To assess the cybersecurity of attacked Artificial Intelligence (AI) systems, it is very important to have trustworthy, up- to-date and systematic information about vulnerabilities. the paper provides a critical analy...
详细信息
ISBN:
(纸本)9798350333046
To assess the cybersecurity of attacked Artificial Intelligence (AI) systems, it is very important to have trustworthy, up- to-date and systematic information about vulnerabilities. the paper provides a critical analysis of existing methods and tools for collecting information about vulnerabilities to assess the cybersecurity of AI systems, and defines indicators of the quality of this information, primarily completeness and reliability. the processes of collecting and analyzing AI systems vulnerabilities are described by a multi-level IDEF ( Integrated Definition) model. It consists of the following stages: systematization of information sources, its processing by groups of sources and coordination using Big Data tools;selection and presentation in a certain format of information about vulnerabilities of the studied AI system;assessing the criticality of system vulnerabilities using various methods, in particular, IMECA (Intrusion Modes and Effects Criticality analysis). the features of detailing the model of the Natural Language Processing (NLP) as a Service system are illustrated. the directions of future research and the development of tools for implementing the proposed model for collecting and analyzing vulnerabilities of AI systems are substantiated.
We present INFER-SV, a wrapper that adapts INFER for SV-COMP. INFER is a static-analysis tool for C and other languages, developed by Facebook and used by multiple large companies. It is strongly aimed at industry and...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
We present INFER-SV, a wrapper that adapts INFER for SV-COMP. INFER is a static-analysis tool for C and other languages, developed by Facebook and used by multiple large companies. It is strongly aimed at industry and the internal use at Facebook. Despite its popularity, there are no reported numbers on its precision and efficiency. With INFER-SV, we take a first step towards an objective comparison of INFER with other SV-COMP participants from academia and industry.
We sketch a sequentialization-based technique for bounded detection of data races under sequential consistency, and summarise the major improvements to our verification framework over the last years.
ISBN:
(纸本)9783030995270;9783030995263
We sketch a sequentialization-based technique for bounded detection of data races under sequential consistency, and summarise the major improvements to our verification framework over the last years.
GDART is an ensemble of tools allowing dynamic symbolic execution of JVM programs. the dynamic symbolic execution engine is decomposed into three different components: a symbolic decision engine (DSE), a concolic exec...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
GDART is an ensemble of tools allowing dynamic symbolic execution of JVM programs. the dynamic symbolic execution engine is decomposed into three different components: a symbolic decision engine (DSE), a concolic executor (SPouT), and a SMT solver backend allowing meta-strategy solving of SMT problems (JConstraints). the symbolic decision component is loosely coupled withthe executor by a newly introduced communication protocol. At SV-COMP 2022, GDART solved 471 of 586 tasks finding more correct false results (302) than correct true results (169). It scored fourth place.
Structural and flow approaches to the vulnerability analysis of multilayer network systems (MLNS) from targeted attacks and non-target lesions of various origins are considered. Local and global structural and flow ch...
详细信息
A cybersecurity method of combining IMECA analysis with penetration testing for the safety assessment of industrial robotic systems has been presented and described using the functional IDEF model. this paper addresse...
详细信息
ISBN:
(纸本)9798350333046
A cybersecurity method of combining IMECA analysis with penetration testing for the safety assessment of industrial robotic systems has been presented and described using the functional IDEF model. this paper addresses industrial robotic system architecture using a collaborative robot as an example. the set of vulnerabilities and their potential impact on the robotic system under cyberattacks was assessed using IMECA (Intrusion Modes and Criticality analysis) technique. the assessment results have been summarized in the critical matrix. Further steps and the necessary tools for performing penetration testing of the industrial robotic system were suggested.
the substation of the mining and processing plant is presented as a cyber-physical system (CPS). the use of the main principles of CPS construction for the rational regulation of reactive power flows in the main step-...
详细信息
Understanding the mechanics of aquatic locomotion has been an active field of research for decades and continues to inspire technological solutions ranging from small-scale propulsion systems for autonomous underwater...
详细信息
Understanding the mechanics of aquatic locomotion has been an active field of research for decades and continues to inspire technological solutions ranging from small-scale propulsion systems for autonomous underwater vehicles (AUVs) to larger-scale energy saving devices (ESDs) for ships. the bio-inspired thrust-producing kinematics are shared among most flapping-foil systems, however joint experimental and numerical research suggests that incorporating additional biomimetic features, such as hydrodynamic shape and elasticity, in new designs can enhance the efficiency. Focusing on the latter, the response of passively deforming wings is implicitly non-linear, since deformations affect the hydrodynamic load excitation and vice-versa. therefore, fluid-structure interaction simulations are essential for accurate predictions of the wings' response. In the present work, a cost-effective computational tool is proposed for the hydroelastic analysis of flexible flapping-foil thrusters, which consists of a 3-D unsteady boundary element method (BEM) weakly coupled with a finite element solver ( FEM) based on plate elements. the verification of the present method is accomplished by means of comparison against experimental data from the literature. the prediction capabilities and the limitations of the weakly coupled BEM-FEM are discussed. Finally, the proposed numerical tools serve as the building blocks for the fully coupled BEM-FEM scheme that is currently under development.
this paper showcases PoQuAD - a SQuAD-like contribution to building Question Answering tools for Polish. It largely follows the usual Machine Reading Comprehension format, but a few innovations are added, the key ones...
详细信息
Fall-from-heights have historically been the major cause of fatalities in the construction sector, accounting for around one-third of all fatalities in the construction industry. this type of risk can be prevented or ...
详细信息
暂无评论