A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Context-aware Monitoring in Robotic Surgery
[article]
2019
arXiv
pre-print
Our preliminary results show that violations of these safety constraints lead to unsafe events, and there is often sufficient time between the constraint violation and the safety-critical event to allow ...
We present a context-aware safety monitoring system which segments a surgical task into subtasks using kinematics data and monitors safety constraints specific to each subtask. ...
Our preliminary results show that violations of these safety constraints lead to unsafe events, and there is often sufficient time between the constraint violation and the safety-critical event to allow ...
arXiv:1901.09802v1
fatcat:cvmxp26curgqvld5b2dxm4ldvy
An Approach to Modeling Software Safety in Safety-Critical Systems
2009
Journal of Computer Science
Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. ...
design, run-time issues management and software safety-critical testing. ...
In addition to the specific safety constraints developed for the system being designed, the design should incorporate basic safety design principles. ...
doi:10.3844/jcs.2009.311.322
fatcat:zrr4r4wkmbce3lm3l5xtm7obty
An Approach to Modeling Software Safety in Safety-Critical Systems
2009
Journal of Computer Science
Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. ...
design, run-time issues management and software safety-critical testing. ...
In addition to the specific safety constraints developed for the system being designed, the design should incorporate basic safety design principles. ...
doi:10.3844/jcssp.2009.311.322
fatcat:22fbiscewzabhnjiqupfreaumu
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems
[article]
2021
arXiv
pre-print
Cyber-Physical Systems (CPS) are being widely adopted in critical infrastructures, such as smart grids, nuclear plants, water systems, transportation systems, manufacturing and healthcare services, among ...
In this work, we propose to enforce a full-stack memory-safety (covering user-space and kernel-space attack surfaces) based on secure compiling of PLCs to detect memory-safety attacks in CPS. ...
They are primarily designed to abort or reboot the victim system when a memory-safety attack or violation is detected, thus leading to system unavailability. ...
arXiv:2012.12529v4
fatcat:xfdy7i6jjbfyjowqpyrdxwqjpq
STPA-driven Multilevel Runtime Monitoring for In-time Hazard Detection
[article]
2022
arXiv
pre-print
Runtime verification or runtime monitoring equips safety-critical cyber-physical systems to augment design assurance measures and ensure operational safety and security. ...
These interaction failures pose challenges to runtime verification regarding monitoring specifications and monitoring placements for in-time detection of hazards. ...
Runtime safety assurance via monitors is important for promptly detecting safety constraints and requirements violations to prevent a hazard. ...
arXiv:2204.08999v3
fatcat:h2nlk7xsfbbd7oc6o7ro52bqg4
ICAROUS: Integrated configurable algorithms for reliable operations of unmanned systems
2016
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC)
The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and contingency control functions. ...
A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight ...
ACKNOWLEDGMENT Special thanks to Connor Brooks and Alex Rivera for their contribution to the visual obstacle detection logic and their support to the ICAROUS project. ...
doi:10.1109/dasc.2016.7778033
fatcat:vvhi3vvs4rh2fghf5nqs7egsdy
Adversary Detection and Resilient Control for Multi-Agent Systems
[article]
2022
arXiv
pre-print
This work analyzes agent behaviors based on certain behavior metrics, and designs a proactive adversary detection mechanism based on the notion of the critical region for the system operation. ...
This paper presents an adversary detection mechanism and a resilient control framework for multi-agent systems under spatiotemporal constraints. ...
INTRODUCTION In recent years, research for safety-critical systems has received vast recognition as safety is one of the prime requirements for autonomous systems. ...
arXiv:2207.10275v1
fatcat:x2dyrnwixvhqhisc7su5cqkh5u
Introducing the STAMP method in road tunnel safety assessment
2012
Safety Science
In such systems, human and organizational factors, software errors, design flaws and the safety culture of the system are not efficiently handled by the current QRA methods and systemic accident models ...
The STAMP method is applied to a case study analysis in the safety critical process of tunnel ventilation during an emergency. ...
Similarly, safety critical components of the tunnel ventilation system are not given by the designers to the maintenance process for prioritization of effort. ...
doi:10.1016/j.ssci.2012.04.013
fatcat:ybu4rmpb3fd4lentzjmjmivbxq
Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS
[article]
2019
arXiv
pre-print
Memory-safety attacks have been one of the most critical threats against computing systems. ...
This might not be acceptable in systems with stringent timing constraints, such as cyber-physical systems (CPS), since the system unavailability leaves the control system in an unsafe state. ...
This makes ASan to be impractical for critical systems with hard real-time constraints. ASan does also provide a special mode to continue execution even after detecting a memory-safety error. ...
arXiv:1809.07477v2
fatcat:qhmxbu7qene2pmsmtywstuuaae
Architecting Safety Supervisors for High Levels of Automated Driving
2018
2018 21st International Conference on Intelligent Transportation Systems (ITSC)
The complexity of automated driving poses challenges for providing safety assurance. ...
We conclude with identified directions for further work. ...
There is a strong tradition towards the use of simplicity for safety critical parts, and heavy redundancy when safety requires availability (such as in aircraft control systems), see e.g. [4] . ...
doi:10.1109/itsc.2018.8569945
dblp:conf/itsc/TorngrenZM0STCW18
fatcat:y6hg6jdk35fjnh2ndrvj5m3ljm
Integrate Online Model Checking into Distributed Reconfigurable System on Chip with Adaptable OS Services
[chapter]
2010
IFIP Advances in Information and Communication Technology
This paper presents a novel flexible, dependable, and reliable operating system design for distributed reconfigurable system on chip. ...
Such adaptable services may be required by real time safety-critical applications. The flexibility introduced in executing adaptable OS services also gives rise to a potential safety problem. ...
In this sense, both checking modes are useful for safety-critical systems. ...
doi:10.1007/978-3-642-15234-4_11
fatcat:theu2zxvhncclobz34l6kpzdiq
A Framework for Safety Violation Identification and Assessment in Autonomous Driving
2019
International Joint Conference on Artificial Intelligence
This work presents a framework for mapping safety-critical situations based on safety measures in CARLA simulator. ...
In the simulation environment, our evaluations showed promising and intuitive results on identification of safety violations of two machine learning agents. ...
Since collisions are a violation to safety, therefore avoiding collisions is indispensable for detecting safety-critical situations. ...
dblp:conf/ijcai/HeinzmannSOSK19
fatcat:uqlrboobk5f2tizbv27agt42dy
STPA-SafeSec: Safety and security analysis for cyber-physical systems
2017
Journal of Information Security and Applications
In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. ...
As today's critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. ...
This single approach allows the interdependencies between safety and security constraints to be detected and used in mitigation strategies; (ii) the most critical system components can be prioritized for ...
doi:10.1016/j.jisa.2016.05.008
fatcat:wtunk5z4kjaljgqy364snvkm5q
An overview of fault tolerance techniques for real-time operating systems
2013
ICCKE 2013
RTOSs are widely used in safety-critical domains. In these domains all the system's requirements should be met and a catastrophe occurs if the system fails. ...
Hence, fault tolerance is an essential requirement of RTOSs employed in safety-critical domains. ...
Hence RTOSs are widely used in safety-critical systems. Military and civilian aircrafts, nuclear plants, and medical devices are examples of safety-critical systems. ...
doi:10.1109/iccke.2013.6739552
fatcat:7vmncc2uv5fqze4yivdjc423d4
A systems approach to risk management through leading safety indicators
2015
Reliability Engineering & System Safety
The goal of leading indicators for safety is to identify the potential for an accident before it occurs. ...
This paper describes a new and different approach to identifying system-specific leading indicators and provides guidance in designing a risk management structure to generate, monitor and use the results ...
In STAMP, accidents result from the violation of safety constraints on system operation. ...
doi:10.1016/j.ress.2014.10.008
fatcat:4mx7tytjzra6vdnkz5s2tcprvq
« Previous
Showing results 1 — 15 out of 41,027 results