Quality Assurance of Cyber-Physical and Embedded Systems
Foundations of Cyber-Physical Systems
- Fault Models and Mutation Testing
- Model Driven Mutation Applied to Adaptative Systems Testing Alexandre Bartel et al., Mutation 2011@ICST
- Correlating Context-Awareness and Mutation Analysis for Pervasive Computing Systems Huai Wang Ke Zhai Tse, T.H. (QISC10)
- Context-Aware Adaptive Applications: Fault Patterns and Their Automated Identification Michele Sama, David S. Rosenblum, Franco and Rosenblum, Zhimin Wang, Sebastian Elbaum (TSE2010, VOL. 36, NO.5)
- Coverage Based Testing
- Testing Context-Aware Middleware-Centric Programs: a Data Flow Approach and an RFID-Based Experimentation Lu Heng, W.K. Chan, T.H. Tse (FSE06)
- Automated Generation of Context-Aware Tests Zhimin Wang Sebastian Elbaum David S. Rosenblum (ICSE07)
- Inter-Context Control-Flow and Data-Flow Test Adequacy Criteria for nesC Applications Lai zhifeng, S.C. Cheung, W.K.Chan (FSE08)
- Testing Pervasive Software in the Presence of Context Inconsistency Resolution Services Lu Heng, W.K. Chan T.H. Tse (ICSE08)
- Weaving Context Sensitivity into Test Suite Construction Huai Wang, W.K. Chan (ASE09)
- Program representations for testing wireless sensor network applications Nguyet T. M. Nguyen and Mary Lou Soffa (DoSTA07)
- Metamorphic Testing
- Testing Context-Sensitive Middleware-Based Software Applications T. H. Tse, Stephen S. Yau, W.K. Chan, Heng Lu, T. Y. Chen (COMPSAC04)
- Towards the testing of power-aware software applications for wireless sensor networks W. K. Chan, Tsong Y. Chen, S. C. Cheung, T. H. Tse and Zhenyu Zhang LNCS 4498, pp. 84–99, 2007
- Regression Testing
- Xest: An Automated Framework for Regression Testing of Embedded Software.Matt Netkow and Dennis Brylow. WESE 2010
- Integration and System Testing
- Towards Configurable Real-Time Hybrid Structural Testing : A Cyber Physical Systems Approach Tidwell, T., Xiuyu Gao, Huang-Ming Huang, Chenyang Lu, Dyke, S. Gill, C. (ISORC'09)
- Cyber-Physical Systems for Real-Time Hybrid Structural Testing : A Case studying Huang-Ming Huang,Terry Tidwel, Christopher Gill, Chenyang Lu,Xiuyu Gao ,Shirley Dyke (ICCPS10)
- Model Checking and Verification
- Automated Analysis of Industrial Embedded Software, M.Kim and Y.Kim. ATVA 2011
- Synthesizing Cyber-Physical Architectural Models with Real-Time Constraints. Christine Hang, Panagiotis Manolios, and Vasilis Papavasileiou. CAV 2011.
- Model Based Development of Dynamically Adaptive Software Ji Zhang. Betty. H. Cheng. (ICSE06)
- Bug-Free Sensors: The Automatic Verification of Context-Aware TinyOS Applications Doina Bucur and Marta Kwiatkowska, (LNCS09 Volume 5859, Pages 101-105)
- Model-Based Fault Detection in Context-Aware Adaptive Applications Michele Sama, David S. Rosenblum, Zhimin Wang, Sebastian Elbaum (ICSE08)
- Algorithms for efficient symbolic detection of faults in context-aware applications. Sama, Michele and Raimondi, Franco and Rosenblum, David and Emmerich, Wolfgang (ASE08 Workshop)
- Multi-layer faults in the architectures of mobile, context-aware adaptive applications Michele Sama, David S. Rosenblum, Zhimin Wang, Sebastian Elbaum (JSS10,VoL. 83, Issue 6)
- Context-Aware Adaptive Applications: Fault Patterns and Their Automated Identification Michele Sama, David S. Rosenblum, Franco and Rosenblum, Zhimin Wang, Sebastian Elbaum (TSE2010, VOL. 36, NO.5)
- Automatic verification of control system implementations Adolfo Anta, Rupak Majumdar, Indranil Saha, and Paulo Tabuada EMSOFT10. [Slides]
- S-TALIRO: A Tool for Temporal Logic Falsification for Hybrid Systems Yashwant Annapureddy, Che Liu, Georgios Fainekos and Sriram Sankaranarayanan (TACAS2011)
- A Formal Framework for Verification and Validation of External Behavioral Models of Embedded Systems Represented Through Black Box Structures Sastry J.K.R. Chandra Prakash V.Advance Computing Conference (IACC), 2010 IEEE 2nd International,2010 , Page(s): 430 - 435
- Model-checking BNDC properties in Cyber-physical systems Ravi Akella Bruce M. McMillin (COMPSAC09)
- Automatic Abstraction for Verification of Cyber-Physical Systems, Robert A. Thacker, Kevin R. Jones, Chris J. Myers, Hao Zheng, (ICCPS10)
- Virtual Integration of Cyber-Physical Systems by Verification. Panagiotis Manolios and Vasilis Papavasileiou. AVICPS 2010
- Modeling and Verification of Cyber-Physical Systems with Co-inductive Constraint LogicProgramming TECHNICAL REPORTS, UTDCS-03-11.
- Deadline Analysis of Interrupt Driven Software, Dennis Brylow and Jens Palsberg. TSE 2004.
- Static Checking of Interrupt-Driven Software. Dennis Brylow, Niels Damgaard, and Jens Palsberg. ICSE 2001.
- Symbolic Execution
- Papers from Provable SW Lab
- Systematic Testing for Control Applications Rupak Majumdar, Indranil Saha, and Zilong Wang (Memocode 2010).
- Symbolic Robustness Analysis Rupak Majumdar, Indranil Saha (RTSS09) [Slides]
- Deriving State Machines from TinyOS Programs Using Symbolic Execution Nupur Kothari, Todd Millstein, Ramesh Govindan. IPSN 2008
- Timing Analysis
- GameTime: A Toolkit for Timing Analysis of Software. Sanjit A. Seshia and Jonathan Kotker. TACAS 2011
- Environment Modeling
- Environment Modeling: A Usability Challenge for Verifying Cyber-Physical Systems Sanjit A. Seshia. Workshop on Usable Verification, November 2010.
- Mining Assumptions for Synthesis. Wenchao Li, Lili Dworkin, and Sanjit A. Seshia. MEMOCODE 2011
- Quantitative Analysis of Systems Using Game-Theoretic Learning. Sanjit A. Seshia and Alexander Rakhlin. ACM TECS 2011
- Quantitative Analysis of Software: Challenges and Recent Advances. Sanjit A. Seshia. FACS 2010
- Applied CPS
- A Framework for the Safe Interoperability of Medical Devices in the Presence of Network Failures, Cheolgi Kim, et al,Proceedings of the 1st ACM/IEEE International Conference on Cyber Physical Systems.
- Robotics Systems
- Centers/People
- Ayanna Howard @HumAns (Georgia Tech)
- S. Williams, S. Remy, A. Howard, “3-D Simulations for Testing and Validating Robotic-Driven Applications for Exploring Lunar Pole,” AIAA Infotech@Aerospace 2010, Atlanta, GA, April 2010.
- Ayanna Howard @HumAns (Georgia Tech)
- Centers/People
- Automobile Systems
- Centers/People
- Center for Automotive Embedded Systems Security (CAESS)
- Experimental Security Analysis of a Modern Automobile. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage. Oakland 2010. PDF.
- Senor Network Apps
- Others
- MDE to Manage Communications with and between Resource-Constrained Systems. Franck Fleurey, Brice Morin, Arnor Solberg and Olivier Barais.. MODELS 2011.
- A Model-Driven Approach to Develop Adaptive Firmwares. Franck Fleurey, Brice Morin, and Arnor Solberg. SEAMS 2011.
- Medical Device Software
- Challenges in the regulatory approval of medical cyber-physical systems. Oleg Sokolsky, Insup Lee, Mats Per Erik Heimdahl. EMSOFT 2011.
- Model-based Dependability Analysis of Programmable, Real-Time Medical Devices , Sriram Sankaranarayanan, Hadjar Homaei and Clayton Lewis. FORMATS 2011.
- Trustworthy medical device software. Kevin Fu. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report, 2011. [PDF] [slides] [video] [workshop] [link]
- Software issues for the medical device approval process, Kevin Fu. April 2011. Statement to the Special Committee on Aging, United States Senate, Hearing on a delicate balance: FDA and the reform of the medical device approval process. [PDF] [link]
- Security (Medical Device Security Center, USENIX HealthSec, SHARPS)
- They can hear your heartbeats: Non-invasive security for implanted medical devices.Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu. SIGCOMM 2011. [conference] [link]
- Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, and William H. Maisel. CHI 2010 PDF of paper
- Improving the security and privacy of implantable medical devices. William H. Maisel and Tadayoshi Kohno.New England Journal of Medicine, April 2010 NEJM link
- Neurosecurity: Security and Privacy for Neural Devices.Tamara Denning, Yoki Matsuoka, and Tadayoshi Kohno.Neurosurgical Focus, July 2009 Additional information: Abstract; PDF of paper
- HICCUPS: Health information collaborative collection using privacy and security. Andres D. Molina, Mastooreh Salajegheh, and Kevin Fu. SPIMACS 2009. [PDF][link]
- Clinically significant magnetic interference of implanted cardiac devices by portable headphones. Sinjin Lee, Kevin Fu, Tadayoshi Kohno, Benjamin Ransford, and William H. Maisel. Heart Rhythm Journal, 2009. [PDF] [abstract] [journal] [npr] [link]
- Absence makes the heart grow fonder: New directions for implantable medical device security. Tamara Denning, Kevin Fu, and Tadayoshi Kohno. HotSec 2008.[PDF] [slides] [link]
- Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. Oakland 2008.
- Keywords: security; privacy; Health; Award Paper; [bibtex] [PDF] [medgadget] [boston_globe] [details] [nytimes] [risks] [schneier] [slashdot][wsj] [link]
- Protecting global medical telemetry infrastructure. Benessa Defend, Mastooreh Salajegheh, Kevin Fu, and Sozo Inoue. Technical report, Institute of Information Infrastructure Protection (I3P), 2008. [PDF] [link]
- Security and privacy for implantable medical devices. Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. IEEE Pervasive Computing, 2008. [PDF] [abstract] [link]
Courses
Researchers
- Rupak Majumdar (Publications)
- Sanjit A. Seshia (Publications)
- Insup Lee (Publications)
- Rajeev Alur (Publications)
- Jens Palsberg (Publications)
- Luca de Alfaro (Publications)
- Jan Vitek (Publications)
- Walid Taha (Publications)
- David Bacon (Publications)
- John Regehr (Publications)
- Tom Henzinger (Publications)
- Sriram Sankaranarayanan (Publications)