Browsing Engineering (Faculty of) by Supervisor "Fischmeister, Sebastian"
Now showing items 1-20 of 27
-
An Analysis and Benchmarking in Autoware.AI and OpenPCDet LiDAR-based 3D Object Detection Models
(University of Waterloo, 2023-01-11)Light Detection And Ranging (LiDAR) sensors are widely used in applications related to autonomous driving. The ability to scan and visualize the 3D surroundings of the vehicle as a point cloud is a particular strength of ... -
CONSIDERING SAFETY AND SECURITY IN AV FUNCTIONS
(University of Waterloo, 2019-08-30)Autonomous vehicles (AVs) are coming to our streets. Due to the presence of highly complex software systems in AVs, a new hazard analysis technique is needed to meet stringent safety standards. Also, safety and security ... -
Decentralized Data Acquisition Pipeline with Machine Learning For Side-Channel Information
(University of Waterloo, 2021-09-17)Technological advancements and the COVID-19 pandemic caused an increase in the adoption of technologies, services, and computers. Public cloud services surged with a 17\% increase, and adoption of software services such ... -
Identifying Defects Related to the Order in which Messages are Received in Message-Passing Systems
(University of Waterloo, 2016-01-19)Improving the quality of software artifacts and products is an essential activity for everyone working on the development of software. Testing is one approach to reveal defects and faults in software. In recent years, ... -
Implementing MLOps on Edge-Cloud Systems: A New Paradigm for Training at the Edge
(University of Waterloo, 2023-08-18)Owing to the rise in data from the Internet of Things~(IoT) devices and the increasing demand for intelligent decision-making on the network's edge, there has been a significant surge in interest in the intersection of ... -
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints
(University of Waterloo, 2023-08-29)Metasploit is a framework for cybersecurity testing. The Metasploit Framework introduced the Hardware Bridge API to enable security testing of cyber-physical systems. Cyber-physical systems and tests/attacks on the systems ... -
Mining Event Traces from Real-time Systems for Anomaly Detection
(University of Waterloo, 2019-02-19)Real-time systems are a significant class of applications, poised to grow even further as autonomous vehicles and the Internet of Things (IoT) become a reality. The computation and communication tasks of the underlying ... -
Multi-signal Anomaly Detection for Real-Time Embedded Systems
(University of Waterloo, 2020-05-27)This thesis presents MuSADET, an anomaly detection framework targeting timing anomalies found in event traces from real-time embedded systems. The method leverages stationary event generators, signal processing, and distance ... -
Non-Intrusive Program Tracing of Non-Preemptive Multitasking Systems Using Power Consumption
(University of Waterloo, 2017-12-19)System tracing, runtime monitoring, execution reconstruction are useful techniques for protecting the safety and integrity of systems. Furthermore, with time-aware or overhead-aware techniques being available, these ... -
Non-Intrusive system behavior tracing using power consumption
(University of Waterloo, 2020-05-13)This thesis presents a novel non-intrusive method of creating a map of black-box systems’ behavior to commands by observing the power consumption of the system. We expand our method in the form of a flexible framework which ... -
Novelty Detection for SilGeo Hardware Assurance
(University of Waterloo, 2023-05-05)In today's world, electronic hardware-level threats have become increasingly common. These threats can range from the infiltration of counterfeit or malicious hardware in the supply chain to the use of electronic attack ... -
Performance Test Selection Using Machine Learning and a Study of Binning Effect in Memory Allocators
(University of Waterloo, 2019-04-30)Performance testing is an essential part of the development life cycle that must be done in a timely fashion. However, checking for performance regressions in software can be time-consuming, especially for complex systems ... -
A Platform for Generating Anomalous Traces Under Cooperative Driving Scenarios
(University of Waterloo, 2018-08-03)As we allow more critical decisions to be made by software, it becomes increasingly necessary to ensure the decisions made are correct. One approach is to monitor the software for signs of an anomaly. The approach is an ... -
Runtime Monitoring for Uncertain Times
(University of Waterloo, 2021-03-19)In Runtime Verification (RV), monitors check programs for correct operation at execution time. Also called Runtime Monitoring, RV offers advantages over other approaches to program verification. Efficient monitoring is ... -
RuSTL: Runtime Verification using Signal Temporal Logic
(University of Waterloo, 2019-04-23)A system is classified to be a safety-critical system if its failure and/or malfunction of these devices may result in severe injuries or in extreme cases loss of human life. Such systems are all around us, examples of ... -
Safe and Secure Control of Connected and Automated Vehicles
(University of Waterloo, 2020-10-26)Evolution of Connected and Automated Vehicles (CAV), as an important class of Cyber-Physical Systems (CPS), plays a crucial role in providing innovative services in transport and traffic management. Vehicle platoons, as a ... -
Secure Data Acquisition for Physics-based Side Channel Cybersecurity
(University of Waterloo, 2023-08-18)Cyber-physical systems (CPSs), such as planes and water treatment plants, are increasingly connected to the Internet. Connecting CPSs to the Internet allows for greater productivity but also increases the attack surface ... -
Security and Interpretability in Automotive Systems
(University of Waterloo, 2022-04-06)Controller area network (CAN) is the most commonly found bus protocol in automotive systems. The two-wire bus protocol helps accomplish sophisticated vehicle services in real-time through complex interactions between ... -
Signal Processing for Trace-based Anomaly Detection in Embedded Software
(University of Waterloo, 2016-01-21)Embedded operating systems generate a log of operating system function calls which we refer to as traces. Trace-based anomaly detection deals with the problem of determining whether or not an instance of traces represents ... -
SilGeo: A Method for the Detection of Counterfeit, Compromised, or Tampered Electronic Devices
(University of Waterloo, 2022-08-26)Modern technological devices, ranging from the pedestrian smartphone to the highly specialized pacemaker, are increasingly dependent on miniaturized electronic components, such as integrated circuits, to accomplish their ...