Cyber-Physical Systems (CPS) are a logical step towards integrating classical IT systems further into physical or virtual surroundings. In consequence this means that CPS will be targets for new security threats, e.g....
详细信息
Cyber-Physical Systems (CPS) are a logical step towards integrating classical IT systems further into physical or virtual surroundings. In consequence this means that CPS will be targets for new security threats, e.g. by manipulating the system both at the IT system level and within its surroundings. In this paper, we first discuss these new types of security threats before suggesting a novel system architecture that extends ideas from the domain of Organic computing. Finally, we present a research agenda towards building future secure CPS.
IT artifacts often take the role of a trustee in a trust relationship between users and IT artifacts. The goal of this paper is to increase the understanding of the formation of trust in such trust relationships. Inst...
详细信息
ISBN:
(纸本)9781627486040
IT artifacts often take the role of a trustee in a trust relationship between users and IT artifacts. The goal of this paper is to increase the understanding of the formation of trust in such trust relationships. Instead of using the predominant theoretical foundation of interpersonal trust, we use the theoretical foundation of trust in automation from the HCI discipline for studying the formation of trust. Since we aim at creating insights on the formation of trust and its dimensions, we develop a formative first-order, formative second-order measurement model for trust. To evaluate the impact of the single indicators and dimensions on trust, we conduct a laboratory experiment. Our results show that the dimensions performance, process and purpose have a comparable impact on trust, and that indicators related to user data are especially important. The results complement existing insights, deepening the understanding of the formation of trust in IT artifacts.
For large installations of networked embedded systems it is important that each entity is self-stabilizing, because usually there is nobody to restart nodes that have hung up. Self-stabilization means to recover from ...
详细信息
For large installations of networked embedded systems it is important that each entity is self-stabilizing, because usually there is nobody to restart nodes that have hung up. Self-stabilization means to recover from temporary failures (soft errors) and adapt to a change of network topology caused by permanent failures. On the software side self-stabilizing algorithms must assume that the hardware is executing the software correctly. In this paper we discuss cases in which soft errors invalidate this assumption, especially in cases where CPU registers or the watchdog timer are affected by the fault. Based on the observation that a guaranteed self-stabilization is only possible as long as the watchdog-timer is working properly after temporary failures, we propose and compare three different approaches that meet the requirements of sensor networks, to solve this problem with a combination of hardware- and software-modifications: 1) A run-time verification of every watchdog access 2) A completely hardware-based approach, without any software modifications 3) A 2 X byte code alignment, to realign a corrupted program counter Furthermore we determine the average code-size increase and evaluate necessary hardware-modifications that come along with each approach.
暂无评论