A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System
2021
Systems
The ever-increasing complexity of cyber-physical systems is driving the need for assurance of critical infrastructure and embedded systems. ...
VERDICT analyzes a system in the face of cyber threats and recommends design improvements that can be applied early in the system engineering process. ...
Conclusions The DARPA Cyber Assured Systems Engineering (CASE) program goal was to develop design, analysis and verification tools to allow systems engineers to design cyber resiliency The VERDICT tool ...
doi:10.3390/systems9010018
fatcat:73d2wytatnddvlaihhce5dkoba
Software quality tools and techniques presented in FASE'17
2018
International Journal on Software Tools for Technology Transfer (STTT)
This special issue of Software Tools for Technology Transfer is concerned with the foundations on which software quality assurance is built. ...
It introduces the papers that focus on this topic and that have been selected from the 20th International Conference on Fundamental Approaches to Software Engineering (FASE'17). ...
Acknowledgements We are grateful to all the authors for their contributions and to the program committee of FASE'17 for their help for selecting the conference program, including the papers for this issue ...
doi:10.1007/s10009-018-0504-7
fatcat:pnytzgeky5gilkhufbhbrnoemi
Modelling cyber-physical systems: some issues and directions
2018
IOP Conference Series: Materials Science and Engineering
In this paper there are discussed some issues on modelling cyber-physical systems, as well as possible directions to follow, in this aspect, for obtaining correct specifications for distributed controllers ...
' systems. ...
Acknowledgments The authors are grateful to the support of MEtRICs research center for the support in this project. ...
doi:10.1088/1757-899x/444/4/042007
fatcat:rjwvf7fkgfgnnfivkmrrgkx57i
Towards Verified Artificial Intelligence
[article]
2020
arXiv
pre-print
Verified artificial intelligence (AI) is the goal of designing AI-based systems that that have strong, ideally provable, assurances of correctness with respect to mathematically-specified requirements. ...
This paper considers Verified AI from a formal methods perspective. We describe five challenges for achieving Verified AI, and five corresponding principles for addressing these challenges. ...
Center, one of six centers supported by the STARnet phase of the Focus Center Research Program (FCRP) a Semiconductor Research Corporation program sponsored by MARCO and DARPA, by the DARPA BRASS and Assured ...
arXiv:1606.08514v4
fatcat:ozoldsdnzjghddhwz5xju6zqvu
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines
2013
2013 46th Hawaii International Conference on System Sciences
We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design ...
Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. ...
Mission assurance is a full life-cycle engineering process that is an essential element of risk assessment [4] . ...
doi:10.1109/hicss.2013.466
dblp:conf/hicss/AbercrombieSHLM13
fatcat:ewmreu3pajguxdov6j4b3ptprq
Formal Verification of Cyberphysical Systems
2021
Computer
DUMINDA WIJESEKERA is a professor in the Department of Cyber Security Engineering, George Mason University, Fairfax, Virginia, 22030, USA, where he is codirector of the Center for Assured Research. ...
in verifying large systems. ...
doi:10.1109/mc.2021.3055883
fatcat:zbltmzwhb5aava6yiqbcohyvy4
A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber-Physical Systems
2017
Journal of Computer and Communications
integration between safety and security concerns in this context, we would conduct a survey exploring approaches and standards that were created by the scholars to combine safety and security requirement engineering ...
High-Assurance Cyber Military Systems (HACMS) Clean-Slate Approach, was introduced based on the highest quality results for critical systems regarding the safety and security engineering specifications ...
es between software engineers responsible for safety-critical software-intensive systems and those responsible for security-critical systems. ...
doi:10.4236/jcc.2017.51008
fatcat:55n7jncbj5grxprugebfzakb2y
Deadlock free dispatching for fleets of vehicles
2019
Zenodo
Invited talk - Deadlock free dispatching for fleets of vehicles at Forum Méthodes Formelles - "Véhicules Autonomes et Méthodes Formelles" Toulouse, 10 Octobre 2017 ...
But this same template mechanism also enables us to automatically synthesize formal models for various Validation and Verification frameworks (BIP, Fiacre/TINA, UPPAAL) of the final components. ...
For this purpose, we developed and verified a flight stack for a highaltitude micro glider from ground up. ...
doi:10.5281/zenodo.3518010
fatcat:jtpjzw6ntbgctntaf46fyad4n4
High assurance SPIRAL
2014
Signal Processing, Sensor/Information Fusion, and Target Recognition XXIII
In this paper we introduce High Assurance SPIRAL to solve the last mile problem for the synthesis of high assurance implementations of controllers for vehicular systems that are executed in today's and ...
We demonstrate High Assurance SPIRALs capability by co-synthesizing proofs and implementations for attack detection and sensor spoofing algorithms and deploy the code as ROS nodes on the Landshark unmanned ...
In this paper, we describe a scalable approach to translate high assurance cyber-physical system specifications into highly efficient, platform-adapted, verified control software. ...
doi:10.1117/12.2053974
fatcat:o5acta5sknfhbocrdh6rnqxqhi
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
2022
IEEE Access
The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these ...
INDEX TERMS Common criteria, cyber security, protection profile, security standard and certification, trusted system. ...
The authors would like to acknowledge Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of Australian Cyber ...
doi:10.1109/access.2022.3168716
fatcat:jqzrlkphkzh7zizdy247kbiv34
Knowledge-Based Programming for the Cybersecurity Solution
2018
Open Artificial Intelligence Journal
This approach works well for cyber-physical systems that can be rewound. A car at a spoofed stop sign is not representative of such a system. ...
Methods: This will only work for cyber-physical systems that can be rewound. Benchmarks will often include sensory information. The second approach is termed, "semantic randomization". ...
It follows that the science and particularly the engineering of cyber-secure systems is a consequence of building expert compilers. ...
doi:10.2174/1874061801805010001
fatcat:ag4bx7yedbcdpni55t4oivrugi
Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges
[article]
2022
arXiv
pre-print
The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these ...
Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security certification. ...
ACKNOWLEDGMENT We acknowledge Mr Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of Australian Cyber Criteria ...
arXiv:2201.07417v4
fatcat:2isn6dnvavcxxe4epaodhrqzsa
Robustness in Cyber-Physical Systems (Dagstuhl Seminar 16362)
2017
Dagstuhl Reports
Cyber-physical systems (CPS) is a new multi-disciplinary field aimed at providing a rigorous framework for designing and analyzing these systems, and recent developments in CPS-related fields provide techniques ...
This report documents the program and the outcomes of Dagstuhl Seminar 16362 "Robustness in Cyber-Physical Systems". ...
For cyber systems modeled as finite-state transducers, the proposed notion of robustness can be verified in pseudo-polynomial time. ...
doi:10.4230/dagrep.6.9.29
dblp:journals/dagstuhl-reports/FranzleKP16
fatcat:uiivaekedzdqdpmn2shsecrpve
Modeling and testing a family of surgical robots: an experience report
2018
Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018
In the process, we learned that there are some interesting and open challenges for the research community, which if solved will lead towards more dependable safety-critical cyber-physical systems. ...
CCS CONCEPTS • Software and its engineering → Software defect analysis; Formal software verification; Model-driven software engineering; * The first two authors contributed equally to this work. ...
Cubrich for his help with domain knowledge and for providing us with an open source robotic surgery code base. ...
doi:10.1145/3236024.3275534
dblp:conf/sigsoft/MansoorSSBCF18
fatcat:ikoca7zjbbh2fexl5nt3vcria4
Methods, Languages and Tools for Future System Development
[chapter]
2019
Lecture Notes in Computer Science
Language design for simplifying programming, analysis/verification methods and tools for guaranteeing, for example, security and real-time constraints, and validation environments for increasing automation ...
during quality assurance can all be regarded as means to factor out and generically solve specific concerns of the software development process and then reuse the corresponding solutions. ...
This architecture was elaborated in [31] to even synthesize, for example, specialized model checkers from a temporal specification on the basis of a component library. ...
doi:10.1007/978-3-319-91908-9_14
fatcat:4e4ejmscmvhfff3np25eaujwa4
« Previous
Showing results 1 — 15 out of 1,241 results