Filters








41,027 Hits in 4.4 sec

Context-aware Monitoring in Robotic Surgery [article]

Mohammad Samin Yasar, David Evans, Homa Alemzadeh
2019 arXiv   pre-print
Our preliminary results show that violations of these safety constraints lead to unsafe events, and there is often sufficient time between the constraint violation and the safety-critical event to allow  ...  We present a context-aware safety monitoring system which segments a surgical task into subtasks using kinematics data and monitors safety constraints specific to each subtask.  ...  Our preliminary results show that violations of these safety constraints lead to unsafe events, and there is often sufficient time between the constraint violation and the safety-critical event to allow  ... 
arXiv:1901.09802v1 fatcat:cvmxp26curgqvld5b2dxm4ldvy

An Approach to Modeling Software Safety in Safety-Critical Systems

Ben Swarup Medikonda, Seetha Ramaiah Panchumart
2009 Journal of Computer Science  
Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe.  ...  design, run-time issues management and software safety-critical testing.  ...  In addition to the specific safety constraints developed for the system being designed, the design should incorporate basic safety design principles.  ... 
doi:10.3844/jcs.2009.311.322 fatcat:zrr4r4wkmbce3lm3l5xtm7obty

An Approach to Modeling Software Safety in Safety-Critical Systems

Medikonda
2009 Journal of Computer Science  
Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe.  ...  design, run-time issues management and software safety-critical testing.  ...  In addition to the specific safety constraints developed for the system being designed, the design should incorporate basic safety design principles.  ... 
doi:10.3844/jcssp.2009.311.322 fatcat:22fbiscewzabhnjiqupfreaumu

SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems [article]

Eyasu Getahun Chekole, Martin Ochoa, Sudipta Chattopadhyay
2021 arXiv   pre-print
Cyber-Physical Systems (CPS) are being widely adopted in critical infrastructures, such as smart grids, nuclear plants, water systems, transportation systems, manufacturing and healthcare services, among  ...  In this work, we propose to enforce a full-stack memory-safety (covering user-space and kernel-space attack surfaces) based on secure compiling of PLCs to detect memory-safety attacks in CPS.  ...  They are primarily designed to abort or reboot the victim system when a memory-safety attack or violation is detected, thus leading to system unavailability.  ... 
arXiv:2012.12529v4 fatcat:xfdy7i6jjbfyjowqpyrdxwqjpq

STPA-driven Multilevel Runtime Monitoring for In-time Hazard Detection [article]

Smitha Gautham, Georgios Bakirtzis, Alexander Will, Athira V. Jayakumar, Carl R. Elks
2022 arXiv   pre-print
Runtime verification or runtime monitoring equips safety-critical cyber-physical systems to augment design assurance measures and ensure operational safety and security.  ...  These interaction failures pose challenges to runtime verification regarding monitoring specifications and monitoring placements for in-time detection of hazards.  ...  Runtime safety assurance via monitors is important for promptly detecting safety constraints and requirements violations to prevent a hazard.  ... 
arXiv:2204.08999v3 fatcat:h2nlk7xsfbbd7oc6o7ro52bqg4

ICAROUS: Integrated configurable algorithms for reliable operations of unmanned systems

Maria Consiglio, Cesar Munoz, George Hagen, Anthony Narkawicz, Swee Balachandran
2016 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC)  
The core autonomy-enabling capabilities in ICAROUS include constraint conformance monitoring and contingency control functions.  ...  A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight  ...  ACKNOWLEDGMENT Special thanks to Connor Brooks and Alex Rivera for their contribution to the visual obstacle detection logic and their support to the ICAROUS project.  ... 
doi:10.1109/dasc.2016.7778033 fatcat:vvhi3vvs4rh2fghf5nqs7egsdy

Adversary Detection and Resilient Control for Multi-Agent Systems [article]

Aquib Mustafa, Dimitra Panagou
2022 arXiv   pre-print
This work analyzes agent behaviors based on certain behavior metrics, and designs a proactive adversary detection mechanism based on the notion of the critical region for the system operation.  ...  This paper presents an adversary detection mechanism and a resilient control framework for multi-agent systems under spatiotemporal constraints.  ...  INTRODUCTION In recent years, research for safety-critical systems has received vast recognition as safety is one of the prime requirements for autonomous systems.  ... 
arXiv:2207.10275v1 fatcat:x2dyrnwixvhqhisc7su5cqkh5u

Introducing the STAMP method in road tunnel safety assessment

Konstantinos Kazaras, Konstantinos Kirytopoulos, Athanasios Rentizelas
2012 Safety Science  
In such systems, human and organizational factors, software errors, design flaws and the safety culture of the system are not efficiently handled by the current QRA methods and systemic accident models  ...  The STAMP method is applied to a case study analysis in the safety critical process of tunnel ventilation during an emergency.  ...  Similarly, safety critical components of the tunnel ventilation system are not given by the designers to the maintenance process for prioritization of effort.  ... 
doi:10.1016/j.ssci.2012.04.013 fatcat:ybu4rmpb3fd4lentzjmjmivbxq

Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS [article]

Eyasu Getahun Chekole, Unnikrishnan Cheramangalath, Sudipta Chattopadhyay, Martin Ochoa, Guo Huaqun
2019 arXiv   pre-print
Memory-safety attacks have been one of the most critical threats against computing systems.  ...  This might not be acceptable in systems with stringent timing constraints, such as cyber-physical systems (CPS), since the system unavailability leaves the control system in an unsafe state.  ...  This makes ASan to be impractical for critical systems with hard real-time constraints. ASan does also provide a special mode to continue execution even after detecting a memory-safety error.  ... 
arXiv:1809.07477v2 fatcat:qhmxbu7qene2pmsmtywstuuaae

Architecting Safety Supervisors for High Levels of Automated Driving

Martin Torngren, Xinhai Zhang, Naveen Mohan, Matthias Becker, Lars Svensson, Xin Tao, De-Jiu Chen, Jonas Westman
2018 2018 21st International Conference on Intelligent Transportation Systems (ITSC)  
The complexity of automated driving poses challenges for providing safety assurance.  ...  We conclude with identified directions for further work.  ...  There is a strong tradition towards the use of simplicity for safety critical parts, and heavy redundancy when safety requires availability (such as in aircraft control systems), see e.g. [4] .  ... 
doi:10.1109/itsc.2018.8569945 dblp:conf/itsc/TorngrenZM0STCW18 fatcat:y6hg6jdk35fjnh2ndrvj5m3ljm

Integrate Online Model Checking into Distributed Reconfigurable System on Chip with Adaptable OS Services [chapter]

Sufyan Samara, Yuhong Zhao, Franz J. Rammig
2010 IFIP Advances in Information and Communication Technology  
This paper presents a novel flexible, dependable, and reliable operating system design for distributed reconfigurable system on chip.  ...  Such adaptable services may be required by real time safety-critical applications. The flexibility introduced in executing adaptable OS services also gives rise to a potential safety problem.  ...  In this sense, both checking modes are useful for safety-critical systems.  ... 
doi:10.1007/978-3-642-15234-4_11 fatcat:theu2zxvhncclobz34l6kpzdiq

A Framework for Safety Violation Identification and Assessment in Autonomous Driving

Lukas Heinzmann, Sina Shafaei, Mohd Hafeez Osman, Christoph Segler, Alois C. Knoll
2019 International Joint Conference on Artificial Intelligence  
This work presents a framework for mapping safety-critical situations based on safety measures in CARLA simulator.  ...  In the simulation environment, our evaluations showed promising and intuitive results on identification of safety violations of two machine learning agents.  ...  Since collisions are a violation to safety, therefore avoiding collisions is indispensable for detecting safety-critical situations.  ... 
dblp:conf/ijcai/HeinzmannSOSK19 fatcat:uqlrboobk5f2tizbv27agt42dy

STPA-SafeSec: Safety and security analysis for cyber-physical systems

Ivo Friedberg, Kieran McLaughlin, Paul Smith, David Laverty, Sakir Sezer
2017 Journal of Information Security and Applications  
In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety.  ...  As today's critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance.  ...  This single approach allows the interdependencies between safety and security constraints to be detected and used in mitigation strategies; (ii) the most critical system components can be prioritized for  ... 
doi:10.1016/j.jisa.2016.05.008 fatcat:wtunk5z4kjaljgqy364snvkm5q

An overview of fault tolerance techniques for real-time operating systems

Reza Ramezani, Yasser Sedaghat
2013 ICCKE 2013  
RTOSs are widely used in safety-critical domains. In these domains all the system's requirements should be met and a catastrophe occurs if the system fails.  ...  Hence, fault tolerance is an essential requirement of RTOSs employed in safety-critical domains.  ...  Hence RTOSs are widely used in safety-critical systems. Military and civilian aircrafts, nuclear plants, and medical devices are examples of safety-critical systems.  ... 
doi:10.1109/iccke.2013.6739552 fatcat:7vmncc2uv5fqze4yivdjc423d4

A systems approach to risk management through leading safety indicators

Nancy Leveson
2015 Reliability Engineering & System Safety  
The goal of leading indicators for safety is to identify the potential for an accident before it occurs.  ...  This paper describes a new and different approach to identifying system-specific leading indicators and provides guidance in designing a risk management structure to generate, monitor and use the results  ...  In STAMP, accidents result from the violation of safety constraints on system operation.  ... 
doi:10.1016/j.ress.2014.10.008 fatcat:4mx7tytjzra6vdnkz5s2tcprvq
« Previous Showing results 1 — 15 out of 41,027 results