[CPS-IoT Week Workshop] Provably Safe Perception in Cyber-Physical Systems

Deep Samal, Dung Tran, and Marilyn Wolf are organizing a new workshop at CPS-IoT Week this year: the International Workshop on Perception for Safety-Critical Cyber-Physical Systems (PerCPS ’23).  This workshop is intended to provide a bridge between machine learning for perception and cyber-physical systems. Perception is a critical capability for autonomous cyber-physical systems.  Cyber-physical automatons need to be able to…

[ICCPS’22] Best Paper: interpretable Detection of Distribution Shifts in Learning Enabled Cyber-Physical Systems

Introduction Autonomous systems with learning-enabled components (LECs) rely on deep neural networks in order to achieve high performance for various applications. It is well known that neural networks are vulnerable to distribution shifts (e.g., weather changes and adversarial perturbations). This vulnerability raises the safety and robustness concerns of learning-enabled cyber-physical systems (CPS) in the real world. For instance, in an…

The Methodological Pitfall of Dataset-Driven Research on Deep Learning in the IoT Space

We highlight a dangerous pitfall in the state-of-the-art evaluation methodology of deep learning algorithms, as applied in several CPS and IoT application spaces, where collecting data from physical experiments is difficult. The article is inspired by the real experiences of the authors. An extended version appears in the IoT-AE Workshop in conjunction with MILCOM 2022 [1]. Few would disagree today…

ML accelerates the cyber arms race — we need real security more than ever

Picture credit: Pixabay Machine learning is en vogue, being applied to many classes of problems. One of them is cybersecurity, where ML is used to find vulnerabilities in code, simulate attacks, and detect when an intruder has breached a system's defenses. Ignoring that intrusion detection is an admission of defeat (it comes into play when your system is already compromised!)…

The Toxic Culture of Rejection in Computer Science

Unlike most disciplines, in Computer Science, conference publications dominate over journals, and program committees carry out the bulk of the peer reviewing.  Serving on a PC is a yeoman’s service, and the community owes them a debt of gratitude. However, I believe that a toxic culture has emerged. This blog is a call for PCs to change their priorities. We…

[RTAS ’22 Best Student Paper] FlyOS: Integrated Modular Avionics for Autonomous Multicopters

“FlyOS: Integrated Modular Avionics for Autonomous Multicopters” by Anam Farrukh and Richard West won the best student paper award from amongst the outstanding category of papers at the 28th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS) in 2022. This blog post gives an overview of the work.  From Federated to Integrated Architectures Traditionally, flight management systems across all…

RTAS’22 Trip Report

Milan Cathedral is the largest Gothic cathedral in the world Welcome to the trip report on the 28th IEEE International Symposium on Real-Time and Embedded Technology and Applications Symposium (RTAS'22)! For the third time, our travel route does neither include planes nor trains but only a short walk to our desks. Due to the tapering pandemic, the General Chair Nan Guan had to…

Strong Isolation and Cyber-Security for Mixed-Criticality Cyber-Physical Systems

A story heard thousands of times “Software complexity is increasing” — I’m sure this is not the first time, nor will be the last time you read this claim. It may sound rhetorical, but repeatedly claiming overtime that software complexity is increasing is nothing but a concrete observation about the incessant pace with which several technological domains are evolving thanks…

[EMSOFT 2021 Best Paper] Verified Lustre normalization with node subsampling

"Verified Lustre normalization with node subsampling" by Timothy Bourke, Basile Pesin, Paul Jeanmaire, and Marc Pouzet is the best paper winner of the International Conference on Embedded Software (EMSOFT) in 2021. This blog post gives an overview of the work. The Coq development described in the paper is available online. There is also a page of links between the article…

Wait for It: A Blueprint for Sporadic Tasks on Linux

Introduction Welcome back to a second hands-on blog post in which we explore the implementation of classic real-time concepts in POSIX operating systems. In a previous post, we examined the classic periodic task abstraction and how to implement it in Linux. This time around, let’s explore its equally well-known counterpart: the sporadic task model for event-driven workloads. As we'll compare…