Assignment title: Management
CSD 2600 – Coursework 2:
Journal Paper on Concurrency and Dropbox
It is strongly advised to follow the outline of the Seminars sheets (Seminar 4
and 5) and Lab sheets (Lab 4 and 5).
Scenario for the assignment:
Concurrency problems with cloud services; service example is Dropbox; a
solution is mutual exclusion (Mutex).
Simple example scenario: Two users have access to a shared Dropbox folder.
Both want to read and write the same file. This may create a concurrency
issue.
A standard solution is to use a semaphore or a monitor.
Assignment Requirements:
The journal paper must describe the background of the project, i.e.
Concurrency and Dropbox. The Concurrency problem must be illustrated
using Finite State Machines (FSM) or Finite State Processes (FSP), and
Erlang. The solution (Mutex) must also be illustrated in FSM/FSP and
implemented in Erlang.
• The background: Dropbox and Erlang
• The concurrency problem using some high level description like FSM
or FSP. How does this manifest itself in your Erlang implementation?
• What is your solution idea/algorithm? (Mutex probably)
• Solution in Erlang including some analysis (tests, problems
encountered).
Formal Journal Requirements:
• The report should demonstrate qualities in terms of writing skills,
format, and contents.
• Maximum 5 pages
• NO plagiarism
• Your own words with the exception of quotations from other sources
that should be highlighted in quotation marks "…" and referenced
• The Journal must be written in the provided IEEE format (can be found
in the Internet, latex or word. A word template is on Moodle.)
• The Erlang source code must be submitted together with the paper as a tared
or zipped collection of ASCII files and will be marked for functional
correctness and completeness (Solution/Evaluation).Recommended General Journal Paper Structure
• Abstract
• Summary of your work – very important !! (it is the most read)
• Introduction
• Places the work in the appropriate context, gently introduces the
subject, introduces related approaches and concludes with a
roadmap
• Background
• basic concepts and terminology to understand your work
• Possible approaches
• Various solutions
• Discussion
• Critically evaluate all solutions – pros and cons
• Future works / improvements (if any)
• Conclusions
• Summaries and underlines major concepts
• References
• Look in google scholar
• IEEE and ACM digital libraries
• NOT JUST WIKIPEDIA
Marking Scheme:IEEE Paper Format: Example
Investigating Airplane Safety and Security against
Insider Threats Using Logical Modeling
Florian Kammuller ¨
Middlesex University London
[email protected]
Manfred Kerber
University of Birmingham
[email protected]
Abstract—In this paper we consider the limits of formal modeling of infrastructures and the application of social explanation
for the analysis of insider threats in security and safety critical
areas. As an area of study for the analysis we take examples from
aviation, firstly since incidents are typically well-documented and
secondly since it is an important area per se. In March 2015, a
Germanwings flight has crashed in the French Alps in what
is quite firmly believed to have been intentionally caused by
the copilot who has locked the pilot out of the cockpit and
programmed the autopilot on constant descent. We investigate
the security controls and policies in airplanes against insider
threats using logical modeling in Isabelle.
I. INTRODUCTION AND OVERVIEW
In this paper, we take a critical look at logical methods
to model and analyse safety and security critical systems.
In particular, we address recent advances in applying formal
verification techniques, e.g. [1], in the context of severe
incidents like the tragic crash of a Germanwings flight: "On
March 24, 2015 Germanwings Flight 9525, a scheduled flight
from Barcelona to Dusseldorf was hijacked by the co-pilot. 30 ¨
minutes after takeoff Andreas Lubitz locked himself in [the]
cockpit when [the] captain went out for a rest. Then the copilot started to descend. [The] captain ... tried to communicate
with Lubitz, but he didn't reply. After 8 minutes of falling the
airplane crashed in the Alps near the French village PradsHaute-Blone. There were 144 passengers and 6 crew members
on board. None of them survived the crash." [2]
In this paper, we first summarize the development of airplane security (Section II) before we model and analyse the
specific settings in passenger transport airplanes using the
Isabelle Insider framework (Section III) leading to a discussion
and conclusions (Section IV).
It should be noted that with insider attacks there are two
fundamentally different approaches. The first is based on
probabilistic reasoning and cost analysis. For instance, if in a
company there is a leakage in low-cost pens, since employees
take them home then the company must consider whether
imposing a strict control regime involving CCTV cameras is
cost effective in eliminating the problem. The company may
conclude that cheaper measures minimize the overall cost of
lost pens and measures to lose only few.
The second approach is based on Boolean reasoning in
which it is investigated whether certain attacks are possible
or not. That is, a model of a real world situation is built and
then it is checked or proved that a particular situation can occur
or not, for instance, by checking whether a particular state is
reachable from an initial state or not. Such an approach would
be applied, for instance, if a particular situation is unacceptable
and has to be avoided at all cost. As a consequence, for
airplane safety this will be the method of choice and is
the approach taken in the following. Of course, this does
not mean that the approach gives 100% guarantees. The
main problem is that any model of a real world situation
is necessarily incomplete since it abstracts from (hopefully
only irrelevant) details. However, it is difficult to establish that
nothing essential has been overlooked.
A. Related Work
We consider here some main threads of work by others
while discussing the relationship of the contribution of this
paper to our own previous work in Section IV.
The Insider threat patterns provided by CERT [3] use the
System Dynamics models, which can express dependencies
between variables. The System Dynamics approach is also
successfully being applied in other approaches to Insider
threats, for example, in the modeling of unintentional insider
threats [4]. Axelrad et al. [5] have used Bayesian networks for
modelling Insider threats in particular the human disposition.
In comparison, the model we rely on for modeling the human
disposition in the Isabelle Insider framework is a simplified
classification following the taxonomy provided by [6]. On
the other side, compared to all these approaches, our work
provides an additional model of infrastructures and policies
allowing reasoning at the individual and organisational level.
In the domain of rigorous analysis of airplane systems, work
often follows for practical and economic reasons a philosophy
of using a mix of formal and systematic informal methods.
An example from airplane maintenance procedures [7] uses
a security evaluation methodology following the Common
Criteria and a formal model and verification with the model
checker AVISPA. In comparison, we use a more expressive
logical model in the Isabelle Insider framework than their
AVISPA specification. Also, we believe that our work is the
first to consider Insider threats within airplane safety and
security at least in a formal way.
On the formal side within the Insider threat community
in general, the work by Bishop et al [8] is relevant to the
Isabelle Insider framework since it also uses a formal model
to analyse Insider threats. Bishop and colleagues use the