92,389 Hits in 6.4 sec

Developing critical systems with PLD components

Adrian Hilton, Jon G. Hall
2005 Proceedings of the 10th international workshop on Formal methods for industrial critical systems - FMICS '05  
Programmable logic devices (PLDs) are now common components of critical systems, and are increasingly used for safety-related or safety-critical functionality.  ...  This paper describes past and current practice in programming PLDs in critical systems. It summarises the relevant safety and security standards and anticipates forthcoming changes to UK standards.  ...  The authors are grateful to Brian Dobbing and David Cooper from Praxis Critical Systems Ltd. and Tim Murray from QinetiQ Ltd. for advice and information given during the writing of this paper.  ... 
doi:10.1145/1081180.1081190 fatcat:pjv34dxiv5hf7ir64zruxpy5xe

Method and framework for security risks analysis guided by safety criteria

Gabriel Pedroza, Guillaume Mockly
2020 Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings  
The approach is finally demonstrated by analyzing a combined attack-failure path in a Flight Control System which can undermine the safety of a modern aircraft.  ...  Recent advances in safety and security suggest that risks analyses provide guidance for achieving a comprehensive alignment.  ...  ACKNOWLEDGMENTS Part of the work presented in this paper was conducted in the scope of the project ModSécAéro partially funded by thre French RAPID programme [4] .  ... 
doi:10.1145/3417990.3420047 dblp:conf/models/PedrozaM20 fatcat:eiktguu6xjeq7fljunxvang76e

A Survey on Techniques Requirements for Integrateing Safety and Security Engineering for Cyber-Physical Systems

Mohammed F. H Abulamddi
2016 International Journal of Computer Science & Engineering Survey  
Nowadays, safety and security have become a requirement, integrated to each other, for information systems as a new generation of infrastructure systems distributed throughout networks.  ...  So it opened the door to talk about new development approach methods that take safety and security into consideration during the system development life cycle and most importantly, identifying hazard,  ...  This is what sensitive and critical systems are in need for, which integrates between safety and security after identifying the requirements specifications of both and later reduced to formal languages  ... 
doi:10.5121/ijcses.2016.7601 fatcat:ulau3qlsffczvjpex3xpp3vjvq

Formal Analysis of Safety and Security Requirements of Critical Systems Supported by an Extended STPA Methodology

Giles Howard, Michael Butler, John Colley, Vladimiro Sassone
2017 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)  
In this paper, we present a methodology for identifying and formally analysing safety and security requirements, based on the STPA methodology and combined with modelling, traceability and formal verification  ...  Cyber-physical systems represent an engineering challenge due to their safety and security concerns, particularly those systems involved in critical infrastructure which require some of the highest standards  ...  One possibility for addressing the need to ensure both security and safety of a system is through the use of formal method techniques.  ... 
doi:10.1109/eurospw.2017.68 dblp:conf/eurosp/HowardBCS17 fatcat:2zgz6hysvraprl5pjw4fv2jnnu

Software engineering for safety

Robyn R. Lutz
2000 Proceedings of the conference on The future of Software engineering - ICSE '00  
Advance the use of runtime monitoring to detect faults and recover to a safe state, as well as to profile system usage to enhance safety analyses.  ...  Provide readier access to formal methods for developers of safety-critical systems by further integration of informal and formal methods.  ...  To even approach these goals, we need a much better understanding of the extent to which systems with similar requirements can reuse requirements analyses.  ... 
doi:10.1145/336512.336556 dblp:conf/icse/Lutz00 fatcat:to4aaglfyra7tcdc443izhdq3e

A methodology for assuring the safety and security of critical infrastructure based on STPA and Event-B

Vladimiro Sassone, Giles Howard, John Colley, Michael Butler
2019 International Journal of Critical Computer-Based Systems  
The output of the methodology is a set of critical requirements that guide iteration of and improvements to the system design to ensure its safety and security are maintained.  ...  A methodology is presented in this paper to allow for integrated safety and security analysis of cyber-physical systems, particularly in a critical infrastructure context.  ...  Our aim is therefore to provide a highly traceable approach to performing security and safety analysis in one methodology, utilising unified concepts and terminology to bring together security and safety  ... 
doi:10.1504/ijccbs.2019.10020048 fatcat:u7pqtw2ugjabhec45ybgj3qtwu

Safety, reliability and security of industrial computer systems

Stuart Anderson, Massimo Felici
2005 Reliability Engineering & System Safety  
Furthermore, this allows us to perform a posterior analysis of the criticality of each system component.  ...  Bishop et al describe in [8] a Software Criticality Analysis (SCA) developed in order to support the use of COTS software in safety-related systems.  ... 
doi:10.1016/j.ress.2004.08.002 fatcat:2u3434yltzandcnmec5a7tl53y

Safety, reliability and security of industrial computer systems

Stuart Anderson, Massimo Felici
2003 Reliability Engineering & System Safety  
Furthermore, this allows us to perform a posterior analysis of the criticality of each system component.  ...  Bishop et al describe in [8] a Software Criticality Analysis (SCA) developed in order to support the use of COTS software in safety-related systems.  ... 
doi:10.1016/s0951-8320(03)00088-7 fatcat:risg6yzmxrcfdoqhmzy7loumui

International Workshop On Mils: Architecture And Assurance For Secure Systems

Sergey Tverdyshev
2015 Zenodo  
Introduction into MILS Workshop and description of main MILS characteristics  ...  Rance DeLong, TOG 14:45 Security-Informed Safety Case Approach to Analysing MILS Systems.  ...  Richard Hawkins, Tim Kelly and Ibrahim Habli 17:15 Formal Methods for MILS: Formalisations of the GWV Firewall, Ruud Koolen and Julien Schmaltz 17:30 Summary Final countdown  This a workshop  ... 
doi:10.5281/zenodo.47971 fatcat:xjquj5t3erbm7b5dx6wwczbxre

Selected contributions from the Open Source Software Certification (OpenCert) workshops

Luís Soares Barbosa, Siraj Ahmed Shaikh
2014 Science of Computer Programming  
of a trusted safety-critical core.  ...  Open approaches to software and models increasingly find their way to serve safety-critical systems, and railway signalling and control is certainly one such area.  ...  Last but not least, we would like to thank Bas van Vlijmen and Jan Bergstra, and the editorial staff at Elsevier for agreeing to publish this special issue as a volume in Science of Computer Programming  ... 
doi:10.1016/j.scico.2014.04.007 fatcat:lmnuuihzqvar5iajl2gd5nggsa

Timing Predictability and Security in Safety-Critical Industrial Cyber-Physical Systems: A Position Paper

Saad Mubeen, Elena Lisova, Aneta Vulgarakis Feljan
2020 Applied Sciences  
Many industrial CPSs are subject to timing predictability, security and functional safety requirements, due to which the developers of these systems are required to verify these requirements during the  ...  In this context, the paper takes the position to advocate paramount importance of security as a prerequisite for timing predictability, as well as both security and timing predictability as prerequisites  ...  Acknowledgments: The authors would like to thank the industrial partners Volvo CE, Ericsson, and Arcticus Systems, among others. Finally, thanks to the anonymous reviewers for their valuable input.  ... 
doi:10.3390/app10093125 fatcat:vjm7uxjvkbfazon6kmsvib53ku

Integration Approach for Communications-based Train Control Applications in a High Assurance Security Architecture

Thorsten Schulz, Frank Golatowski, Dirk Timmermann
2019 Zenodo  
The goal of this open demonstrator is to show how these essential technologies can be composed to a secure safety-critical system.  ...  The secure integration of model-based, safety-critical applications implemented in the programming suite Ansys SCADE is explained with the help of a demonstrator.  ...  This work is part of the certMILS project, funded by the European Union's Horizon 2020 research and innovation programme under grant agreement No. 731456.  ... 
doi:10.5281/zenodo.3243853 fatcat:6lnc6pafond2lkllg33xnkbp2m

A Survey of Safety Analysis Techniques for Safety Critical Systems

Aftab Ali Haider, Aamer Nadeem
2013 International Journal of Future Computer and Communication  
This paper is mainly focused on the study of the techniques available for the safety analysis of critical systems. It is never possible to build a completely safe system.  ...  There is a possibility to bring the behavior of these systems within acceptable limits. For safety evaluation of such systems both formal and informal techniques are available.  ...  If formal and informal approaches are used in combination, it is definitely an important step towards safer software systems.  ... 
doi:10.7763/ijfcc.2013.v2.137 fatcat:cpsewhbmv5ciplxvbkdj5r3ly4

Investigation into a layered approach to architecting security-informed safety cases

Kateryna Netkachova, Kevin Muller, Michael Paulitsch, Robin Bloomfield
2015 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC)  
The paper describes a layered approach to analysing safety and security in a structured way and creating a security-informed safety case.  ...  The approach is applied to a case studya Security Gateway controlling data flow between two different security domains implemented with a separation kernel based operating system in an avionics environment  ...  the UK Research Institute in Trustworthy Industrial Control Systems (RITICS).  ... 
doi:10.1109/dasc.2015.7311447 fatcat:al5u76taijfi7hqrmguch3ukwi

Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems

Ivan Ruchkin, Ashwini Rao, Dionisio De Niz, Sagar Chaki, David Garlan
2015 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy - CPS-SPC '15  
In this paper we use formal specification of analysis contracts to expose security assumptions and guarantees of analyses from reliability, control, and sensor security domains.  ...  Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physical ones.  ...  FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.  ... 
doi:10.1145/2808705.2808714 dblp:conf/ccs/RuchkinRNCG15 fatcat:57jbfhiwabbafjbv7y6kll63fi
« Previous Showing results 1 — 15 out of 92,389 results