Andrea Bondavalli - IEEE Xplore Author Profile

Showing 1-25 of 151 results

Filter Results

Show

Results

Domain experts are desperately looking to solve decision-making problems by designing and training Machine Learning algorithms that can perform classification with the highest possible accuracy. No matter how hard they try, classifiers will always be prone to misclassifications due to a variety of reasons that make the decision boundary unclear. This complicates the integration of classifiers into...Show More
To achieve confidence in safety-critical systems, requires among others to meet high requirements on online testing of computer systems, as dictated by safety standards such as ISO26262, IEC61508, and CENELEC EN 5012X. Online testing can be performed through the periodic execution of online SW Test Libraries, which are widely used in safety-related applications as a valuable safety mechanism to pr...Show More
The class of Trustworthy Autonomous Systems (TAS) includes cyber-physical systems leveraging on self-x technologies that make them capable to learn, adapt to changes, and reason under uncertainties in possibly critical applications and evolving environments. In the last decade, there has been a growing interest in enabling artificial intelligence technologies, such as advanced machine learning, ne...Show More
With the growing processing power of computing systems and the increasing availability of massive datasets, machine learning algorithms have led to major breakthroughs in many different areas. This applies also to resource-constrained IoT and edge devices, which will often benefit from relatively small – but smart – local anomaly detection tasks that aim at protecting the device, or the informatio...Show More
Graphics Processing Units (GPUs), originally developed for computer graphics, are now commonly used to accelerate parallel applications. Given that GPUs are designed to be as efficient as possible, evaluating their performance is crucial. This problem has been tackled in the last years by researchers that started to propose solutions such as analytical models and digital simulators, which are, how...Show More
The increase in connectivity and the continued need to evolve existing systems impose on system engineers the reality of dealing with System of Systems (SoS) concept in practice. The composition of legacy systems presents significant challenges, especially when a Cyber-Physical System (CPS) is involved. Due to the complexity of the interactions between CPS computational solutions and the physical ...Show More
Deep Neural Networks (DNNs) have become an enabling technology for building accurate image classifiers, and are increasingly being applied in many ICT systems such as autonomous vehicles. Unfortunately, classifiers can be deceived by images that are altered due to failures of the visual camera, preventing the proper execution of the classification process. Therefore, it is of utmost importance to ...Show More
Failures of the vehicle camera may compromise the correct acquisition of frames, that are subsequently used by autonomous driving tasks. A clear understanding of the behavior of the autonomous driving tasks under such failure conditions, together with strategies to avoid safety is jeopardized, are indeed necessary. This study analyses and improve the performance of Traffic Sign Recognition (TSR) s...Show More
General Purpose GPUs (GPGPUs) are highly susceptible to both transient and permanent faults. This is a serious concern for their safe and reliable usage in many domains, from autonomous driving to High Performance Computing. The research and industrial community responded fiercely to this issue, by analyzing failures impact and devising failure mitigation strategies. This led to the definition of ...Show More
Manufacturers are willing to incorporate Machine Learning (ML) algorithms into their systems, especially those considered as Safety-Critical Systems (SCS). ML algorithms that perform binary classification (i.e., Binary Classifiers (BCs)) find a wide applicability as error, intrusion or failure detectors, provided that their performance complies with SCS safety requirements. However, the performanc...Show More
Model-based evaluation is extensively used to estimate the performance and reliability of dependable systems. Traditionally, these systems were small and self-contained, and the main challenge for model-based evaluation has been the efficiency of the solution process. Recently, the problem of specifying and maintaining complex models has increasingly gained attention, as modern systems are charact...Show More
An anomaly-based Intrusion Detection System (IDS) consists of a monitor and a binary classifier, in which monitored system indicators are fed into a Machine Learning (ML) algorithm that detects anomalies due to attacks. Building such an IDS for a target system requires first to define a strategy to monitor features, then to select and evaluate many ML algorithms to find the most suitable candidate...Show More
Recent years have seen an astounding growth in the adoption of Machine Learning algorithms to classify data gathered through monitoring activities. Those algorithms can effectively classify data as system indicators, network packets, and logs according to a model they infer during training. This way, they provide sophisticated means to conduct intrusion detection by suspecting anomalies due to att...Show More
In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characterized. Instead, new unknown threats, often referred ...Show More
Anomaly detection can infer the presence of errors without observing the target services, but detecting variations in the observable parts of the system on which the services reside. This is a promising technique in complex software-intensive systems, because either instrumenting the services' internals is exceedingly time-consuming, or encapsulation makes them not accessible. Unfortunately, in su...Show More
Blockchain technology is having an ever-increasing impact on distributed applications domain, since the adoption of Blockchain 2.0 led to the spread of smart contracts. In such a context, Ethereum is the framework with the highest diffusion in terms of smart contract's development, with a consequent rise of exploitation of code vulnerabilities, some of which causing bad financial losses. For this ...Show More
Anomaly detection aims at identifying patterns in data that do not conform to the expected behavior, relying on machine-learning algorithms that are suited for binary classification. It has been arising as one of the most promising techniques to suspect intrusions, zero-day attacks and, under certain conditions, failures. This tutorial aims to instruct the attendees to the principles, application ...Show More
One of the main challenges in integrating CyberPhysical System-of-Systems (CPSoS) to function as a single unified system is the autonomy of its Cyber-Physical Systems (CPSs), which may lead to lack of coordination among CPSs and results in various kinds of conflicts. We advocate that to efficiently integrate CPSs within the CPSoS, we may need to adjust the autonomy of some CPSs in a way that allow...Show More
Dependability and performance analysis of modern systems is facing great challenges: their scale is growing, they are becoming massively distributed, interconnected, and evolving. Such complexity makes model-based assessment a difficult and time-consuming task. For the evaluation of large systems, reusable submodels are typically adopted as an effective way to address the complexity and to improve...Show More
Current solutions for tramway Interlocking Systems are based on physical sensors (balizes) distributed along the infrastructure which detect passing of the trams and trigger different actions. This approach is not easily scalable and maintainable, and it is costly. The Regional Project SISTER aims at designing new architectural solutions for addressing the previous problems based on the virtualiza...Show More
Different communication protocols are currently being used for the railway domain. However, most of these protocols rely on many interlacing mechanisms and safety codes which raise their complexity. Therefore, companies operating in the railway domain, guided by the Italian railway network manager, devised the Protocollo Vitale Standard, a light network protocol that stems from the Euroradio and R...Show More
Anomaly detection aims at identifying patterns in data that do not conform to the expected behavior. Despite anomaly detection has been arising as one of the most powerful techniques to suspect attacks or failures, dedicated support for the experimental evaluation is actually scarce. In fact, existing frameworks are mostly intended for the broad purposes of data mining and machine learning. Intuit...Show More
The ability of Machine Learning (ML) algorithms to learn and work with incomplete knowledge has motivated many system manufacturers to include such algorithms in their products. However, some of these systems can be described as Safety-Critical Systems (SCS) since their failure may cause injury or even death to humans. Therefore, the performance of ML algorithms with respect to the safety requirem...Show More
Nowadays, most developed countries need to optimize their electricity production and consumption, which has led to the development of the Smart Grid (SG) concept. SG has a main objective of optimizing the generation, consumption, and management of electricity via information and communication technology. However, the vast amounts of information generated and processed in SG environments raise the ...Show More
The ability to fuse data from heterogeneous sources (such as Smart Meters etc.) in the low-voltage grid highly depends on the communication and data management infrastructure that allows an exchange of information between different grid assets. Failure or any attempt to attack this data fusion solution can lead to inefficient grid operation and in worst case even blackouts. Therefore, this paper d...Show More