Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Nigam, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.17338  [pdf, other

    cs.SE

    Towards an Approach to Pattern-based Domain-Specific Requirements Engineering

    Authors: T. Chuprina, D. Méndez, V. Nigam, M. Reich, A. Schweiger

    Abstract: Requirements specification patterns have received much attention as they promise to guide the structured specification of natural language requirements. By using them, the intention is to reduce quality problems related to requirements artifacts. Patterns may need to vary in their syntax (e.g. domain details/ parameter incorporation) and semantics according to the particularities of the applicatio… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

    Comments: 6 pages with 3 figures

    ACM Class: D.2.1

  2. arXiv:2304.11564  [pdf, other

    cs.LO cs.SE

    Technical-Report: Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures

    Authors: Vivek Nigam, Carolyn Talcott

    Abstract: Cyber-physical systems (CPSes), such as autonomous vehicles, use sophisticated components like ML-based controllers. It is difficult to provide evidence about the safe functioning of such components. To overcome this problem, Runtime Assurance Architecture (RTA) solutions have been proposed. The \RAP's decision component evaluates the system's safety risk and whenever the risk is higher than accep… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

  3. arXiv:2212.12347  [pdf, other

    cs.LO

    Technical Report: Automating Vehicle SOA Threat Analysis using a Model-Based Methodology

    Authors: Yuri Gil Dantas, Simon Barner, Pei Ke, Vivek Nigam, Ulrich Schoepp

    Abstract: While the adoption of Service-Oriented Architectures (SOA) eases the implementation of features such as autonomous driving and over-the-air updates, it also increases the vehicle's exposure to attacks that may place road-users in harm. To address this problem, standards (ISO 21434/UNECE) expect manufacturers to produce security arguments and evidence by carrying out appropriate threat analysis. As… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

  4. arXiv:2201.10563  [pdf, other

    cs.LO

    Automating Safety and Security Co-Design through Semantically-Rich Architecture Patterns

    Authors: Yuri Gil Dantas, Vivek Nigam

    Abstract: During the design of safety-critical systems, safety and security engineers make use of architecture patterns, such as Watchdog and Firewall, to address identified failures and threats. Often, however, the deployment of safety patterns has consequences on security, e.g., the deployment of a safety pattern may lead to new threats. The other way around may also be possible, i.e., the deployment of a… ▽ More

    Submitted 27 February, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

  5. arXiv:2105.03531  [pdf, other

    cs.CC cs.LO

    On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: This paper develops a Multiset Rewriting language with explicit time for the specification and analysis of Time-Sensitive Distributed Systems (TSDS). Goals are often specified using explicit time constraints. A good trace is an infinite trace in which the goals are satisfied perpetually despite possible interference from the environment. In our previous work (FORMATS 2016), we discussed two desira… ▽ More

    Submitted 14 September, 2021; v1 submitted 7 May, 2021; originally announced May 2021.

    Comments: This Technical Report updates and subsumes the technical report arXiv:1606.07886. arXiv admin note: text overlap with arXiv:1606.07886

  6. arXiv:2012.15080  [pdf, other

    cs.CR cs.LO

    Security Engineering for ISO 21434

    Authors: Yuri Gil Dantas, Vivek Nigam, Harald Ruess

    Abstract: The ISO 21434 is a new standard that has been proposed to address the future challenges of automotive cybersecurity. This white paper takes a closer look at the ISO 21434 helping engineers to understand the ISO 21434 parts, the key activities to be carried out and the main artefacts that shall be produced. As any certification, obtaining the ISO 21434 certification can be daunting at first sight.… ▽ More

    Submitted 17 January, 2021; v1 submitted 30 December, 2020; originally announced December 2020.

    Comments: This is a White Paper. This is a preliminary version. Its figures and template are to be finalized by our marketing department. V3 corrects a number of typos

    ACM Class: I.2.4; I.2.5

  7. arXiv:2009.10251  [pdf, other

    eess.SY cs.CR cs.FL cs.LO

    Less Manual Work for Safety Engineers: Towards an Automated Safety Reasoning with Safety Patterns

    Authors: Yuri Gil Dantas, Antoaneta Kondeva, Vivek Nigam

    Abstract: The development of safety-critical systems requires the control of hazards that can potentially cause harm. To this end, safety engineers rely during the development phase on architectural solutions, called safety patterns, such as safety monitors, voters, and watchdogs. The goal of these patterns is to control (identified) faults that can trigger hazards. Safety patterns can control such faults b… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Comments: In Proceedings ICLP 2020, arXiv:2009.09158

    Journal ref: EPTCS 325, 2020, pp. 244-257

  8. arXiv:1811.04826  [pdf, other

    cs.CC cs.LO

    Compliance in Real Time Multiset Rewriting Models

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: The notion of compliance in Multiset Rewriting Models (MSR) has been introduced for untimed models and for models with discrete time. In this paper we revisit the notion of compliance and adapt it to fit with additional nondeterminism specific for dense time domains. Existing MSR with dense time are extended with critical configurations and non-critical traces, that is, traces involving no critica… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

  9. arXiv:1810.04866  [pdf, other

    cs.LO cs.SE

    Model-Based Safety and Security Engineering

    Authors: Vivek Nigam, Alexander Pretschner, Harald Ruess

    Abstract: By exploiting the increasing surface attack of systems, cyber-attacks can cause catastrophic events, such as, remotely disable safety mechanisms. This means that in order to avoid hazards, safety and security need to be integrated, exchanging information, such as, key hazards/threats, risk evaluations, mechanisms used. This white paper describes some steps towards this integration by using models.… ▽ More

    Submitted 2 January, 2019; v1 submitted 11 October, 2018; originally announced October 2018.

    Comments: White paper on Safety and Security Engineering using Models

  10. arXiv:1806.02000  [pdf, other

    cs.NI

    Automating Network Error Detection using Long-Short Term Memory Networks

    Authors: Moin Nadeem, Vibhor Nigam, Dimosthenis Anagnostopoulos, Patrick Carretas

    Abstract: In this work, we investigate the current flaws with identifying network-related errors, and examine how K-Means and Long-Short Term Memory Networks solve these problems. We demonstrate that K-Means is able to classify messages, but not necessary provide meaningful clusters. However, Long-Short Term Memory Networks are able to meet our goals of providing an intelligent clustering of messages by gro… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

  11. arXiv:1801.04066  [pdf, other

    cs.LO

    Symbolic Timed Observational Equivalence

    Authors: Vivek Nigam, Carolyn Talcott, Abrãao Aires Urquiza

    Abstract: Intruders can infer properties of a system by measuring the time it takes for the system to respond to some request of a given protocol, that is, by exploiting time side channels. These properties may help intruders distinguish whether a system is a honeypot or concrete system helping him avoid defense mechanisms, or track a user among others violating his privacy. Observational equivalence is the… ▽ More

    Submitted 17 December, 2018; v1 submitted 12 January, 2018; originally announced January 2018.

    Comments: New version with corrected Typos, improved motivation, explanation, better notation

  12. arXiv:1709.04162  [pdf, other

    cs.NI cs.CR cs.LO

    On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks

    Authors: Marcilio O. O. Lemos, Yuri Gil Dantas, Iguatemi E. Fonseca, Vivek Nigam

    Abstract: Telephony Denial of Service (TDoS) attacks target telephony services, such as Voice over IP (VoIP), not allowing legitimate users to make calls. There are few defenses that attempt to mitigate TDoS attacks, most of them using IP filtering, with limited applicability. In our previous work, we proposed to use selective strategies for mitigating HTTP Application-Layer DDoS Attacks demonstrating their… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

  13. Proof-Relevant Logical Relations for Name Generation

    Authors: Nick Benton, Martin Hofmann, Vivek Nigam

    Abstract: Pitts and Stark's $ν$-calculus is a paradigmatic total language for studying the problem of contextual equivalence in higher-order languages with name generation. Models for the $ν$-calculus that validate basic equivalences concerning names may be constructed using functor categories or nominal sets, with a dynamic allocation monad used to model computations that may allocate fresh names. If recur… ▽ More

    Submitted 29 March, 2018; v1 submitted 17 August, 2017; originally announced August 2017.

    Journal ref: Logical Methods in Computer Science, Volume 14, Issue 1 (March 30, 2018) lmcs:4391

  14. Time, Computational Complexity, and Probability in the Analysis of Distance-Bounding Protocols

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and… ▽ More

    Submitted 4 October, 2017; v1 submitted 12 February, 2017; originally announced February 2017.

    Comments: Extending our POST 2015 paper

  15. arXiv:1606.07886  [pdf, other

    cs.LO

    Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems

    Authors: Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott

    Abstract: Time-Sensitive Distributed Systems (TSDS), such as applications using autonomous drones, achieve goals under possible environment interference (\eg, winds). Moreover, goals are often specified using explicit time constraints which must be satisfied by the system \emph{perpetually}. For example, drones carrying out the surveillance of some area must always have \emph{recent pictures}, \ie, at most… ▽ More

    Submitted 2 July, 2024; v1 submitted 25 June, 2016; originally announced June 2016.

    Comments: Updated version with corrected proofs

  16. arXiv:1605.08563  [pdf, other

    cs.CR cs.LO

    Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders

    Authors: Vivek Nigam, Carolyn Talcott, Abraão Aires Urquiza

    Abstract: Timed Intruder Models have been proposed for the verification of Cyber-Physical Security Protocols (CPSP) amending the traditional Dolev-Yao intruder to obey the physical restrictions of the environment. Since to learn a message, a Timed Intruder needs to wait for a message to arrive, mounting an attack may depend on where Timed Intruders are. It may well be the case that in the presence of a grea… ▽ More

    Submitted 27 May, 2016; originally announced May 2016.

    Comments: 19 pages

    MSC Class: 68Q60

  17. Towards the Automated Generation of Focused Proof Systems

    Authors: Vivek Nigam, Giselle Reis, Leonardo Lima

    Abstract: This paper tackles the problem of formulating and proving the completeness of focused-like proof systems in an automated fashion. Focusing is a discipline on proofs which structures them into phases in order to reduce proof search non-determinism. We demonstrate that it is possible to construct a complete focused proof system from a given un-focused proof system if it satisfies some conditions. Ou… ▽ More

    Submitted 13 November, 2015; originally announced November 2015.

    Comments: In Proceedings WoF'15, arXiv:1511.02529

    Journal ref: EPTCS 197, 2015, pp. 1-6

  18. arXiv:1510.02419  [pdf, other

    cs.PL cs.LO

    Effect-Dependent Transformations for Concurrent Programs

    Authors: Nick Benton, Martin Hofmann, Vivek Nigam

    Abstract: We describe a denotational semantics for an abstract effect system for a higher-order, shared-variable concurrent programming language. We prove the soundness of a number of general effect-based program equivalences, including a parallelization equation that specifies sufficient conditions for replacing sequential composition with parallel composition. Effect annotations are relative to abstract l… ▽ More

    Submitted 8 October, 2015; originally announced October 2015.

  19. A Proof Theoretic Study of Soft Concurrent Constraint Programming

    Authors: Elaine Pimentel, Carlos Olarte, Vivek Nigam

    Abstract: Concurrent Constraint Programming (CCP) is a simple and powerful model for concurrency where agents interact by telling and asking constraints. Since their inception, CCP-languages have been designed for having a strong connection to logic. In fact, the underlying constraint system can be built from a suitable fragment of intuitionistic (linear) logic --ILL-- and processes can be interpreted as fo… ▽ More

    Submitted 9 May, 2014; originally announced May 2014.

    ACM Class: F.3.1; D.3.2

    Journal ref: Theory and Practice of Logic Programming 14 (2014) 649-663

  20. arXiv:1212.5692  [pdf, ps, other

    cs.PL cs.LO

    Abstract Effects and Proof-Relevant Logical Relations

    Authors: Nick Benton, Martin Hofmann, Vivek Nigam

    Abstract: We introduce a novel variant of logical relations that maps types not merely to partial equivalence relations on values, as is commonly done, but rather to a proof-relevant generalisation thereof, namely setoids. The objects of a setoid establish that values inhabit semantic types, whilst its morphisms are understood as proofs of semantic equivalence. The transition to proof-relevance solves two w… ▽ More

    Submitted 22 December, 2012; originally announced December 2012.

    ACM Class: D.3.3; F.3.2