Zum Hauptinhalt springen

Showing 1–9 of 9 results for author: Schoepp, U

Searching in archive cs. Search in all archives.
.
  1. Automated Security Findings Management: A Case Study in Industrial DevOps

    Authors: Markus Voggenreiter, Florian Angermeir, Fabiola Moyón, Ulrich Schöpp, Pierre Bonvin

    Abstract: In recent years, DevOps, the unification of development and operation workflows, has become a trend for the industrial software development lifecycle. Security activities turned into an essential field of application for DevOps principles as they are a fundamental part of secure software development in the industry. A common practice arising from this trend is the automation of security tests that… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  2. arXiv:2312.12057  [pdf, other

    cs.SE

    Monitoring Auditable Claims in the Cloud

    Authors: Lev Sorokin, Ulrich Schoepp

    Abstract: When deploying mission-critical systems in the cloud, where deviations may have severe consequences, the assurance of critical decisions becomes essential. Typical cloud systems are operated by third parties and are built on complex software stacks consisting of e.g., Kubernetes, Istio, or Kafka, which due to their size are difficult to be verified. Nevertheless, one needs to make sure that missio… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

  3. arXiv:2212.12347  [pdf, other

    cs.LO

    Technical Report: Automating Vehicle SOA Threat Analysis using a Model-Based Methodology

    Authors: Yuri Gil Dantas, Simon Barner, Pei Ke, Vivek Nigam, Ulrich Schoepp

    Abstract: While the adoption of Service-Oriented Architectures (SOA) eases the implementation of features such as autonomous driving and over-the-air updates, it also increases the vehicle's exposure to attacks that may place road-users in harm. To address this problem, standards (ISO 21434/UNECE) expect manufacturers to produce security arguments and evidence by carrying out appropriate threat analysis. As… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

  4. arXiv:2209.02147  [pdf, ps, other

    cs.PL cs.LO

    Inferring Region Types via an Abstract Notion of Environment Transformation

    Authors: Ulrich Schöpp, Chuangjie Xu

    Abstract: Region-based type systems are a powerful tool for various kinds of program analysis. We introduce a new inference algorithm for region types based on an abstract notion of environment transformation. It analyzes the code of a method only once, even when there are multiple invocations of the method of different region types in the program. Elements of such an abstract transformation are essentially… ▽ More

    Submitted 7 September, 2022; v1 submitted 5 September, 2022; originally announced September 2022.

    Comments: To appear at APLAS'22; arXiv version contains appendices on the construction of concatenation and join for abstract transformations and an example of type inference

    MSC Class: 68Q60 ACM Class: F.3.1

  5. arXiv:2206.02831  [pdf, ps, other

    cs.LO cs.PL

    A Category Theoretic View of Contextual Types: from Simple Types to Dependent Types

    Authors: Jason Z. S. Hu, Brigitte Pientka, Ulrich Schöpp

    Abstract: We describe the categorical semantics for a simply typed variant and a simplified dependently typed variant of Cocon, a contextual modal type theory where the box modality mediates between the weak function space that is used to represent higher-order abstract syntax (HOAS) trees and the strong function space that describes (recursive) computations about them. What makes Cocon different from stand… ▽ More

    Submitted 7 June, 2022; v1 submitted 6 June, 2022; originally announced June 2022.

    ACM Class: F.4.1

  6. Using a Semantic Knowledge Base to Improve the Management of Security Reports in Industrial DevOps Projects

    Authors: Markus Voggenreiter, Ulrich Schöpp

    Abstract: Integrating security activities into the software development lifecycle to detect security flaws is essential for any project. These activities produce reports that must be managed and looped back to project stakeholders like developers to enable security improvements. This so-called Feedback Loop is a crucial part of any project and is required by various industrial security standards and models.… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: Preprint

    ACM Class: D.2.0

  7. arXiv:2202.12443  [pdf, other

    cs.AI cs.LG

    Towards an Accountable and Reproducible Federated Learning: A FactSheets Approach

    Authors: Nathalie Baracaldo, Ali Anwar, Mark Purcell, Ambrish Rawat, Mathieu Sinn, Bashar Altakrouri, Dian Balta, Mahdi Sellami, Peter Kuhn, Ulrich Schopp, Matthias Buchinger

    Abstract: Federated Learning (FL) is a novel paradigm for the shared training of models based on decentralized and private data. With respect to ethical guidelines, FL is promising regarding privacy, but needs to excel vis-à-vis transparency and trustworthiness. In particular, FL has to address the accountability of the parties involved and their adherence to rules, law and principles. We introduce AF^2 Fra… ▽ More

    Submitted 24 February, 2022; originally announced February 2022.

    Comments: 16 pages, 4 figures, 2 tables

  8. Type-based Enforcement of Infinitary Trace Properties for Java

    Authors: Serdar Erbatur, Ulrich Schöpp, Chuangjie Xu

    Abstract: A common approach to improve software quality is to use programming guidelines to avoid common kinds of errors. In this paper, we consider the problem of enforcing guidelines for Featherweight Java (FJ). We formalize guidelines as sets of finite or infinite execution traces and develop a region-based type and effect system for FJ that can enforce such guidelines. We build on the work by Erbatur, H… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: main part (14 pages) published at PPDP'21; arXiv version contains an appendix on the FJ operational semantics and the extension to support exception handling (15 pages total)

    MSC Class: 68Q60 ACM Class: F.3.1

  9. On the Relation of Interaction Semantics to Continuations and Defunctionalization

    Authors: Ulrich Schöpp

    Abstract: In game semantics and related approaches to programming language semantics, programs are modelled by interaction dialogues. Such models have recently been used in the design of new compilation methods, e.g. for hardware synthesis or for programming with sublinear space. This paper relates such semantically motivated non-standard compilation methods to more standard techniques in the compilation of… ▽ More

    Submitted 14 December, 2014; v1 submitted 18 October, 2014; originally announced October 2014.

    Journal ref: Logical Methods in Computer Science, Volume 10, Issue 4 (December 16, 2014) lmcs:977