ElaineYao / swarmflaw

SwarmFlawFinder Project Website

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms

This is the project page for the submission "SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms."

This repository includes all the developed tools, data, and results. In addition, supplementary materials to the paper, not included due to the paper's space limit, can be found below.

Code

  • This sub page has code used in this paper including tools, data, and fixes (with original algorithms).
  • Link to open the subpage

Supplymentary Materials to the Paper

  • In Section IV. Design; A. Test-run Definition and Creation, we mention "Attack Strategy (S)" and refer to this webpage to illustrate the attack strategies.
  • Link to open the subpage
  • In Section IV. Design; D. Testing with Multiple Attack Drones, we refer to this webpage for an example scenario with multiple attack drones to elaborate how our system handle multiple drones.
  • Link to open the subpage
  • In Section V. Evaluation; B. Effectiveness in Finding Logic Flaws, we refer to this webpage for the quality and performance overhead of our suggested fixes.
    • This sub page includes
      1. The quality of fixes for A2, A3, and A4 (A1 is in the paper)
      2. Performance overhead of the fixes and integrated fixes (for all algorithms)
  • Link to open the subpage
  • In Section V. Evaluation; C. Effectiveness of DCC in Fuzz Testing, we refer to this webpage for the spatial distribution of test-cases generated by algorithms A2, A3, and A4.
  • Link to open the subpage
  • In Section V. Evaluation; C. Effectiveness of DCC in Fuzz Testing; 3. Impact of Searching Space on Random Testing, we refer to this webpage for the additional experiments of SwarmFlawFinder and the random testing approach with 3 different search space restrictions.
    • This subpage provides additional results for SwarmFlawFinder under different search space restrictions.
  • Link to open the subpage
  • In Section IV. Design; D. Testing with Multiple Attack Drones, we refer to this webpage for the details of the number of additional attack drones and overhead.
  • Link to open the subpage

A. Additional Materials for Clarifications

  • We present additional materials that might be useful in understanding our work but are not referred to in the paper.
    • A.1. Statistics of Random Testing Approach and SwarmFlawFinder
      • To support the random testing approach is less effective than SwarmFlawFinder, this page shows the number of identified unique attacks from the random testing taking an example of A1.
      • Link to open the subpage
    • A.2. Analysis on Mission Failures Exclusively found by Random Testing Approach
      • This page explains that the instances on the top of the gray circle are variants of what SwarmFlawFinder already identified.
      • Link to open the subpage
    • A.3. Activated Attack Strategies during Evaluation
      • We report what attack strategies were frequently activated (might be effective) during testing for each algorithm.
      • Link to open the subpage

About

SwarmFlawFinder Project Website


Languages

Language:Jupyter Notebook 32.0%Language:C# 18.1%Language:Roff 15.5%Language:Python 12.1%Language:R 9.2%Language:MATLAB 7.5%Language:Shell 2.0%Language:NetLogo 1.5%Language:HTML 1.5%Language:CMake 0.2%Language:ShaderLab 0.2%Language:C 0.0%Language:M 0.0%