11,595 Hits in 5.5 sec

High Assurance for Distributed Cyber Physical Systems

Scott A. Hissam, Sagar Chaki, Gabriel A. Moreno
2015 Proceedings of the 2015 European Conference on Software Architecture Workshops - ECSAW '15  
for Distributed Cyber Physical Systems Hissam 7-SEP-2015 © 2015 Carnegie Mellon University design constraints for tractable analysis Engineering High Assurance for DART Requirements Language  ...  Pri: Low 2.0 1.0 2.0 0.5 1.0 2.5 t=0 t=4 t=8 Schedule for C_nom Schedule for C_over C C Zero slack 16 High Assurance for Distributed Cyber Physical Systems Hissam 7-SEP-2015  ... 
doi:10.1145/2797433.2797439 dblp:conf/ecsa/HissamCM15 fatcat:rsdc5rja4vgsban2gwxqrs7z7a

New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants (June 2019)

JunYoung Son, JongGyun Choi, Hyunsoo Yoon
2019 IEEE Access  
level of cyber security to ensure technical assurance.  ...  It is necessary to apply nuclear cyber security technology effectively in accordance with the operation, assurance, and system development process of a nuclear facility.  ...  For each level of assurance, CC considers resistance to attacks and exploits by attackers with an attack potential of Beyond High, High, Moderate, Enhanced-Basic, and Basic shown in Fig.12 .  ... 
doi:10.1109/access.2019.2922335 fatcat:ujnuypaoyjds5arla2blxqjrqu

Verifying Critical Cyber-Physical Systems After Deployment

Colin O'Halloran
2015 Electronic Communications of the EASST  
Cyber-Physical Systems (CPS) are increasingly novel hardware and software compositions creating smart, autonomously acting devices, enabling efficient end-to-end workflows and new forms of user-machine  ...  This paper describes an approach to verifying system requirements, when they become known, by performing an automated refinement check of its composed components abstracted from the actual implementation  ...  This work was sponsored by the Charles Stark Draper Laboratories under the DARPA project on High Assurance Cyber Military Systems (HACMS).  ... 
doi:10.14279/tuj.eceasst.72.1027 dblp:journals/eceasst/OHalloran15 fatcat:seqrunodxvdebcf3o63il2i5ri

Independent Verification and Diversity: The Echelons for Assurance of Cyber Physical Systems Safety

Vyacheslav Kharchenko
2020 International Workshop on Information-Communication Technologies & Embedded Systems  
Conceptions of safety and security for cyber physical systems (CPS) in context of interaction with environment are analysed.  ...  Multi-FIT technique is described as an example for CPS safety assessment. Application of diversity for safety and security assurance is discussed.  ...  Introduction Cyber physical systems (CPSs) for critical applications such as NPP reactor trip systems, aerospace board and launch-abort control systems, railway interlocking and block signal systems and  ... 
dblp:conf/ictes/Kharchenko20 fatcat:barzdvrbivdolff77hyetl4qp4

Towards foundational verification of cyber-physical systems

Gregory Malecha, Daniel Ricketts, Mario M. Alvarez, Sorin Lerner
2016 2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)  
In this paper we present VERIDRONE, a foundational framework for reasoning about cyber-physical systems at all levels from high-level models to C code that implements the system.  ...  The safety-critical aspects of cyber-physical systems motivate the need for rigorous analysis of these systems.  ...  Further, by leveraging existing Coq libraries for programming languages and compilers, we can formally connect high-level models of cyber-physical systems to the concrete code that implements these models  ... 
doi:10.1109/soscyps.2016.7580000 dblp:conf/cpsweek/MalechaRAL16 fatcat:px7fwlh6u5g3tcw5tqnbzo4iva

Cyber Physical Systems for Automotive Vehicles: Challenges and Applications

Karthik Srinivasn
2019 American Journal of Networks and Communications  
Cyber-physical systems (CPSs) are considered to be the next generation systems in which computing, communication, and control technologies are firmly integrated.  ...  Cyber-physical systems mix digital and analog devices, interfaces, networks, pc systems, and also the like with the natural and unreal physical world.  ...  Comprehensive holistic CPVS co-design would account for cyber and physical resources spanning the life-cycle of a system or system of systems.  ... 
doi:10.11648/j.ajnc.20190801.12 fatcat:q4kzjs56mbcg7kb5mpzsi2psti

Training the Cyber Warrior [chapter]

J. D. Fulp
2003 Security Education and Critical Infrastructures  
This paper suggests the major educational components of a curriculum that is designed to educate individuals for job assignments as Information Assurance professionals -also known as: cyber warriors.  ...  It suggests a minimum common body of knowledge for all cyber warriors along with two major specialization categories: cyber tacticians and cyber strategists.  ...  The capstone instruction in this course should consist of a demonstration of how a high level language code fragment must be converted to machine code that is supported by the underlying target hardware's  ... 
doi:10.1007/978-0-387-35694-5_24 fatcat:vcovvaxfvbgztcvghnw4bo5seu

Using formal methods to enable more secure vehicles

Kathleen Fisher
2014 SIGPLAN notices  
build code • Performance Summary • Generated software for Research Vehicle (~75KLOC), 60% high assurance  ...  HACMS: Clean-Slate Methods for High-Assurance Software Code Synthesis Domain Specific Languages (DSLs) Interactive Theorem Prover as PL High Assurance: Ensuring Correctness, Safety, Security  ... 
doi:10.1145/2692915.2628165 fatcat:evgrd2cuevaqliypjld5czt2w4

Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers

Stefan Marksteiner
2018 2018 IEEE 20th Conference on Business Informatics (CBI)  
This paper describes an architecture for cryptographically protecting these markers, which are stored in Aztec codes on physical tickets, in order to assure that only an authorized printer can generate  ...  To assure their authenticity, however, they have to be cryptographically protected and equipped with an environment for successful validation, combining physical and cyber security protection.  ...  ACKNOWLEDGMENT The author wants to thank his fellow colleague Martin Winter for his support in this work.  ... 
doi:10.1109/cbi.2018.10055 dblp:conf/wecwis/Marksteiner18 fatcat:yvnfqnvmyng4lotmtjgkhje3my

Dronology: An Incubator for Cyber-Physical System Research [article]

Jane Cleland-Huang, Michael Vierhauser, Sean Bayley
2018 arXiv   pre-print
Research in the area of Cyber-Physical Systems (CPS) is hampered by the lack of available project environments in which to explore open challenges and to propose and rigorously evaluate solutions.  ...  It enables researchers to experiment with their own novel solutions within a fully-executable runtime environment that supports both high-fidelity sUAS simulations as well as physical sUAS.  ...  of safety-critical systems and cyber-physical systems.  ... 
arXiv:1804.02423v1 fatcat:cw34ysc22fdnnb45thqfedpknu

Challenges in the regulatory approval of medical cyber-physical systems

Oleg Sokolsky, Insup Lee, Mats Heimdahl
2011 Proceedings of the ninth ACM international conference on Embedded software - EMSOFT '11  
Finally, we discuss some recent trends that will further complicate the regulatory approval of medical cyber-physical systems.  ...  Finally, we discuss some recent trends that will further complicate the regulatory approval of medical cyber-physical systems.  ...  The authors thank Paul Jones of the FDA for his insightful comments on an early draft of this paper.  ... 
doi:10.1145/2038642.2038677 dblp:conf/emsoft/SokolskyLH11 fatcat:4jvfvocqfzg3znadmmmjnfodqa

Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems

Ram Chillarege, Jeffrey Voas
2010 IEEE Security and Privacy  
He chairs the steering committee for the International Symposium on Software Reliability Engineering and is a fellow of IEEE. Contact him at  ...  Selected CS articles and columns are also available for free at Learn about computing history and the people who shaped it. COMPUTING THEN  ...  imply recommendation by the US National Institute of Standards and Technology or other agencies of the US government, nor does it imply that the products identifi ed are necessarily the best available for  ... 
doi:10.1109/msp.2010.152 fatcat:gt7afieajbaqngdfhecc6rd7re

Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat [chapter]

Adam Henschke
2021 Advanced Sciences and Technologies for Security Applications  
These cyber-enabled physical systems fit under the umbrella of the 'Internet of Things' (IoT).  ...  about just why the IoT can potentially be used for cyber-terrorism.  ...  The reason is that the IoT is a cyber-physical system, 2 and so has the capacity for code to have 'direct' physical causality.  ... 
doi:10.1007/978-3-030-90221-6_5 fatcat:q2b6l4rcorfc5btgdktqrcq3te

Opportunities, Challenges and Strategies for Integrating Cyber Security and Safety in Engineering Practice

Chaminda Hewage
2021 Engineering Technology Open Access Journal  
In response, it is understood and agreed in general that having good cyber security always help to achieve better health and safety from engineering systems.  ...  The emergence of Industry 4.0, Industry IoT (IIoT), Internet of Everything (IoE), Internet of Medical Things (IoMT) and Cyber Physical Systems (CPS) have created a paradigm shift in the way we design,  ...  ., Code of practice for competence for safetyrelated systems practitioner or Code of practice for cyber security and safety), supply chain and technical principles are proposed in IET code of practice  ... 
doi:10.19080/etoaj.2021.03.555622 fatcat:lb7qwlxj7nbyfci2sfx2keohzm

On Testing Data-Intensive Software Systems [article]

Michael Felderer, Barbara Russo, Florian Auer
2019 arXiv   pre-print
Today's software systems like cyber-physical production systems or big data systems have to process large volumes and diverse types of data which heavily influences the quality of these so-called data-intensive  ...  Therefore, the role of data in testing has to be rethought and specific testing approaches for data-intensive software systems are required.  ...  As a result, the research on testing of data-intensive software systems (see Section 5 and Section 6) is of great importance for large cyber-physical production systems in general and their quality assurance  ... 
arXiv:1903.09413v2 fatcat:3hiosb7fizczrdyucanghtvlpi
« Previous Showing results 1 — 15 out of 11,595 results