1,241 Hits in 4.2 sec

VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System

Baoluo Meng, Daniel Larraz, Kit Siu, Abha Moitra, John Interrante, William Smith, Saswata Paul, Daniel Prince, Heber Herencia-Zapana, M. Fareed Arif, Moosa Yahyazadeh, Vidhya Tekken Valapil (+3 others)
2021 Systems  
The ever-increasing complexity of cyber-physical systems is driving the need for assurance of critical infrastructure and embedded systems.  ...  VERDICT analyzes a system in the face of cyber threats and recommends design improvements that can be applied early in the system engineering process.  ...  Conclusions The DARPA Cyber Assured Systems Engineering (CASE) program goal was to develop design, analysis and verification tools to allow systems engineers to design cyber resiliency The VERDICT tool  ... 
doi:10.3390/systems9010018 fatcat:73d2wytatnddvlaihhce5dkoba

Software quality tools and techniques presented in FASE'17

Marieke Huisman, Julia Rubin
2018 International Journal on Software Tools for Technology Transfer (STTT)  
This special issue of Software Tools for Technology Transfer is concerned with the foundations on which software quality assurance is built.  ...  It introduces the papers that focus on this topic and that have been selected from the 20th International Conference on Fundamental Approaches to Software Engineering (FASE'17).  ...  Acknowledgements We are grateful to all the authors for their contributions and to the program committee of FASE'17 for their help for selecting the conference program, including the papers for this issue  ... 
doi:10.1007/s10009-018-0504-7 fatcat:pnytzgeky5gilkhufbhbrnoemi

Modelling cyber-physical systems: some issues and directions

J Galvão, J Machado, G Prisacaru, D Olaru, C Bujoreanu
2018 IOP Conference Series: Materials Science and Engineering  
In this paper there are discussed some issues on modelling cyber-physical systems, as well as possible directions to follow, in this aspect, for obtaining correct specifications for distributed controllers  ...  ' systems.  ...  Acknowledgments The authors are grateful to the support of MEtRICs research center for the support in this project.  ... 
doi:10.1088/1757-899x/444/4/042007 fatcat:rjwvf7fkgfgnnfivkmrrgkx57i

Towards Verified Artificial Intelligence [article]

Sanjit A. Seshia, Dorsa Sadigh, S. Shankar Sastry
2020 arXiv   pre-print
Verified artificial intelligence (AI) is the goal of designing AI-based systems that that have strong, ideally provable, assurances of correctness with respect to mathematically-specified requirements.  ...  This paper considers Verified AI from a formal methods perspective. We describe five challenges for achieving Verified AI, and five corresponding principles for addressing these challenges.  ...  Center, one of six centers supported by the STARnet phase of the Focus Center Research Program (FCRP) a Semiconductor Research Corporation program sponsored by MARCO and DARPA, by the DARPA BRASS and Assured  ... 
arXiv:1606.08514v4 fatcat:ozoldsdnzjghddhwz5xju6zqvu

Risk Assessment Methodology Based on the NISTIR 7628 Guidelines

Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili
2013 2013 46th Hawaii International Conference on System Sciences  
We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design  ...  Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders.  ...  Mission assurance is a full life-cycle engineering process that is an essential element of risk assessment [4] .  ... 
doi:10.1109/hicss.2013.466 dblp:conf/hicss/AbercrombieSHLM13 fatcat:ewmreu3pajguxdov6j4b3ptprq

Formal Verification of Cyberphysical Systems

James Bret Michael, Doron Drusinsky, Duminda Wijesekera
2021 Computer  
DUMINDA WIJESEKERA is a professor in the Department of Cyber Security Engineering, George Mason University, Fairfax, Virginia, 22030, USA, where he is codirector of the Center for Assured Research.  ...  in verifying large systems.  ... 
doi:10.1109/mc.2021.3055883 fatcat:zbltmzwhb5aava6yiqbcohyvy4

A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber-Physical Systems

Mohammed F. H. Abulamddi
2017 Journal of Computer and Communications  
integration between safety and security concerns in this context, we would conduct a survey exploring approaches and standards that were created by the scholars to combine safety and security requirement engineering  ...  High-Assurance Cyber Military Systems (HACMS) Clean-Slate Approach, was introduced based on the highest quality results for critical systems regarding the safety and security engineering specifications  ...  es between software engineers responsible for safety-critical software-intensive systems and those responsible for security-critical systems.  ... 
doi:10.4236/jcc.2017.51008 fatcat:55n7jncbj5grxprugebfzakb2y

Deadlock free dispatching for fleets of vehicles

Franco Mazzanti, Alessio Ferrari, Spagnolo
2019 Zenodo  
Invited talk - Deadlock free dispatching for fleets of vehicles at Forum Méthodes Formelles - "Véhicules Autonomes et Méthodes Formelles" Toulouse, 10 Octobre 2017  ...  But this same template mechanism also enables us to automatically synthesize formal models for various Validation and Verification frameworks (BIP, Fiacre/TINA, UPPAAL) of the final components.  ...  For this purpose, we developed and verified a flight stack for a highaltitude micro glider from ground up.  ... 
doi:10.5281/zenodo.3518010 fatcat:jtpjzw6ntbgctntaf46fyad4n4

High assurance SPIRAL

Franz Franchetti, Aliaksei Sandryhaila, Jeremy R. Johnson, Ivan Kadar
2014 Signal Processing, Sensor/Information Fusion, and Target Recognition XXIII  
In this paper we introduce High Assurance SPIRAL to solve the last mile problem for the synthesis of high assurance implementations of controllers for vehicular systems that are executed in today's and  ...  We demonstrate High Assurance SPIRALs capability by co-synthesizing proofs and implementations for attack detection and sensor spoofing algorithms and deploy the code as ROS nodes on the Landshark unmanned  ...  In this paper, we describe a scalable approach to translate high assurance cyber-physical system specifications into highly efficient, platform-adapted, verified control software.  ... 
doi:10.1117/12.2053974 fatcat:o5acta5sknfhbocrdh6rnqxqhi

Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Zahidul Islam, Leo Yu Zhang, Md Rafiqul Islam, Warren Armstrong
2022 IEEE Access  
The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these  ...  INDEX TERMS Common criteria, cyber security, protection profile, security standard and certification, trusted system.  ...  The authors would like to acknowledge Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of Australian Cyber  ... 
doi:10.1109/access.2022.3168716 fatcat:jqzrlkphkzh7zizdy247kbiv34

Knowledge-Based Programming for the Cybersecurity Solution

Stuart H. Rubin
2018 Open Artificial Intelligence Journal  
This approach works well for cyber-physical systems that can be rewound. A car at a spoofed stop sign is not representative of such a system.  ...  Methods: This will only work for cyber-physical systems that can be rewound. Benchmarks will often include sensory information. The second approach is termed, "semantic randomization".  ...  It follows that the science and particularly the engineering of cyber-secure systems is a consequence of building expert compilers.  ... 
doi:10.2174/1874061801805010001 fatcat:ag4bx7yedbcdpni55t4oivrugi

Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges [article]

Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren Armstrong
2022 arXiv   pre-print
The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these  ...  Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security certification.  ...  ACKNOWLEDGMENT We acknowledge Mr Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of Australian Cyber Criteria  ... 
arXiv:2201.07417v4 fatcat:2isn6dnvavcxxe4epaodhrqzsa

Robustness in Cyber-Physical Systems (Dagstuhl Seminar 16362)

Martin Fränzle, James Kapinski, Pavithra Prabhakhar, Marc Herbstritt
2017 Dagstuhl Reports  
Cyber-physical systems (CPS) is a new multi-disciplinary field aimed at providing a rigorous framework for designing and analyzing these systems, and recent developments in CPS-related fields provide techniques  ...  This report documents the program and the outcomes of Dagstuhl Seminar 16362 "Robustness in Cyber-Physical Systems".  ...  For cyber systems modeled as finite-state transducers, the proposed notion of robustness can be verified in pseudo-polynomial time.  ... 
doi:10.4230/dagrep.6.9.29 dblp:journals/dagstuhl-reports/FranzleKP16 fatcat:uiivaekedzdqdpmn2shsecrpve

Modeling and testing a family of surgical robots: an experience report

Niloofar Mansoor, Jonathan A. Saddler, Bruno Silva, Hamid Bagheri, Myra B. Cohen, Shane Farritor
2018 Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018  
In the process, we learned that there are some interesting and open challenges for the research community, which if solved will lead towards more dependable safety-critical cyber-physical systems.  ...  CCS CONCEPTS • Software and its engineering → Software defect analysis; Formal software verification; Model-driven software engineering; * The first two authors contributed equally to this work.  ...  Cubrich for his help with domain knowledge and for providing us with an open source robotic surgery code base.  ... 
doi:10.1145/3236024.3275534 dblp:conf/sigsoft/MansoorSSBCF18 fatcat:ikoca7zjbbh2fexl5nt3vcria4

Methods, Languages and Tools for Future System Development [chapter]

Bernhard Steffen
2019 Lecture Notes in Computer Science  
Language design for simplifying programming, analysis/verification methods and tools for guaranteeing, for example, security and real-time constraints, and validation environments for increasing automation  ...  during quality assurance can all be regarded as means to factor out and generically solve specific concerns of the software development process and then reuse the corresponding solutions.  ...  This architecture was elaborated in [31] to even synthesize, for example, specialized model checkers from a temporal specification on the basis of a component library.  ... 
doi:10.1007/978-3-319-91908-9_14 fatcat:4e4ejmscmvhfff3np25eaujwa4
« Previous Showing results 1 — 15 out of 1,241 results