Events: Informations- och kommunikationsteknik events at Chalmers University of TechnologyWed, 15 Mar 2017 15:59:24 +0100 Nowdehi, Computer Science and Engineering<p>HC1</p><p>On Securing Vehicular Communications: Methods and Recommendations for Secure In-vehicle and Car2X Communications.</p><img src="/SiteCollectionImages/Institutioner/DoIT/Profile%20pictures/NS/Nasser.png" class="chalmersPosition-FloatRight" alt="" style="margin:5px" />Today's vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle and Vehicle to Infrastructure (together called V2X) communications. Such level of connectivity enables car manufacturers to implement new entertainment systems and to provide safety features to decrease the number of road accidents. Moreover, authorities can deploy the traffic information provided by vehicular communications to improve the traffic management. Despite the great benefits that comes with vehicular communications, there are also risks associated with exposing a safety-critical integrated system to external networks. It has already been proved that vehicles can be remotely hacked and the safety critical functions such as braking system and steering wheel can be compromised to endanger the safety of passengers. This puts high demands on IT security and car manufacturers to secure vehicular communications. In this thesis, we propose methods and recommendations for improving the security of internal and external vehicular communications. <br /><br />The thesis is divided into two parts. In the first part, we identify weaknesses or deficiencies in the design of the ETSI V2X security standard and propose changes to fix the identified weaknesses or deficiencies. The second part of the thesis focuses on the security of the internal vehicular communications. First, in order to facilitate the implementation of security measures in in-vehicle networks, we propose an automated approach for grouping in-vehicle ECUs into domains based on different criteria. Then, we compare such an automatically generated in-vehicle network architecture with a reference architecture model to show that our approach is able to identify meaningful domains with better quality with respect to communication, safety and security. Finally, we seek to evaluate the applicability of existing CAN bus authentication solutions to a vehicular context. To this end, and in cooperation with industry, we have identified five critical requirements for an authentication solution to be used in such a context. We found that no authentication solution fulfilled all the requirements, something that indicates that the CAN bus may not be suitable for secure vehicular applications. Ho-Quang, Computer Science and Engineering<p>Jupiter 219</p><p>Mining Software Modeling Practices In Open Source Software Projects</p><img src="/SiteCollectionImages/Institutioner/DoIT/Profile%20pictures/SE/Truong-Quang.jpg" class="chalmersPosition-FloatRight" alt="" style="margin:5px" />Context: In modern software development, software modeling is considered as an essential part of the software architecture and design activity. The Unified Modeling Language (UML) has become the de facto standard for software modeling in industry. Surprisingly, there are few empirical evidences on the use of UML and a lack of evidence-based guidelines for applying UML in software development. Objective: As a first step toward synthesizing practical guidelines for the use of UML, this thesis focuses on collecting a large set of OSS projects that use UML. Subsequently this thesis offers observations on the use and impacts of using UML in OSS projects. Method: We combine techniques from repository mining and image classification in order to successfully identify more than 24 000 open source projects on GitHub that together contain more than 93 000 UML models. A quantita- tive analysis and a large-scale survey have been carried out across this set of projects. Result: The results show that UML is used in OSS projects and in those projects that use UML, UML helps new contributors and is generally perceived as supportive. The most important motivation for using UML seems to be to facilitate collaboration, as teams use UML during communication and planning of joint implementation efforts. We hope researchers in the field will find data and findings from this thesis a valuable source for their empirical studies. International Conference on Software Architecture (ICSA 2017)<p>Lindholmen Science Park</p><p>​April 3-7 | Gothenburg, Sweden</p>​ <br /><a href="" target="_blank"><img src="/SiteCollectionImages/Areas%20of%20Advance/Information%20and%20Communication%20Technology/News%20events/Calendar/ICSA-2017_logo-260x300.jpeg" class="chalmersPosition-FloatRight" alt="" style="margin:5px" /></a>ICSA is the premier venue for practitioners and researchers interested in software architecture, in component-based software engineering and in quality aspects of software and how these relate to the design of software architectures. ICSA keeps the characteristic of a WICSA as a working conference, where researchers meet practitioners and software architects can explain the problems they face in their day-to-day work and try to influence the future of the field.<br /><br />Go to the conference web: <a href="" target="_blank"></a> FOR A SUSTAINABLE SOCIETY<p>Chalmers conference center, Johanneberg</p><p>​Embodied, Embedded, Networked, Empowered through Information, Computation &amp; Cognition! Gothenburg, Sweden, 12-16 June 2017</p>​<img src="/SiteCollectionImages/Areas%20of%20Advance/Information%20and%20Communication%20Technology/News%20events/Calendar/is4si-logo.jpg" class="chalmersPosition-FloatRight" alt="" style="margin:5px" /><br />Welcome to the IS4SI 2017 Summit, presented by the International Society for Information Studies.<br /><br />Go to conference web: <a href="" target="_blank"></a> to IFIPTM 2017 in Gothenburg!<p>Jupiter building, Lindholmen.</p><p></p>IFIPTM, the IFIP WG 11.11 International Conference on Trust Management is coming to Gothenburg! <br />The trust management community will convene for five days and engage in inspiring talks, technical demonstrations, a graduate symposium, and many other activities. The mission of the IFIP TM Conference is to share research solutions to problems of Trust and Trust management, including related Security and Privacy issues, and to identify new issues and directions for future research and development work. ACM Symposium on Virtual Reality Software and Technology (VRST) 2017<p>Chalmers Gothenburg (location to be decided)</p><p>​VRST will provide an opportunity for VR researchers to interact, share new results, show live demonstrations of their work, and discuss emerging directions for the field.</p>​ <br />The ACM Symposium on Virtual Reality Software and Technology (VRST) is an international forum for the exchange of experience and knowledge among researchers and developers concerned with virtual reality software and technology. <br /><br /><a href="" target="_blank">To conference website:</a><br /><br />