作者:
Yang, ShuoLi, HongruGuo, JianECNU
MoE Engn Res Ctr Software Hardware Codesign Technol & Applicat Shanghai Peoples R China ECNU
Shanghai Trusted Ind Internet Software Collaborat Shanghai Peoples R China ECNU
Xinjiang Teachers Coll Shanghai Peoples R China ECNU
Natl Trusted Embedded Software Engn Technol Res C Shanghai Peoples R China
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applicati...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applications, ROS2 is replacing ROS1 at a rapid pace, and its security issues have direct implications for the security of robot systems. This paper presents an exploration and study of the communication security issues of ROS2 by combining CIA triad with the ROS2 communication mechanism. We propose the fundamental security requirements of the ROS2 system under different communication mechanisms and provide formal modeling and definition. Moreover, we classify and analyze network attacks at the ROS2 level and implement a tool, ROS2Tester, to conduct modeling the ROS2 formal security modules, penetration testing and evaluating the security of ROS2 systems.
Computational notebooks have become the go-to way for solving data-science problems. While they are designed to combine code and documentation, prior work shows that documentation is largely ignored by the developers ...
详细信息
ISBN:
(纸本)9798350329964
Computational notebooks have become the go-to way for solving data-science problems. While they are designed to combine code and documentation, prior work shows that documentation is largely ignored by the developers because of the manual effort. Automated documentation generation can help, but existing techniques fail to capture algorithmic details and developers often end up editing the generated text to provide more explanation and sub-steps. This paper proposes a novel machine-learning pipeline, Cell2Doc, for code cell documentation in Python data science notebooks. Our approach works by identifying different logical contexts within a code cell, generating documentation for them separately, and finally combining them to arrive at the documentation for the entire code cell. Cell2Doc takes advantage of the capabilities of existing pre-trained language models and improves their efficiency for code cell documentation. We also provide a new benchmark dataset for this task, along with a data-preprocessing pipeline that can be used to create new datasets. We also investigate an appropriate input representation for this task. Our automated evaluation suggests that our best input representation improves the pre-trained model's performance by 2.5x on average. Further, Cell2Doc achieves 1.33x improvement during human evaluation in terms of correctness, informativeness, and readability against the corresponding standalone pre-trained model.
The 13th edition of the Competition on software Verification (SV-COMP 2024) was the largest competition of its kind so far: A total of 76 tools for verification and witness validation were compared. The competition ev...
详细信息
ISBN:
(纸本)9783031572555;9783031572562
The 13th edition of the Competition on software Verification (SV-COMP 2024) was the largest competition of its kind so far: A total of 76 tools for verification and witness validation were compared. The competition evaluated 59 verification systems and 17 validation systems from 34 teams from 12 countries. This yields a good overview of the state of the art in tools for software verification. The competition was executed on a benchmark set with 30 300 verification tasks for C programs and 587 verification tasks for Java programs. The specifications again included reachability, memory safety, overflows, and termination. This year was the second time that the competition had an extra competition track on witness validation. We introduced a new witness format 2.0, and a new scoring schema for the validation track. All meta data about the verification and validation tools are available in the FM-Tools repository.
The creation and discovery of pharmaceuticals may be considered the most important translational science activity that improves human invulnerability and happiness. In the pharmaceutical sector, strategies to reduce c...
详细信息
This paper designs the data acquisition and data encryption storage system of car CAN bus based on the Internet of vehicles. The system through the Internet of vehicles data acquisition process design, data informatio...
详细信息
Malware propagation is a significant cybersecurity threat, with malicious software such as viruses, worms, and ransomware capable of spreading rapidly across networks. Traditional deterministic models, often based on ...
详细信息
As blockchain technology progresses, the deployment of smart contracts has become increasingly prevalent. Despite their growing popularity, smart contracts introduce substantial security risks and vulnerabilities. Pre...
详细信息
In various cases, like social robotics, psychological research, and human-computer interaction, highly accurate real-time facial emotional recognition is highly desirable. Nonetheless, current methods suffer from a lo...
详细信息
With the ongoing advancements in science and technology and the increasing research focus on cancer-related issues, there has been a proliferation of omics-related resources for in-depth analysis and exploration. This...
详细信息
The objective of this research is to enhance sound field rendering efficiency using a heterogeneous computing framework. By integrating GPU and CPU resources, we address performance challenges in complex environments ...
详细信息
暂无评论