Papers by Riccardo Bettati
2018 IEEE International Workshop on Information Forensics and Security (WIFS), 2018
In recent years, research efforts have been made to develop safe and secure environments for ARM ... more In recent years, research efforts have been made to develop safe and secure environments for ARM platform. The new ARMv8 architecture brought in security features by design. However, there are still some security problems with ARMv8. For example, on Cortex-A series, there are risks that the system is vulnerable to sidechannel attacks. One major category of side-channel attacks utilizes cache memory to obtain a victim's secret information. In the cache based side-channel attacks, an attacker measures a sequence of cache operations to obtain a victim's memory access information, deriving more sensitive information. The success of such attacks highly depends on accurate information about the victim's cache accesses. In this paper, we describe an innovative approach to defend against side-channel attack on Cortex-A series chips. We also considered the side-channel attacks in the context of using TrustZone protection on ARM. Our adaptive noise injection can significantly reduce the bandwidth of side-channel while maintaining an affordable system overhead. The proposed defense mechanisms can be used on ARM Cortex-A architecture. Our experimental evaluation and theoretical analysis show the effectiveness and efficiency of our proposed defense.
2017 IEEE Conference on Communications and Network Security (CNS), 2017
Cyber-Physical Systems (CPSs) are ubiquitous in power systems, transport and medical systems, and... more Cyber-Physical Systems (CPSs) are ubiquitous in power systems, transport and medical systems, and critical infrastructures. Current protocols and applications allow significant changes to a system to take place within a short time or small network footprint, which can be exploited by attackers to cause a great impact on the physical systems. This paper proposes adaptive Commensurate Response (CR) to narrow down the asymmetry between the cost of attacks and their impact through enforcing command footprints to be commensurate with their impact on the system. Such impact is measured by the change of the setpoint (changedriven CR) or the distance between the operating state and the critical state (criticality-driven CR). Change-driven CR is effective for setpoint attacks with big setpoint changes, and criticality-driven CR can be used to combat both setpoint attacks and actuation attacks. Our case study on automobile cruise control demonstrates that CR can effectively improve the system resilience and attack survivability while satisfying QoS requirements.
ArXiv, 2021
We propose Breath to Pair (B2P), a protocol for pairing and shared-key generation for wearable de... more We propose Breath to Pair (B2P), a protocol for pairing and shared-key generation for wearable devices that leverages the wearer’s respiration activity to ensure that the devices are part of the same body-area network. We assume that the devices exploit different types of sensors to extract and process the respiration signal. We illustrate B2P for the case of two devices that use respiratory inductance plethysmography (RIP) and accelerometer sensors, respectively. Allowing for different types of sensors in pairing allows us to include wearable devices that use a variety of different sensors. In practice, this form of sensor variety creates a number of challenges that limit the ability of the shared-key establishment algorithm to generate matching keys. The two main obstacles are the lack of synchronization across the devices and the need for correct noise-induced mismatches between the generated key bit-strings. B2P addresses the synchronization challenge by utilizing Change Point D...
International Journal of Software Engineering and Knowledge Engineering, 1996
This paper describes PERTS, a prototyping environment for real-time systems. PERTS provides a com... more This paper describes PERTS, a prototyping environment for real-time systems. PERTS provides a comprehensive set of design, validation, and simulation tools that are built on recent theoretical advances. It also provides software modules that implement wellknown and novel real-time scheduling algorithms, task and resource assignment algorithms, and resource access control protocols. Together, the tools and software modules support the systematic and rigorous evaluation of new designs, experimentation with alternative scheduling and resource management strategies, and the evaluation and validation of the resultant real-time system.
Lecture Notes in Computer Science, 1995
Abstract. There is considerable interest in the network community in supporting real-time multi-p... more Abstract. There is considerable interest in the network community in supporting real-time multi-party applications, such as video conferenc-ing. The Tenet Group at UC Berkeley and ICSI has designed and im-plemented protocols that provide quality o] service (QoS) ...
Seventh IEEE International Symposium onObject-Oriented Real-Time Distributed Computing, 2004. Proceedings.
In this paper we propose and evaluate a methodology for run-time fast software component migratio... more In this paper we propose and evaluate a methodology for run-time fast software component migration for application survivability in distributed real-time systems. For fast migration we focus on the two dominant factors; lightweight migration and proactive resource discovery. The former is to minimize the absolute amount of time required for migration and the latter is to provide a destination host information at the time of migration decision. The run-time software component is implemented as Java object whose class is defined by extending the unicast remote server class. The proactive resource discovery consists of Community protocol and associated algorithms. These two ideas have been implemented as a middleware that also provides a real-time job scheduler in JVM (Java Virtual Machine), and a naming server. Our analysis and simulation in a cluster computing environment show that the proactive resource discovery requires very low communication overhead while maintaining high effectiveness in finding available CPU resources. Our implementation and measurement show that run-time component migration based on our approach takes much less time compared to the approach based on reactive resource discovery.
11th IEEE Real Time and Embedded Technology and Applications Symposium
Component technology has become a central focus of software engineering in research and developme... more Component technology has become a central focus of software engineering in research and development. Reusability is a key factor that contributes to its success. The reuse of components can lead to a shortening of software development cycles and savings in software development costs. However, existing component models provide no support for real-time services and some real-time extensions of component models lack of consideration for reusability of components in providing real-time services. In this work, we develop a real-time component-based system that maintains the reusability of components.
Procedia Computer Science, 2014
A covert communications network is a connected, overlay, peer-to-peer network being used to suppo... more A covert communications network is a connected, overlay, peer-to-peer network being used to support communications within a group in which the survival of the group depends on (a) confidentiality and anonymity for communications, (b) concealment of participation in the network to both other members of the group and external eavesdroppers, and (c) resilience against disconnection. These requirements are much more stringent than for typical privacy and anonymity systems. In order to protect the network from subversion of individual nodes, neighbors of failed nodes have to be isolated from the network as well. Thus, all failures have to treated as neighborhood failures. Network membership is protected through topology management in order to limit each participant's knowledge of the network addresses (IP address, email address, etc.) of other participants. In this paper, we propose a measure for determining the suitability of random topologies for use in a covert communication network, and we use this measure to analyze the suitability of Erdös-Rényi Random Graphs for use in a covert communication network.
A large number of digital images are produced during the acquisition of video signals at signaliz... more A large number of digital images are produced during the acquisition of video signals at signalized intersection in an intelligent transportation system. Because of limited storage space and transmission bandwidth, the signals must be compressed effectively to satisfy application requirements in real time. We propose an improved Embedded Zerotree Wavelet algorithm to improve the wavelet compression performance by adopting image pretreatment, introducing dynamic threshold and adding new symbols. The experimental results show that the proposed algorithm improves both the effectiveness of data compression and its efficiency and so is well suited for real-time image acquisition, storage and transmission at signalized intersections.
In this paper, we design a real-time Java Remote Method Invocation (RMI). Real-time timing constr... more In this paper, we design a real-time Java Remote Method Invocation (RMI). Real-time timing constraints are preserved in a server centric fashion where Java RMI servers keep information for real-time guarantees. Remote method invocations are modeled as sporadic events and so treated by a Total Bandwidth server, a guaranteed-rate scheduler. The replenishment period of the Total Bandwidth server is determined probabilistically. According to our measurements, the overhead we added for implementing real-time capabilities is negligible and the latency of real-time RMI is very stable and predictable.
2006 27th IEEE International Real-Time Systems Symposium (RTSS'06), 2006
In this paper, we study temperature-constrained hard realtime systems, where real-time guarantees... more In this paper, we study temperature-constrained hard realtime systems, where real-time guarantees must be met without exceeding safe temperature levels within the processor. Dynamic speed scaling is one of the major techniques to manage power so as to maintain safe temperature levels. As example, we adopt a simple reactive speed control technique in our work. We design a methodology to perform delay analysis for general task arrivals under reactive speed control with First-In-First-Out (FIFO) scheduling and Static-Priority (SP) scheduling. As a special case, we obtain a close-form delay formula for the leakybucket task arrival model. Our data show how simple reactive speed control can decrease the delay of tasks compared with any constant-speed scheme.
ACM SIGBED Review, 2008
In our research, we study how real-time systems are affected by thermal management to satisfy the... more In our research, we study how real-time systems are affected by thermal management to satisfy the temperature constraint. In temperature-constrained real-time systems, deadline guarantees must be met without exceeding safe temperature level of the processor. While processor speed control is the most popular method of thermal management of systems, it eventually makes the task delays longer. In our study, we describe how to find the worst case execution considering speed control in temperature-constrained environment. With the worst case execution scenario, we study how the simple reactive speed scaling scheme can improve the processor utilization compared with any constant-speed scheme. For aperiodic tasks, it is briefly reviewed how the naive application of slack stealing leads to missed deadlines and the design-time slack allocation is proposed. A queueing model is presented to analyze the response time provided to aperiodic jobs and validated with results from a discrete-event simulator.
Proceedings of the IEEE 1998 National Aerospace and Electronics Conference. NAECON 1998. Celebrating 50 Years (Cat. No.98CH36185)
This paper focuses on connection management for mission critical real-time applications over ATM ... more This paper focuses on connection management for mission critical real-time applications over ATM networks. Traditional connection management generally requires Quality-of-Service (QoS) parameters to be specified as fixed values, and can only provide a QoS that is constant throughout the lifetime of an admitted connection. Such simplistic specification and consequent resource management offer no flexibility to user applications. The applications cannot receive the best possible QoS, and system resources are grossly under-utilized. We take an adaptive approach. With our adaptive connection management, QoS of connections is specified over a range of values. Resources are reallocated and redistributed in response to dynamic fluctuations in resource availability. With our adaptive strategy, we demonstrate dramatic improvements in both the offered QoS to applications, and the effective utilization of system resources. Our approach is practical and compatible with current networking standards. We have implemented adaptive connection management in a newer version of our real-time toolkit, NetEx. NetEx provides delay guaranteed communication services for mission critical real-time applications over high-speed networks. Yes No Reject Connection Admission Request (j, QoS j) Accept Delay computation d ≤ D ? Connection Termination Request (j) Return Resource Allocation Resource Release d: delay vector D: deadline vector j: the id of the connection to be set up/terminated; QoS j : QoS of connection j
Lecture Notes in Computer Science, 1996
The bandwith requirements of interactive multimedia applications are exhaustive, causing network ... more The bandwith requirements of interactive multimedia applications are exhaustive, causing network congestion to be a major problem. One way to deal with this problem is to use a resource reservation scheme, such as eg Tenet Scheme 2. This paper proposes a security ...
Proceedings of the IEEE, 1994
Shadow detection is critical for robust and reliable vision-based systems for traffic vision anal... more Shadow detection is critical for robust and reliable vision-based systems for traffic vision analysis. Shadow points are often misclassified as object points causing errors in localization, segmentation, tracking and classification of moving vehicles. This paper proposes a novel shadow elimination method SEBG for resolving shadow occlusion problems of vehicle analysis. Different from some traditional method which only consider intensity properties, this method introduces gradient feature to eliminate shadows. In this approach, moving foregrounds are first segmented from background by using a background subtraction technique. For all moving pixels, the approach SEBG using gradient feature to detect shadow pixels is presented in detail. This method is based on the observation that shadow regions present same textural characteristics in each frame of the video as in the corresponding adaptive background model. Gradient feature is robust to illumination changes. The method also needs no predefined parameters, which can well adapt to other video scene. Results validate the algorithm's good performance on traffic video.
Journal of Network and Computer Applications, 1999
With the explosive growth of demand for services on the Internet, the networking infrastructure (... more With the explosive growth of demand for services on the Internet, the networking infrastructure (routers, protocols, servers) is under considerable stress. Mechanisms are needed for current and future IP services to scale in a client-transparent way. We present HYDRANET, an infrastructure that allows to dynamically distribute IP services by placing service agents (caching agents, mirrors, replicas) that are under the server's control at strategic points in the internetwork. HYDRANET is based on replicating transport-level service access points for transparent distribution or replication of IP services. Measurements on a local testbed show that the overhead of our scheme is small. This replication scheme is widely applicable. We use HY-DRANET to implement HYDRAWEB, a system for active, push based, and client-transparent Web caching. Similarly, HYDRANET can be used to implement highly fault-tolerant servers or application-level gateways.
International Journal of Ad Hoc and Ubiquitous Computing, 2008
In this paper we address the problem for communications Quality of Service (QoS) in wireless netw... more In this paper we address the problem for communications Quality of Service (QoS) in wireless networks of Mobile Optical Free-space networks. We propose an architecture for end-to-end statistical delay guarantees. A delay model using the concept of virtual traffic accommodates variations in link capacity variations as well as transient outages. The QoS architecture uses an admission control technique that limits link utilisation for real-time traffic flows in order to reduce queuing delay. Admission control uses a 2-phase commit protocol for handling QoS negotiation and adaptation. We also present a mechanism for deploying QoS-enabled dependable TCP services in this network. The primary-backup TCP replication mechanism is supported by the routing infrastructure and improves server deployment transparency compared to previous work. We illustrate application performance improvement with simulation results.
… of the IASTED International Conference on …, 1999
Traditional host-resident protocol stacks are burdensome and often fail to keep pace with today's... more Traditional host-resident protocol stacks are burdensome and often fail to keep pace with today's high-speed network data movement. With the PANIC system (Protocols Aboard Network Interface Cards), we explore shifting all or part of the protocol processing to the network interface card (NIC). Our system allows us to deploy user-level protocols, or portions thereof, across a collection of machines. We have implemented a first prototype of PANIC over Myrinet, and experiments show the feasibility and efficiency of this approach.
ArXiv, 2021
With the growth of wearable devices, which are usually constrained in computational power and use... more With the growth of wearable devices, which are usually constrained in computational power and user interface, this pairing has to be autonomous. Considering devices that do not have prior information about each other, a secure communication should be established by generating a shared secret key derived from a common context between the devices. Context-based pairing solutions increase the usability of wearable device pairing by eliminating any human involvement in the pairing process. This is possible by utilizing onboard sensors (with the same sensing modalities) to capture a common physical context (e.g., body motion, gait, heartbeat, respiration, and EMG signal). A wide range of approaches has been proposed to address autonomous pairing in wearable devices. This paper surveys context-based pairing in wearable devices by focusing on the signals and sensors exploited. We review the steps needed for generating a common key and provide a survey of existing techniques utilized in eac...
Public reporting burden for this collection of information is estimated to average 1 hour per res... more Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Services, Directorate for Information Operations and Reports,
Uploads
Papers by Riccardo Bettati