Search Results

Now showing 1 - 4 of 4
  • Item
    Resilience in the Cyberworld: Definitions, Features and Models
    (Basel : MDPI, 2021) Vogel, Elisabeth; Dyka, Zoya; Klann, Dan; Langendörfer, Peter
    Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitions provided by different authors, on different years and with different application areas the field of computer science/computer engineering. We identify the core statements that are more or less common to the majority of the definitions, and based on this we give a holistic definition using attributes for (cyber-) resilience. In order to pave a way towards resilience engineering, we discuss a theoretical model of the life cycle of a (cyber-) resilient system that consists of key actions presented in the literature. We adapt this model for embedded (cyber-) resilient systems.
  • Item
    Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow †
    (Basel : MDPI, 2023) Lehniger, Kai; Langendörfer, Peter
    With the increasing popularity of IoT (Internet-of-Things) devices, their security becomes an increasingly important issue. Buffer overflow vulnerabilities have been known for decades, but are still relevant, especially for embedded devices where certain security measures cannot be implemented due to hardware restrictions or simply due to their impact on performance. Therefore, many buffer overflow detection mechanisms check for overflows only before critical data are used. All data that an attacker could use for his own purposes can be considered critical. It is, therefore, essential that all critical data are checked between writing a buffer and its usage. This paper presents a vulnerability of the ESP32 microcontroller, used in millions of IoT devices, that is based on a pointer that is not protected by classic buffer overflow detection mechanisms such as Stack Canaries or Shadow Stacks. This paper discusses the implications of vulnerability and presents mitigation techniques, including a patch, that fixes the vulnerability. The overhead of the patch is evaluated using simulation as well as an ESP32-WROVER-E development board. We showed that, in the simulation with 32 general-purpose registers, the overhead for the CoreMark benchmark ranges between 0.1% and 0.4%. On the ESP32, which uses an Xtensa LX6 core with 64 general-purpose registers, the overhead went down to below 0.01%. A worst-case scenario, modeled by a synthetic benchmark, showed overheads up to 9.68%.
  • Item
    Accuracy and Precision in Electronic Structure Computation: Wien2k and FPLO
    (Basel : MDPI, 2022) Richter, Manuel; Kim, Seo-Jin; Koepernik, Klaus; Rosner, Helge; Möbius, Arnulf
    Electronic structure calculations in the framework of density functional theory are based on complex numerical codes which are used in a multitude of applications. Frequently, existing experimental information is used as a gauge for the reliability of such codes. However, their results depend both on the chosen exchange-correlation energy functional and on the specific numerical implementation of the Kohn-Sham equations. The only way to disentangle these two items is a direct comparison of two or more electronic structure codes. Here, we address the achievable numerical accuracy and numerical precision in the total energy computation of the two all-electron density-functional codes Wien2k and FPLO. Both codes are based on almost independent numerical implementations and largely differ in the representation of the Bloch wave function. Thus, it is a highly encouraging result that the total energy data obtained with both codes agree within less than 10−6. We here relate the term numerical accuracy to the value of the total energy E, while the term numerical precision is related to the numerical noise of E as observed in total energy derivatives. We find that Wien2k achieves a slightly higher accuracy than FPLO at the price of a larger numerical effort. Further, we demonstrate that the FPLO code shows somewhat higher precision, i.e., less numerical noise in E than Wien2k, which is useful for the evaluation of physical properties based on derivatives of E.
  • Item
    Text-to-Ontology Mapping via Natural Language Processing with Application to Search for Relevant Ontologies in Catalysis †
    (Basel : MDPI, 2023) Korel, Lukáš; Yorsh, Uladzislau; Behr, Alexander S.; Kockmann, Norbert; Holeňa, Martin
    The paper presents a machine-learning based approach to text-to-ontology mapping. We explore a possibility of matching texts to the relevant ontologies using a combination of artificial neural networks and classifiers. Ontologies are formal specifications of the shared conceptualizations of application domains. While describing the same domain, different ontologies might be created by different domain experts. To enhance the reasoning and data handling of concepts in scientific papers, finding the best fitting ontology regarding description of the concepts contained in a text corpus. The approach presented in this work attempts to solve this by selection of a representative text paragraph from a set of scientific papers, which are used as data set. Then, using a pre-trained and fine-tuned Transformer, the paragraph is embedded into a vector space. Finally, the embedded vector becomes classified with respect to its relevance regarding a selected target ontology. To construct representative embeddings, we experiment with different training pipelines for natural language processing models. Those embeddings in turn are later used in the task of matching text to ontology. Finally, the result is assessed by compressing and visualizing the latent space and exploring the mappings between text fragments from a database and the set of chosen ontologies. To confirm the differences in behavior of the proposed ontology mapper models, we test five statistical hypotheses about their relative performance on ontology classification. To categorize the output from the Transformer, different classifiers are considered. These classifiers are, in detail, the Support Vector Machine (SVM), k-Nearest Neighbor, Gaussian Process, Random Forest, and Multilayer Perceptron. Application of these classifiers in a domain of scientific texts concerning catalysis research and respective ontologies, the suitability of the classifiers is evaluated, where the best result was achieved by the SVM classifier.