LiU > IDA > Real-Time Systems Lab
ABOUT
MEMBERS
COOPERATION
PROJECTS
PUBLICATIONS
COURSES
OPEN POSITIONS
THESES
ALUMNI

Announcements

[14 May 2020] The prize for the best master thesis in 2019 was awarded Carl Folkesson examined at RTSLAB.

[14 May 2020] Two Bachelor students supervised for their final year project at RTSLAB won the best Bachelor thesis award for 2019.

[18 December 2019] A paper written at RTSLAB was awarded the best paper award at the UCC2019 conference more ...

[14 May 2018] A bachelor student at RTSLAB was awarded the best thesis award from IDA - Alexander Ernfridsson. more ...

[16 May 2017] A bachelor student at RTSLAB was awarded the best thesis award from IDA - Tim Hultman. more ...

[12 May 2016] A master student at RTSLAB was awarded the best thesis award from IDA - Alexander Alesand. more ...

[12 May 2016] A bachelor student at RTSLAB was awarded the best thesis award from IDA - Mathias Almquist and Viktor Almquist. more ...

[25 May 2015] A master student at RTSLAB was awarded the best thesis award from IDA - Klervie Toczé. more ...

[26 May 2014] A bachelor student at RTSLAB was awarded the best thesis award from IDA - Simon Andersson. more ...

[31 May 2012] A masters student at RTSLAB was awarded the best thesis award from IDA - Ulf Magnusson. more ...

[27 February 2008] A masters student at RTSLAB was awarded the best thesis award from IDA - Johan Sigholm. more ...

[03 March 2004] A masters student at RTSLAB was awarded the best thesis award from IDA - Tobias Chyssler. more ...

[01 Jul 2003] For second year in a row a masters student at RTSLAB was awarded the best thesis award from SNART - Mehdi Amirijoo. more ...

Master/Bachelor Thesis - Proposals


Blockchain git

Contact: Mikael Asplund

The purpose of this project is to investigate decentralized storage solutison that combine the benefits of decentralized versining (e.g. git) and blockchain technologies. The project will implement a distributed data structure that forms a directed acyclic graph (DAG), rather than a single chain. Using a DAG has previously been proposed in Tangle and ABC, but neither of those have really taken advantage of the real benefits provided by this structure. By providing a semantic similar to a git repository, it is actually possible to maintain multiple versions of the data at the same time. This enables unique possibilities such as going back to a previous state, maintaining parallel software versions (i.e., partial upgrades), and recovering from a large-scale attack. Note that the data structure itself is still immutable, going back in time does not mean removing data, only to change the "current branch pointer". Another consequence of maintaining parallel states as a DAG rather than a chain is that total agreement (consensus) is not needed. The high cost of full consensus is well known in the literature, and while the probabilistic variant of consensus provided in early blockchains was a step away from strong agreement, the later permissioned blockchains have again opted for strict consensus protocols such as PBFT. In this approach each branch can decide its own rules for agreement, but crucially, the entire system does not need to agree on a common state. For efficiency and usability reasons this approach would require an automatic merge mechanism to avoid full divergence, a concept similar to state reconciliation.


AI-based risk analysis

Contact: Mikael Asplund

In this thesis project the idea is to incorporate available online information about new security risks (e.g. vulnerability databases) and integrate with information about a system configuration to provide useful risk assessments. Available data sources will be collected and analyzed to assess their potential to support automated risk analysis. Potential information sources include online databases, incident reporting organizations, and collections of news reports (e.g., this one). The purpose of data collection is to support automated analysis and machine learning. Therefore, the project will also involve training machine learning models to investigate the predictive power of the available data.


Anomaly detection for SCADA security with machine learning approaches

Contact: Simin Nadjm-Tehrani

Supervisory control and data acquisition (SCADA) systems control and monitor modern critical infrastructure such as electricity distribution systems. Given the emerging of attacks targeting the control system of critical infrastructures, SCADA security has become a pressing issue.

Network-based anomaly detection is one of the potential defence mechanisms for SCADA security. It aims to model the normal SCADA traffic, e.g. using machine learning techniques, and issue an alarm when there are deviations from the learnt model. Previous work models the IEC-60870-5-104 (IEC-104) traffic from a real electric utility with its timing attributes and the model performs well in presence of non-trivial attacks.

This thesis project aims to extend the timing model to electric utilities that run different protocols such as Generic Object Oriented Substation Event (GOOSE) and Manufacturing Message Specification (MMS). Using the characteristics of the acquired data sets, may lead to discovery of new models or alternative learning approaches.


Hardware acceleration for mixed reality with edge computing

Contact: Simin Nadjm-Tehrani

Mixed reality is an umbrella term for any combination of reality with virtual elements. However, the algorithms used typically use video processing and rendering techniques that require a lot of computation and their complexity is increasing. This makes it hard (or even impossible) to run them in good conditions in a user (mobile) device for longer periods due to resource constraints.

Edge computing is a recent paradigm that aims at providing resources accessible with lower latency and increased privacy compared to cloud resources. By enabling the offloading of the computation-heavy task to a more powerful edge device while keeping the latency low, edge computing promises to enable applications like mixed reality.

In an earlier work, a mixed reality prototype using edge computing was implemented and its performance evaluated). The first part of the application is a client running on a smartphone and responsible for getting the video input and (after treatment at the server) displaying the mixed reality video output to the user. The second part of the application runs on the server (at the edge) and is responsible for doing the heavy computations needed for providing the mixed reality content.

The aim of this thesis is to enhance this prototype by implementing hardware acceleration support and quantifying the performance improvement it brings. Hardware acceleration can be used for the encoding/decoding of the video stream and/or for the mixed reality algorithms.

With regards to the mixed reality part, a starting point for the thesis would be to investigate some proposed CUDA off-loadings of the mixed reality algorithms onto a dedicated Nvidia platform.


Making a safety argument for critical software

Contact: Simin Nadjm-Tehrani

The time spent in verification for safety-critical software is an order of magnitude larger than the time spent in actual development of the critical functions. Such software systems are at the core of avionics and autonomous/semi-autonomous vehicles, drones, traffic-signaling systems, and railway systems. Any means to increase the speed of development without losing control of the safety case will be vitally important with increased reliance on software in cyber-physical and embedded systems. In earlier research (DOI: 10.1109/HASE.2008.59) a method is proposed for analyzing exposure of systems, built by composing several components, to single or double faults at the interface of some component. The components are mathematically modelled, and those faults that the system is provably tolerant to are already dealt with (checked by deterministic model checking). This paper tackles the faults for which one cannot show whether the system is tolerant of, or not. This happens where exhaustive formal verification is unfeasible, hence a probabilistic approach is used. The aim of this thesis project is to build upon this work and to evaluate the industrial application of this modelling framework with respect to technical feasibility. The focus will be modelling a safety-critical, cyber-physical software system and evaluating probabilities for catastrophic events at the Critical Systems unit at Combitech. You will decide, together with your supervisor, the precise software system to model early in the thesis work.


Simulating intelligent cooperating vehicles

Contact: Mikael Asplund

Cooperative intelligent transportation systems are envisioned to improve road traffic efficiency, safety, and comfort for passengers. One of the applications currently under development is vehicular platooning. Vehicular platooning, sometimes referred to as a 'road train', is a group of vehicles that travel closely together under control algorithms that adjust the vehicle laterally and longitudinally. The algorithms leverage information shared through network protocols specially designed for vehicular environments such as IEEE 802.11p. In addition to lateral and longitudinal controllers, vehicles must employ a protocol to standardize message formats used for forming or disrupting platoons, for example. In Europe, a standardization effort called ENSEMBLE is currently ongoing with actors such as Volvo and Scania in Sweden. ENSEMBLE's primary goal is to work towards a 'multi-brand' platooning solution in which communication is standardized and therefore trucks from multiple manufacturers can co-operate in platoons. The initial task in this Master Thesis Project is to model the current protocol proposal from ENSEMBLE in the simulation framework Plexe-Veins, which provides realistic mobility and network models of vehicular communication. The model will be used to study interesting aspects such as security of platoons (e.g. is it possible to attack it or how to make them more secure), safety, and efficiency (e.g. is there any circumstance in which the protocol overloads the data channel).


Aggregering av kunddata, el, vatten, värme och bredbandsförbrukning

Contact: Simin Nadjm-Tehrani

En grupp energibolag i Sverige har avsikten att kika på hur förbrukningsbeteenden skiljer sig mellan deras respektive områden. Var för sig har de tex uppgifter kring folks elförbrukning, värmeförbrukning, bredbandsuppkoppling, vattenförbrukning, geografi mm. För att fördjupa dessa insikter kring kunder baserat på denna data men även för att utforska potentialen med att kombinera datan med extern data tänker de skapa en förståelse och se vilka mönster som skulle kunna hittas ifall de tex kombinerade vår data med data från fastighetsregistret, väderdata, inkomster, fordonsdata, antal familjemedlemmar. Exjobbet går ut på att:

  • Identifiera potentiella mönster/insikter för gemensamt (delat) data samt kombinationen egna data+extern data
  • Vilka analysmetoder, algoritmer och verktyg är lämpliga att använda för ovan scenarier?
  • Bättre förståelse kring externa datakällor
Aspekter som rör GDPR är inte del av exjobbsprojektet men ska beaktas när ovanstående förståelse har skapats. Detta projekt körs i samarbete med Tekniska Verken inom ramen av det nationella RICS (www.rics.se) projektet..


Arguing for Safety and Correctness in Machine Learning Models

Contact: Simin Nadjm-Tehrani

Recent advances in machine learning are now being applied in safety-critical systems where software defects may cause severe harm to humans and the environment. Providing convincing arguments that such software-based systems are safe and correct is problematic due to human´s inability to understand the software, and thus fails to identify scenarios in which the software should be tested in. Several researchers have proposed formal verification methods that address these concerns, but the scalability of these methods put limitations on the size and complexity of the software being analyzed.

This thesis work aims to assess trade-offs between different machine learning models when the ability to argue for safety and correctness is important. A prototype of an airborne collision avoidance system is provided, implemented as a neural network, with formal requirements that must be verified for such systems to be deployed in the real world. The work will be done in collaboration with the Avionics Platform & Services division at Saab Aeronautics.


Säkra samhällstjänster: Molnberoenden och kritikalitet

Contact: Simin Nadjm-Tehrani

Ett företag som levererar olika samhällskritiska tjänster har flera olika delsystem som är mer eller mindre beroende av varandra. Dessutom upphandlas produkter och tjänster från tredje part. System som kan ha otydliga beroenden kan vara för komplexa för att ha en helhetssyn vad gäller kritikalitet och arkitektur. Målet med detta examensarbete är att med hjälp av tekniska redskap kartlägga systemkomponenter som är nödvändiga för att leverera en organisationstjänster, deras beroenden som uppfattas av olika aktörer inom organisationen, och hur incidenthantering för olika delsystem sköts. Utgångspunkten ska vara leverans av tjänsten och dess tillgänglighet. Kartläggningen sker genom informationssamling inne i organisationen eller underleverantörer (med betoning på molntjänster) och leder till ett underlag som kan användas för att skapa en generell metod för att effektivt göra likartade kartläggningar hos andra organisationer. Detta exjobb görs i samarbete med Svenska Kraftnät (Svk) inom ramen av forskningscentret RICS (www.rics.se).


Verktyg för att skapa syntetisk data och detektera anomalier

Contact: Simin Nadjm-Tehrani

Att säkerställa informationssäkerhet hos ett nätverkat system, t.ex. kritiska infrastrukturer som levererar samhällskritiska tjänster, bygger på analys av systemet under olika förutsättningar inklusive eventuella attack scenarier och felyttringar. För att kunna utföra systematiska och repeterbara tester där olika försvarsmekanismer utvärderas behöver man utsätta samma normalscenario för en mängd olika attacker och detektioner. Experiment med olika utgångspunkter kan skapas i en test nätverk där flera aktörer (forskare, leverantörer) kan testa sina prototyper och produkter. Därmed behöver data vara frikopplad från en viss organisation och inte kunna spåras till de ursprungliga miljöer där det skapades i. Målet med detta exjobb är att skapa syntetisk data som liknar realistisk data genom att "tvätta" data som normalt inte skulle vara tillgänglig inom en organisation, men som kan delas med andra aktörer under ordnade former. Exjobbsarbetet ska resultera i en metod med tillhörande verktyg som skapar syntetiska datan samt definiera kriterier och metrik för att validera både "likheten" med det ursprungliga datan och dessa anonimitetsegenskaper. Detta exjobb görs i samarbete med forskningscentret RICS (www.rics.se) och kommer till nytta för dess avnämare.


Last modified December 2020. If you have questions or suggestions for the webpages, contact the webmaster