rates". These attributes make them, at least in theory, particularly suitable for enabling tasks like navigation and map** on high speed robotic platforms under challenging lighting conditions, a task which has been particularly challenging fo…
▽ More
Event-based cameras offer much potential to the fields of robotics and computer vision, in part due to their large dynamic range and extremely high "frame rates". These attributes make them, at least in theory, particularly suitable for enabling tasks like navigation and map** on high speed robotic platforms under challenging lighting conditions, a task which has been particularly challenging for traditional algorithms and camera sensors. Before these tasks become feasible however, progress must be made towards adapting and innovating current RGB-camera-based algorithms to work with event-based cameras. In this paper we present ongoing research investigating two distinct approaches to incorporating event-based cameras for robotic navigation: the investigation of suitable place recognition / loop closure techniques, and the development of efficient neural implementations of place recognition techniques that enable the possibility of place recognition using event-based cameras at very high frame rates using neuromorphic computing hardware.
△ Less
Submitted 18 May, 2015;
originally announced May 2015.
-
Isospectral Reductions of Dynamical Networks
Authors:
L. A. Bunimovich,
B. Z. Webb
Abstract:
We present a general and flexible procedure which allows for the reduction (or expansion) of any dynamical network while preserving the spectrum of the network's adjacency matrix. Computationally, this process is simple and easily implemented for the analysis of any network. Moreover, it is possible to isospectrally reduce a network with respect to any network characteristic including centrality,…
▽ More
We present a general and flexible procedure which allows for the reduction (or expansion) of any dynamical network while preserving the spectrum of the network's adjacency matrix. Computationally, this process is simple and easily implemented for the analysis of any network. Moreover, it is possible to isospectrally reduce a network with respect to any network characteristic including centrality, betweenness, etc. This procedure also establishes new equivalence relations which partition all dynamical networks into spectrally equivalent classes. Here, we present general facts regarding isospectral network transformations which we then demonstrate in simple examples. Overall, our procedure introduces new possibilities for the analysis of networks in ways that are easily visualized.
△ Less
Submitted 20 October, 2010;
originally announced October 2010.