SEsCPS 2017

3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS'17)

In conjunction with ICSE 2017, Buenos Aires, Argentina on May 21, 2017

Deadline extended till January 27th, 2017

Welcome and Keynote (8:30 – 9:45)
Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces
Bashar Nuseibeh (The Open University, UK & Lero, Ireland)
“Having Divided to Conquer We Must Reunite [to] Rule”. Decomposition of problems and systems into smaller, more manageable units has been at the heart of software engineering practice for decades. “Separation of concerns” gives software engineers the conceptual and practical tools to focus their attention, and their tools, on the parts of the problem or solution to which they are best suited. Perhaps one of the earliest boundaries used to separate concerns is that which exists between hardware and software – once that boundary is drawn, software engineers were able to focus their attention on the development of software within the hardware boundaries chosen. There has however, been a steady erosion of such boundaries: digital and physical connectivity have become the norm, and increasingly such connectivity can be ad hoc, spontaneous, and often unplanned (perhaps best exemplified by the Internet of Things paradigm). Moreover, the fluid and disappearing boundaries between technology and people have radically affected social behaviours (again, perhaps well exemplified by the proliferation of mobile and ubiquitous computing such as wearable and ‘smart’ technologies used in variety of personal and community settings). Such convergence between digital, physical, and social spaces has provided exciting opportunities for software engineers to, literally, ‘cross boundaries’, and, as a result, to have an impact on the physical and social worlds in which the software they build will operate. But in this brave new world with porous boundaries, security engineering and privacy management challenges abound. Effective security depends on the ability to control access to assets protected by boundaries. Effective privacy management depends on informed, consensual sharing of information across boundaries. Our thesis is that, although increasingly invisible, and rightly so, explicit awareness and sometimes representation of boundaries in cyber-physical-social systems facilitate good old fashioned separation of concerns, which in turn enables more effective software engineering of secure, privacy-aware software. We support our thesis with examples from our research in adaptive security and privacy.
Session #1: Engineering approaches to CPS (9:45 – 10:30)
Engineering Events in CPS - Experiences and Lessons Learned
Julius Ollesch, Marc Hesenius and Volker Gruhn
University of Duisburg-Essen, Germany
Toward Energy-Aware Programming for Unmanned Aerial Vehicles
Yu David Liu and Lukasz Ziarek
SUNY Binghamton and SUNY Buffalo, USA
McFSM: Globally Taming Complex Systems
Florian Murr and Wolfgang Mauerer
Siemens AG, Corporate Research, Germany and Technical University of Applied Sciences Regensburg, Germany
--- Break (10:30 – 11:00) ---
Session #2: Analysis of CPS (11:00 – 11:45)
Actor Based Root Cause Analysis in Distributed Environment
Michal Zasadzinski, Victor Muntés-Mulero and Marc Sóle Simo
CA Technologies, Spain
Bayesian Verification under Model Uncertainty
Lenz Belzner and Thomas Gabor
LMU Munich, Germany
Stacked Thompson Bandits
Lenz Belzner and Thomas Gabor
LMU Munich, Germany
Session #3: Security of CPS (11:45 – 12:30)
Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design
Barnaby Craggs and Awais Rashid
Lancaster University, UK
Software Engineering Challenges For Investigating Cyber-Physical Incidents
Faeq Alrimawi, Liliana Pasquale and Bashar Nuseibeh
The Open University, UK and Lero, Ireland
--- Lunch (12:30 – 14:00) ---
Session #4: Breakout Groups (14:00 – 15:30)
--- Break (15:30 – 16:00) ---
Session #5: Breakout Groups and Plenary Discussion (16:00 – 17:30)