Marcus Völp
YOU?
Author Swipe
View article: TACO: A Toolsuite for the Verification of Threshold Automata
TACO: A Toolsuite for the Verification of Threshold Automata Open
TACO: A Toolsuite for the Verification of Threshold Automata This upload contains the artifact of the TACO toolsuite for the verification of threshold automata, as submitted to the TACAS 2026 artifact evaluation. It contains a single `.zip…
View article: Termination in Extended Probabilistic Threshold Automata
Termination in Extended Probabilistic Threshold Automata Open
View article: Automatic WSTS-based repair and deadlock detection of parameterized systems
Automatic WSTS-based repair and deadlock detection of parameterized systems Open
We present an algorithm for the repair of parameterized systems that can be represented as well-structured transition systems. The repair problem is, for a given process implementation, to find a refinement such that a given safety propert…
View article: Parameterized Verification of Round-Based Distributed Algorithms via Extended Threshold Automata
Parameterized Verification of Round-Based Distributed Algorithms via Extended Threshold Automata Open
Threshold automata are a computational model that has proven to be versatile in modeling threshold-based distributed algorithms and enabling their completely automatic parameterized verification. We present novel techniques for the verific…
View article: Automatic WSTS-based Repair and Deadlock Detection of Parameterized Systems
Automatic WSTS-based Repair and Deadlock Detection of Parameterized Systems Open
We present an algorithm for the repair of parameterized systems that can be represented as well-structured transition systems. The repair problem is, for a given process implementation, to find a refinement such that a given safety propert…
View article: The ADMORPH Approach for Adaptively Morphing Embedded Systems
The ADMORPH Approach for Adaptively Morphing Embedded Systems Open
Due to the increasing performance demands of missionand safety-critical Cyber-Physical Systems (of Systems), these systems exhibit a rapidly growing complexity, manifested by an increasing number of (distributed) computational cores and ap…
View article: Tolerating Disasters with Hierarchical Consensus
Tolerating Disasters with Hierarchical Consensus Open
Geo-replication provides disaster recovery after catastrophic accidental failures or attacks, such as fires, blackouts or denial-of-service attacks to a data center or region. Naturally distributed data structures, such as Blockchains, whe…
View article: Efficient On-Chip Replication
Efficient On-Chip Replication Open
As resilience challenges evolve, namely in safety- and security-critical environments, the demand for cost-efficient, automated and unattended fault and intrusion tolerance (FIT) grows. However, current on-chip solutions typically target o…
View article: The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip
The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip Open
The hardware computing landscape is changing. What used to be distributed systems can now be found on a chip with highly configurable, diverse, specialized and general purpose units. Such Systems-on-a-Chip (SoC) are used to control today's…
View article: Enhancing the Reliability of Perception Systems using N-version Programming and Rejuvenation
Enhancing the Reliability of Perception Systems using N-version Programming and Rejuvenation Open
Machine Learning (ML) has become indispensable for real-world complex systems, such as perception systems of autonomous systems and vehicles. However, ML-based systems are sensitive to input data, faults, and malicious threats that can deg…
View article: The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip
The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip Open
The hardware computing landscape is changing. What used to be distributed systems can now be found on a chip with highly configurable, diverse, specialized and general purpose units. Such Systems-on-a-Chip (SoC) are used to control today’s…
View article: Toward resilient autonomous driving—An experience report on integrating resilience mechanisms into the Apollo autonomous driving software stack
Toward resilient autonomous driving—An experience report on integrating resilience mechanisms into the Apollo autonomous driving software stack Open
Autonomous driver assistance systems (ADAS) have been progressively pushed to extremes. Today, increasingly sophisticated algorithms, such as deep neural networks, assume responsibility for critical driving functionality, including operati…
View article: I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies Open
Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privac…
View article: Program
Program Open
View article: Secure and distributed assessment of privacy-preserving GWAS releases
Secure and distributed assessment of privacy-preserving GWAS releases Open
Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome dat…
View article: Security Modeling and Analysis of Moving Target Defense in Software Defined Networks
Security Modeling and Analysis of Moving Target Defense in Software Defined Networks Open
The use of traditional defense mechanisms or intrusion detection systems presents a disadvantage for defenders against attackers since these mechanisms are essentially reactive. Moving target defense (MTD) has emerged as a proactive defens…
View article: Behind the last line of defense: Surviving SoC faults and intrusions
Behind the last line of defense: Surviving SoC faults and intrusions Open
View article: Secure and Distributed Assessment of Privacy-Preserving Releases of GWAS
Secure and Distributed Assessment of Privacy-Preserving Releases of GWAS Open
Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome dat…
View article: I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies Open
Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privac…
View article: Federated Geometric Monte Carlo Clustering to Counter Non-IID Datasets
Federated Geometric Monte Carlo Clustering to Counter Non-IID Datasets Open
Federated learning allows clients to collaboratively train models on datasets that are acquired in different locations and that cannot be exchanged because of their size or regulations. Such collected data is increasingly non-independent a…
View article: From Graphs to the Science Computer of a Space Telescope
From Graphs to the Science Computer of a Space Telescope Open
View article: Parameterized Repair of Concurrent Systems.
Parameterized Repair of Concurrent Systems. Open
We present an algorithm for the repair of parameterized systems. The repair problem is, for a given process implementation, to find a refinement such that a given property is satisfied by the resulting parameterized system, and deadlocks a…
View article: Automatic Repair and Deadlock Detection for Parameterized Systems
Automatic Repair and Deadlock Detection for Parameterized Systems Open
We present an algorithm for the repair of parameterized systems. The repair problem is, for a given process implementation, to find a refinement such that a given safety property is satisfied by the resulting parameterized system, and dead…
View article: SI‐AKAV: Secure integrated authentication and key agreement for cellular‐connected IoT devices in vehicular social networks
SI‐AKAV: Secure integrated authentication and key agreement for cellular‐connected IoT devices in vehicular social networks Open
Vehicular social networking (VSN), as a novel communication paradigm, exploits opportunistic encounters among vehicles for mobile social networking, collaborative content dissemination, and to provide a variety of services for users and th…
View article: EphemeriShield -- defence against cyber-antisatellite weapons
EphemeriShield -- defence against cyber-antisatellite weapons Open
Satellites, are both crucial and, despite common misbelieve, very fragile parts our civilian and military critical infrastructure. While, many efforts are focused on securing ground and space segments, especially when national security or …
View article: Randomization as Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Real-Time Systems with Task Replication
Randomization as Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Real-Time Systems with Task Replication Open
Time-triggered real-time systems achieve deterministic behavior using schedules that are constructed offline, based on scheduling constraints. Their deterministic behavior makes time-triggered systems suitable for usage in safety-critical …
View article: PriLok: Citizen-protecting distributed epidemic tracing
PriLok: Citizen-protecting distributed epidemic tracing Open
Contact tracing is an important instrument for national health services to fight epidemics. As part of the COVID-19 situation, many proposals have been made for scaling up contract tracing capacities with the help of smartphone application…
View article: Behind the Last Line of Defense -- Surviving SoC Faults and Intrusions
Behind the Last Line of Defense -- Surviving SoC Faults and Intrusions Open
Today, leveraging the enormous modular power, diversity and flexibility of manycore systems-on-a-chip (SoCs) requires careful orchestration of complex resources, a task left to low-level software, e.g. hypervisors. In current architectures…
View article: Impact of AS6802 Synchronization Protocol on Time-Triggered and Rate-Constrained Traffic
Impact of AS6802 Synchronization Protocol on Time-Triggered and Rate-Constrained Traffic Open
TTEthernet is an Ethernet-based synchronized network technology compliant with the AFDX standard. It supports safety-critical applications by defining different traffic classes: Time-Triggered (TT), Rate-Constrained (RC), and Best-Effort t…
View article: LIPIcs, Volume 165, ECRTS 2020, Complete Volume
LIPIcs, Volume 165, ECRTS 2020, Complete Volume Open
LIPIcs, Volume 165, ECRTS 2020, Complete Volume