Philipp Zech's research while affiliated with University of Innsbruck and other places

Publications (29)

Article
en Both conventional and mechanized tunnelling have a fantastic tradition. The technical progress of the industry moved in step with social developments, characterized by crises and leaps in innovation. In the field of mechanized tunnelling, the driving force for some years now has been the desire to excavate heterogeneous construction sites with c...
Chapter
ROSSINI is a DiY educational robotics project launched in Tyrol in 2017. ROSSINI aims at providing a platform for children and youngsters to gain their first experiences with robotics and related technologies, viz., mechanical and electrical, as well as software engineering, embedded in the context of both design thinking and upcycling.
Article
Full-text available
This article introduces a new method for knowledge-based security testing by logic programming and the related tool implementation for model-based non-functional security testing of web applications. Our method helps to overcome the current prevalent focus on functional instead of non-functional (or negative) requirements as well as the required hi...
Article
Full-text available
Understanding and defining the meaning of “action” is substantial for robotics research. This becomes utterly evident when aiming at equipping autonomous robots with robust manipulation skills for action execution. Unfortunately, to this day we still lack both a clear understanding of the concept of an action and a set of established criteria that...
Preprint
Full-text available
Understanding and defining the meaning of "action" is substantial for robotics research. This becomes utterly evident when aiming at equipping autonomous robots with robust manipulation skills for action execution. Unfortunately, to this day we still lack both a clear understanding of the concept of an action and a set of established criteria that...
Article
Full-text available
J. J. Gibson’s concept of affordance, one of the central pillars of ecological psychology, is a truly remarkable idea that provides a concise theory of animal perception predicated on environmental interaction. It is thus not surprising that this idea has also found its way into robotics research as one of the underlying theories for action percept...
Article
Full-text available
Model-based testing has gained widespread acceptance over the last decade, not only in academia but also in industry. Despite its powerful features of abstraction and automation, most existing approaches and tools provide only limited support for regression testing. Yet regression testing, the repeated execution of selected test cases after system...
Article
Full-text available
We guess humans start acquiring grasping skills as early as at the infant stage by virtue of two key processes. First, infants attempt to learn grasps for known objects by imitating humans. Secondly, knowledge acquired during this process is reused in learning to grasp novel objects. We argue that these processes of active and transfer learning boi...
Article
Full-text available
Human ability of both versatile grasping of given objects and grasping of novel (as of yet unseen) objects is truly remarkable. This probably arises from the experience infants gather by actively playing around with diverse objects. Moreover, knowledge acquired during this process is reused during learning of how to grasp novel objects. We conjectu...
Article
Full-text available
Robotic grasping traditionally relies on object features or shape information for learning new or applying already learned grasps. We argue however that such a strong reliance on object geometric information renders grasping and grasp learning a difficult task in the event of cluttered environments with high uncertainty where reasonable object mode...
Article
Full-text available
Model-based security testing relies on models to test whether a software system meets its security requirements. It is an active research field of high relevance for industrial applications, with many approaches and notable results published in recent years. This article provides a taxonomy for model-based security testing approaches. It comprises...
Chapter
Full-text available
Today's increasing trend towards outsourcing IT landscapes and business processes into the Cloud is a double-edged sword. On the one side, companies can save time and money; however, on the other side, moving possible sensitive data and business processes into the Cloud demands for a high degree of information security. In the course of this chapte...
Conference Paper
Full-text available
In recent years, the complexity of software systems has increased drastically. But methods for assuring their security by testing failed to keep up with this increased complexity. As a result, currently security testing at the most is done by penetration testing, which lacks an underlying structured method. Thus, in this paper we propose an automat...
Conference Paper
Full-text available
Security testing still is a hard task, especially if focusing on non-functional security testing. The two main reasons behind this are, first, at the most a lack of the necessary knowledge required for security testing, second, managing the almost infinite amount of negative test cases, which result from potential security risks. To the best of our...
Conference Paper
Full-text available
Inspired by biological systems, complex object manipulation can benefit from using the environment to stabilize the involved objects. We show that this holds as well for robotic manipulation by evaluating how the environment can be used to optimize a screwing task. We compared the same manipulation with and without using the environment. We were ab...
Chapter
Full-text available
In this chapter, the authors present an agile and model-driven system testing methodology for service-centric systems called Telling TestStories. The methodology has a tool implementation and is based on separated system, requirements, and test models that can be validated in an integrated way. Test models contain test stories describing test behav...
Conference Paper
Full-text available
Today's ongoing trend towards intense usage of web service based applications in daily business and everybody's daily life poses new challenges for security testing. Additionally, such applications mostly not execute in their own runtime environment but instead are deployed in some data center, run alongside multiple other applications, and serve d...
Chapter
Full-text available
Today’s increasing trend towards outsourcing IT landscapes and business processes into the Cloud is a double-edged sword. On the one side, companies can save time and money; however, on the other side, moving possible sensitive data and business processes into the Cloud demands for a high degree of information security. In the course of this chapte...
Conference Paper
Full-text available
Model-based testing has gained widespread acceptance in the last few years. Models enable the platform independent analysis and design of tests in an early phase of software development resulting in effort reduction in terms of time and money. Furthermore, test models are easier to maintain than test code when software systems evolve due to their p...
Conference Paper
Full-text available
The development of secure software systems strongly relies on the availability of a known risk profile. In cloud computing, such a known risk profile does not exist yet, resulting in highly insecure cloud deployments. In our paper we propose a textual modeling language for cloud deployments making it possible to derive a risk profile using a risk a...
Conference Paper
Full-text available
The increased deployment of service centric systems in security critical application contexts poses new challenges to properly test such a system's security. If taking a closer look at the inherent complexity of such applications, sophisticated approaches to testing security are indispensable. In our paper we propose a novel model - based methodolo...
Conference Paper
Full-text available
In recent years Cloud computing became one of the most aggressively emerging computer paradigms resulting in a growing rate of application in the area of IT outsourcing. However, as recent studies have shown, security most of the time is the one requirement, neglected at all. Yet, especially because of the nature of usage of Cloud computing, securi...
Conference Paper
Assuring the security of a software system in terms of testing nowadays still is a quite tricky task to conduct. Security requirements are taken as a foundation to derive tests to be executed against a system under test. Yet, these positive requirements by far do not cover all the relevant security aspects to be considered. Hence, especially in the...
Article
Full-text available
Security testing defines tests for security require-ments of software. Security requirements are non-functional, and thus require a different way of testing compared to functional requirements. Model-based testing applies model-based design for modeling test artifacts or the automation of test activi-ties. Although model-based testing techniques im...
Article
Full-text available
We present a tool environment and its underlying principles for Telling TestStories, an approach to model-driven system testing of service-oriented systems. Telling TestStories is based on tightly integrated platform–independent system and test models. The approach is capable of test–driven development on the model level, and guarantees high qualit...
Conference Paper
Full-text available
With the increasing number of service oriented system implementations, new challenges concerning their development and testing are emerging.This paper presents an approach for model-driven system testing of service oriented systems. The approach offers a systematic testing methodology and it is based on tightly integrated system and test models wit...
Article
Full-text available
With the increasing number of service oriented system implementations, new challenges concerning their de-velopment and testing are emerging. This paper presents an approach for model–driven system testing of service oriented systems. The approach offers a systematic testing methodology and it is based on tightly integrated system and test models w...

Citations

... We established our school outreach program several years ago, and apart from some Lego Mindstorms classes we saw very little robotics in Tyrolean schools. So we started specialized efforts to bring educational robotics and physical computing to schools ( [1], [3], [5]). We as well had specialized university courses to teach our student teachers possibilities on how to do robotics in schools and guide teachers to build and program robots with their students to participate in national 'and international robotic competitions. ...
... In the previous section, we learned one par tic u lar perspective on actions-namely, underdetermined action descriptions and how they can be used to help the robotic agent generate the motions that accomplish goals and avoid unwanted side effects. In this section we look at other perspectives that take complementary views and facilitate other modes of reasoning actions that complement the mechanism introduced in the previous section (Zech et al. 2019). ...
... In this work however we only study our grasp learning methods in simulation (Section VI). Thus, we randomly select points on the object's surface to then find a grasp by optimizing the gripper's pose about its orientation [34]. ...
... It will be demonstrated experimentally that such inductive bias helps to correctly detect objects that were excluded from training and greatly improves scores when compared to the state-of-the-art CNNs. When it comes to affordances [7], [8], which in robotics are typically associated with object parts (e.g., the handle of a cup affords for grasp), the introduced inductive bias significantly improves the detection even on unforeseen objects. We show experimentally that such better out-of-distribution generalization results in higher affordances success rates when determining the right grasping pose for an object. ...
... It can prevent security incidents from occurring or minimize damage in the event of an incident. For technical and cost reasons, the focus has been solely on the usability of computers and networks, with no consideration given to security from design to implementation [7]. is has proven to create a variety of security risks for information infrastructures. ...
... Many methods extract viable grasping points on the objects, independently if the object is known or novel to the system, thus not explicitly considering the target's affordance. Examples of such works are (Ardón, Dragone, and Erden 2018;Lenz, Lee, and Saxena 2015;Zech and Piater 2016), to mention some. Others focus on learning the robot's control and dynamic models to achieve a grasp, such as (Stoytchev 2005;Bonaiuto and Arbib 2015). ...
... Most of these are not yet solved in research by themselves, not to speak of combining them in order to design systems that can stand up to a comparison with humans. However, there is research by Meeussen et al. (2010), Mülling et al. (2013), Abu-Dakka et al. (2014), and Hangl et al. (2014Hangl et al. ( , 2015 on efficiently solving specific problems (or specific classes of problems). ...
... (2) An expert system for security testing in Prolog, which comprises both a security risk analysis and a grammarbased test data generator. Our expert system contributes (i) predicates for codifying security vulnerability knowledge, (ii) rules to infer new knowledge, i.e., a risk profile RP, from a security problem SP by on the grounds of the codified security vulnerability knowledge, as well as (iii) rules and grammars for generating malicious test data [12,13]. (3) Two domain-specific languages (DSLs) for abstracting both declarative models of web applications, i.e., security problems SP, and their corresponding risk profiles RP. ...
... More recently Zech et al. [38] proposed a model-based approach to evaluate the security of the cloud environment by means of negative testing based on the Telling Test Stories Framework. MBT provides the benefit of being implementation independent. ...
... Our method generates effective test cases by an executable specification as to the risk profile RP and according test data. Our method returns with a verdict, which is either pass, fail, or inconclusive, depending on whether a test succeeds, fails, or none of pass or fail can be stated [9][10][11]. (2) An expert system for security testing in Prolog, which comprises both a security risk analysis and a grammarbased test data generator. Our expert system contributes (i) predicates for codifying security vulnerability knowledge, (ii) rules to infer new knowledge, i.e., a risk profile RP, from a security problem SP by on the grounds of the codified security vulnerability knowledge, as well as (iii) rules and grammars for generating malicious test data [12,13]. ...