A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
High Assurance for Distributed Cyber Physical Systems
2015
Proceedings of the 2015 European Conference on Software Architecture Workshops - ECSAW '15
for Distributed Cyber
Physical Systems
Hissam 7-SEP-2015
© 2015 Carnegie Mellon University
design
constraints for
tractable analysis
Engineering High Assurance for DART
Requirements
Language ...
Pri: Low
2.0
1.0
2.0
0.5
1.0
2.5
t=0
t=4
t=8
Schedule for C_nom
Schedule for C_over
C
C
Zero slack
16
High Assurance for Distributed Cyber
Physical Systems
Hissam 7-SEP-2015 ...
doi:10.1145/2797433.2797439
dblp:conf/ecsa/HissamCM15
fatcat:rsdc5rja4vgsban2gwxqrs7z7a
New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants (June 2019)
2019
IEEE Access
level of cyber security to ensure technical assurance. ...
It is necessary to apply nuclear cyber security technology effectively in accordance with the operation, assurance, and system development process of a nuclear facility. ...
For each level of assurance, CC considers resistance to attacks and exploits by attackers with an attack potential of Beyond High, High, Moderate, Enhanced-Basic, and Basic shown in Fig.12 . ...
doi:10.1109/access.2019.2922335
fatcat:ujnuypaoyjds5arla2blxqjrqu
Verifying Critical Cyber-Physical Systems After Deployment
2015
Electronic Communications of the EASST
Cyber-Physical Systems (CPS) are increasingly novel hardware and software compositions creating smart, autonomously acting devices, enabling efficient end-to-end workflows and new forms of user-machine ...
This paper describes an approach to verifying system requirements, when they become known, by performing an automated refinement check of its composed components abstracted from the actual implementation ...
This work was sponsored by the Charles Stark Draper Laboratories under the DARPA project on High Assurance Cyber Military Systems (HACMS). ...
doi:10.14279/tuj.eceasst.72.1027
dblp:journals/eceasst/OHalloran15
fatcat:seqrunodxvdebcf3o63il2i5ri
Independent Verification and Diversity: The Echelons for Assurance of Cyber Physical Systems Safety
2020
International Workshop on Information-Communication Technologies & Embedded Systems
Conceptions of safety and security for cyber physical systems (CPS) in context of interaction with environment are analysed. ...
Multi-FIT technique is described as an example for CPS safety assessment. Application of diversity for safety and security assurance is discussed. ...
Introduction Cyber physical systems (CPSs) for critical applications such as NPP reactor trip systems, aerospace board and launch-abort control systems, railway interlocking and block signal systems and ...
dblp:conf/ictes/Kharchenko20
fatcat:barzdvrbivdolff77hyetl4qp4
Towards foundational verification of cyber-physical systems
2016
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)
In this paper we present VERIDRONE, a foundational framework for reasoning about cyber-physical systems at all levels from high-level models to C code that implements the system. ...
The safety-critical aspects of cyber-physical systems motivate the need for rigorous analysis of these systems. ...
Further, by leveraging existing Coq libraries for programming languages and compilers, we can formally connect high-level models of cyber-physical systems to the concrete code that implements these models ...
doi:10.1109/soscyps.2016.7580000
dblp:conf/cpsweek/MalechaRAL16
fatcat:px7fwlh6u5g3tcw5tqnbzo4iva
Cyber Physical Systems for Automotive Vehicles: Challenges and Applications
2019
American Journal of Networks and Communications
Cyber-physical systems (CPSs) are considered to be the next generation systems in which computing, communication, and control technologies are firmly integrated. ...
Cyber-physical systems mix digital and analog devices, interfaces, networks, pc systems, and also the like with the natural and unreal physical world. ...
Comprehensive holistic CPVS co-design would account for cyber and physical resources spanning the life-cycle of a system or system of systems. ...
doi:10.11648/j.ajnc.20190801.12
fatcat:q4kzjs56mbcg7kb5mpzsi2psti
Training the Cyber Warrior
[chapter]
2003
Security Education and Critical Infrastructures
This paper suggests the major educational components of a curriculum that is designed to educate individuals for job assignments as Information Assurance professionals -also known as: cyber warriors. ...
It suggests a minimum common body of knowledge for all cyber warriors along with two major specialization categories: cyber tacticians and cyber strategists. ...
The capstone instruction in this course should consist of a demonstration of how a high level language code fragment must be converted to machine code that is supported by the underlying target hardware's ...
doi:10.1007/978-0-387-35694-5_24
fatcat:vcovvaxfvbgztcvghnw4bo5seu
Using formal methods to enable more secure vehicles
2014
SIGPLAN notices
build code
• Performance Summary
• Generated software for Research Vehicle (~75KLOC), 60% high assurance ...
HACMS:
Clean-Slate Methods for High-Assurance Software
Code Synthesis
Domain Specific
Languages (DSLs)
Interactive Theorem
Prover as PL
High Assurance: Ensuring Correctness, Safety, Security ...
doi:10.1145/2692915.2628165
fatcat:evgrd2cuevaqliypjld5czt2w4
Smart Ticket Protection: An Architecture for Cyber-Protecting Physical Tickets Using Digitally Signed Random Pattern Markers
2018
2018 IEEE 20th Conference on Business Informatics (CBI)
This paper describes an architecture for cryptographically protecting these markers, which are stored in Aztec codes on physical tickets, in order to assure that only an authorized printer can generate ...
To assure their authenticity, however, they have to be cryptographically protected and equipped with an environment for successful validation, combining physical and cyber security protection. ...
ACKNOWLEDGMENT The author wants to thank his fellow colleague Martin Winter for his support in this work. ...
doi:10.1109/cbi.2018.10055
dblp:conf/wecwis/Marksteiner18
fatcat:yvnfqnvmyng4lotmtjgkhje3my
Dronology: An Incubator for Cyber-Physical System Research
[article]
2018
arXiv
pre-print
Research in the area of Cyber-Physical Systems (CPS) is hampered by the lack of available project environments in which to explore open challenges and to propose and rigorously evaluate solutions. ...
It enables researchers to experiment with their own novel solutions within a fully-executable runtime environment that supports both high-fidelity sUAS simulations as well as physical sUAS. ...
of safety-critical systems and cyber-physical systems. ...
arXiv:1804.02423v1
fatcat:cw34ysc22fdnnb45thqfedpknu
Challenges in the regulatory approval of medical cyber-physical systems
2011
Proceedings of the ninth ACM international conference on Embedded software - EMSOFT '11
Finally, we discuss some recent trends that will further complicate the regulatory approval of medical cyber-physical systems. ...
Finally, we discuss some recent trends that will further complicate the regulatory approval of medical cyber-physical systems. ...
The authors thank Paul Jones of the FDA for his insightful comments on an early draft of this paper. ...
doi:10.1145/2038642.2038677
dblp:conf/emsoft/SokolskyLH11
fatcat:4jvfvocqfzg3znadmmmjnfodqa
Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems
2010
IEEE Security and Privacy
He chairs the steering committee for the International Symposium on Software Reliability Engineering and is a fellow of IEEE. Contact him at info@chillarege.com. ...
Selected CS articles and columns are also available for free at http://ComputingNow.computer.org. Learn about computing history and the people who shaped it. COMPUTING THEN ...
imply recommendation by the US National Institute of Standards and Technology or other agencies of the US government, nor does it imply that the products identifi ed are necessarily the best available for ...
doi:10.1109/msp.2010.152
fatcat:gt7afieajbaqngdfhecc6rd7re
Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat
[chapter]
2021
Advanced Sciences and Technologies for Security Applications
These cyber-enabled physical systems fit under the umbrella of the 'Internet of Things' (IoT). ...
about just why the IoT can potentially be used for cyber-terrorism. ...
The reason is that the IoT is a cyber-physical system, 2 and so has the capacity for code to have 'direct' physical causality. ...
doi:10.1007/978-3-030-90221-6_5
fatcat:q2b6l4rcorfc5btgdktqrcq3te
Opportunities, Challenges and Strategies for Integrating Cyber Security and Safety in Engineering Practice
2021
Engineering Technology Open Access Journal
In response, it is understood and agreed in general that having good cyber security always help to achieve better health and safety from engineering systems. ...
The emergence of Industry 4.0, Industry IoT (IIoT), Internet of Everything (IoE), Internet of Medical Things (IoMT) and Cyber Physical Systems (CPS) have created a paradigm shift in the way we design, ...
., Code of practice for competence for safetyrelated systems practitioner or Code of practice for cyber security and safety), supply chain and technical principles are proposed in IET code of practice ...
doi:10.19080/etoaj.2021.03.555622
fatcat:lb7qwlxj7nbyfci2sfx2keohzm
On Testing Data-Intensive Software Systems
[article]
2019
arXiv
pre-print
Today's software systems like cyber-physical production systems or big data systems have to process large volumes and diverse types of data which heavily influences the quality of these so-called data-intensive ...
Therefore, the role of data in testing has to be rethought and specific testing approaches for data-intensive software systems are required. ...
As a result, the research on testing of data-intensive software systems (see Section 5 and Section 6) is of great importance for large cyber-physical production systems in general and their quality assurance ...
arXiv:1903.09413v2
fatcat:3hiosb7fizczrdyucanghtvlpi
« Previous
Showing results 1 — 15 out of 11,595 results