Now showing items 1-20 of 30

    • An Analysis and Benchmarking in Autoware.AI and OpenPCDet LiDAR-based 3D Object Detection Models 

      Yigzaw, Samuel (University of Waterloo, 2023-01-11)
      Light Detection And Ranging (LiDAR) sensors are widely used in applications related to autonomous driving. The ability to scan and visualize the 3D surroundings of the vehicle as a point cloud is a particular strength of ...
    • CONSIDERING SAFETY AND SECURITY IN AV FUNCTIONS 

      Sharma, Shefali (University of Waterloo, 2019-08-30)
      Autonomous vehicles (AVs) are coming to our streets. Due to the presence of highly complex software systems in AVs, a new hazard analysis technique is needed to meet stringent safety standards. Also, safety and security ...
    • Decentralized Data Acquisition Pipeline with Machine Learning For Side-Channel Information 

      Guler, Goksen (University of Waterloo, 2021-09-17)
      Technological advancements and the COVID-19 pandemic caused an increase in the adoption of technologies, services, and computers. Public cloud services surged with a 17\% increase, and adoption of software services such ...
    • Identifying Defects Related to the Order in which Messages are Received in Message-Passing Systems 

      Irannejad, Milad (University of Waterloo, 2016-01-19)
      Improving the quality of software artifacts and products is an essential activity for everyone working on the development of software. Testing is one approach to reveal defects and faults in software. In recent years, ...
    • Implementing MLOps on Edge-Cloud Systems: A New Paradigm for Training at the Edge 

      Dave, Ridham (University of Waterloo, 2023-08-18)
      Owing to the rise in data from the Internet of Things~(IoT) devices and the increasing demand for intelligent decision-making on the network's edge, there has been a significant surge in interest in the intersection of ...
    • Metasploit for Cyber-Physical Security Testing with Real-Time Constraints 

      Shrestha, Sulav Lal (University of Waterloo, 2023-08-29)
      Metasploit is a framework for cybersecurity testing. The Metasploit Framework introduced the Hardware Bridge API to enable security testing of cyber-physical systems. Cyber-physical systems and tests/attacks on the systems ...
    • Mining Event Traces from Real-time Systems for Anomaly Detection 

      Salem, Mahmoud (University of Waterloo, 2019-02-19)
      Real-time systems are a significant class of applications, poised to grow even further as autonomous vehicles and the Internet of Things (IoT) become a reality. The computation and communication tasks of the underlying ...
    • Multi-signal Anomaly Detection for Real-Time Embedded Systems 

      Torres Labrada, Reinier (University of Waterloo, 2020-05-27)
      This thesis presents MuSADET, an anomaly detection framework targeting timing anomalies found in event traces from real-time embedded systems. The method leverages stationary event generators, signal processing, and distance ...
    • Non-Intrusive Program Tracing of Non-Preemptive Multitasking Systems Using Power Consumption 

      Lamichhane, Kamal (University of Waterloo, 2017-12-19)
      System tracing, runtime monitoring, execution reconstruction are useful techniques for protecting the safety and integrity of systems. Furthermore, with time-aware or overhead-aware techniques being available, these ...
    • Non-Intrusive system behavior tracing using power consumption 

      Flores, Adan (University of Waterloo, 2020-05-13)
      This thesis presents a novel non-intrusive method of creating a map of black-box systems’ behavior to commands by observing the power consumption of the system. We expand our method in the form of a flexible framework which ...
    • Novelty Detection for SilGeo Hardware Assurance 

      Schmidt, Lukas (University of Waterloo, 2023-05-05)
      In today's world, electronic hardware-level threats have become increasingly common. These threats can range from the infiltration of counterfeit or malicious hardware in the supply chain to the use of electronic attack ...
    • Performance Test Selection Using Machine Learning and a Study of Binning Effect in Memory Allocators 

      Oliveira Sousa, Anderson (University of Waterloo, 2019-04-30)
      Performance testing is an essential part of the development life cycle that must be done in a timely fashion. However, checking for performance regressions in software can be time-consuming, especially for complex systems ...
    • A Platform for Generating Anomalous Traces Under Cooperative Driving Scenarios 

      Shin, Donghyun (University of Waterloo, 2018-08-03)
      As we allow more critical decisions to be made by software, it becomes increasingly necessary to ensure the decisions made are correct. One approach is to monitor the software for signs of an anomaly. The approach is an ...
    • Quantitative Risk Analysis With Qualitative Statements 

      Elhammady, Karim (University of Waterloo, 2023-12-14)
      Cybersecurity risk analysis is crucial for organizations to assess, identify, and prioritize possible threats to their systems and assets. Organizations seek to assess the potential costs of risks in order to determine how ...
    • Runtime Monitoring for Uncertain Times 

      Kauffman, Sean (University of Waterloo, 2021-03-19)
      In Runtime Verification (RV), monitors check programs for correct operation at execution time. Also called Runtime Monitoring, RV offers advantages over other approaches to program verification. Efficient monitoring is ...
    • RuSTL: Runtime Verification using Signal Temporal Logic 

      Khan, Waleed (University of Waterloo, 2019-04-23)
      A system is classified to be a safety-critical system if its failure and/or malfunction of these devices may result in severe injuries or in extreme cases loss of human life. Such systems are all around us, examples of ...
    • Safe and Secure Control of Connected and Automated Vehicles 

      Basiri, Mohammad Hossein (University of Waterloo, 2020-10-26)
      Evolution of Connected and Automated Vehicles (CAV), as an important class of Cyber-Physical Systems (CPS), plays a crucial role in providing innovative services in transport and traffic management. Vehicle platoons, as a ...
    • Secure Data Acquisition for Physics-based Side Channel Cybersecurity 

      Propp, Aaron (University of Waterloo, 2023-08-18)
      Cyber-physical systems (CPSs), such as planes and water treatment plants, are increasingly connected to the Internet. Connecting CPSs to the Internet allows for greater productivity but also increases the attack surface ...
    • Securing Vehicular Networks: A Rules-Based CAN Intrusion Detection System Using IoT Edge Architecture 

      Lee, Taylor (University of Waterloo, 2024-01-17)
      The increasing interconnectivity of modern safety-critical embedded systems has led to an ever-increasing attack surface. The automotive and maritime industries are but two industries that use safety-critical embedded ...
    • Security and Interpretability in Automotive Systems 

      Thakur, Shailja (University of Waterloo, 2022-04-06)
      Controller area network (CAN) is the most commonly found bus protocol in automotive systems. The two-wire bus protocol helps accomplish sophisticated vehicle services in real-time through complex interactions between ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages