Academic literature on the topic 'Functional Safety, Cyber-Physical Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Functional Safety, Cyber-Physical Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Functional Safety, Cyber-Physical Systems"

1

Shukalov, A. V., I. O. Zharinov, and O. O. Zharinov. "The cyber-physical production conveyor industrial safety." IOP Conference Series: Earth and Environmental Science 839, no. 4 (September 1, 2021): 042089. http://dx.doi.org/10.1088/1755-1315/839/4/042089.

Full text
Abstract:
Abstract The cyber-physical production industrial safety provision in emergencies is based on control technologies, which are applied in different combinations to prevent catastrophes. Emergencies are consequences of cyber-physical systems failures, which could lead to mass violations of equipment functionality modes and to a cascade distribution of failures through the entire cyber-physical production workshop. The techno-genic emergencies danger relates to construction and functional equipment violations completing technological operations with aggressive, explosive, highly flammable substances, which may penetrate out of the work chamber. Preventive measures reducing risks of safety accidents are address cyber-physical system control united in a conveyor line. The conveyor as a control object is regulated with actions produced with a virtual calculator based on control detectors data installed in cyber-physical systems and beyond them (in the technological environment). There is a scheme given how to control a cyber-physical production using the action dual mechanisms over the control objects.
APA, Harvard, Vancouver, ISO, and other styles
2

Moradkhani, Farzaneh, and Martin Fränzle. "Functional verification of cyber-physical systems containing machine-learnt components." it - Information Technology 63, no. 5-6 (October 1, 2021): 277–87. http://dx.doi.org/10.1515/itit-2021-0009.

Full text
Abstract:
Abstract Functional architectures of cyber-physical systems increasingly comprise components that are generated by training and machine learning rather than by more traditional engineering approaches, as necessary in safety-critical application domains, poses various unsolved challenges. Commonly used computational structures underlying machine learning, like deep neural networks, still lack scalable automatic verification support. Due to size, non-linearity, and non-convexity, neural network verification is a challenge to state-of-art Mixed Integer linear programming (MILP) solvers and satisfiability modulo theories (SMT) solvers [2], [3]. In this research, we focus on artificial neural network with activation functions beyond the Rectified Linear Unit (ReLU). We are thus leaving the area of piecewise linear function supported by the majority of SMT solvers and specialized solvers for Artificial Neural Networks (ANNs), the successful like Reluplex solver [1]. A major part of this research is using the SMT solver iSAT [4] which aims at solving complex Boolean combinations of linear and non-linear constraint formulas (including transcendental functions), and therefore is suitable to verify the safety properties of a specific kind of neural network known as Multi-Layer Perceptron (MLP) which contain non-linear activation functions.
APA, Harvard, Vancouver, ISO, and other styles
3

Balador, Ali, Anis Kouba, Dajana Cassioli, Fotis Foukalas, Ricardo Severino, Daria Stepanova, Giovanni Agosta, et al. "Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems." Sensors 18, no. 11 (November 21, 2018): 4075. http://dx.doi.org/10.3390/s18114075.

Full text
Abstract:
Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use cases.
APA, Harvard, Vancouver, ISO, and other styles
4

Xie, Guoqi, Yang Bai, Wei Wu, Yanwen Li, Renfa Li, and Keqin Li. "Human-Interaction-aware Adaptive Functional Safety Processing for Multi-Functional Automotive Cyber-Physical Systems." ACM Transactions on Cyber-Physical Systems 3, no. 4 (October 12, 2019): 1–25. http://dx.doi.org/10.1145/3337931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gharib, Mohamad, Andrea Ceccarelli, Paolo Lollini, and Andrea Bondavalli. "A cyber–physical–social approach for engineering Functional Safety Requirements for automotive systems." Journal of Systems and Software 189 (July 2022): 111310. http://dx.doi.org/10.1016/j.jss.2022.111310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Śliwiński, M., E. Piesik, and J. Piesik. "Integrated functional safety and cyber security analysis." IFAC-PapersOnLine 51, no. 24 (2018): 1263–70. http://dx.doi.org/10.1016/j.ifacol.2018.09.572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xie, Guoqi, Hao Peng, Zhetao Li, Jinlin Song, Yong Xie, Renfa Li, and Keqin Li. "Reliability Enhancement Toward Functional Safety Goal Assurance in Energy-Aware Automotive Cyber-Physical Systems." IEEE Transactions on Industrial Informatics 14, no. 12 (December 2018): 5447–62. http://dx.doi.org/10.1109/tii.2018.2854762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mubeen, Saad, Elena Lisova, and Aneta Vulgarakis Feljan. "Timing Predictability and Security in Safety-Critical Industrial Cyber-Physical Systems: A Position Paper." Applied Sciences 10, no. 9 (April 30, 2020): 3125. http://dx.doi.org/10.3390/app10093125.

Full text
Abstract:
Cyber Physical Systems (CPSs) are systems that are developed by seamlessly integrating computational algorithms and physical components, and they are a result of the technological advancement in the embedded systems and distributed systems domains, as well as the availability of sophisticated networking technology. Many industrial CPSs are subject to timing predictability, security and functional safety requirements, due to which the developers of these systems are required to verify these requirements during the their development. This position paper starts by exploring the state of the art with respect to developing timing predictable and secure embedded systems. Thereafter, the paper extends the discussion to time-critical and secure CPSs and highlights the key issues that are faced when verifying the timing predictability requirements during the development of these systems. In this context, the paper takes the position to advocate paramount importance of security as a prerequisite for timing predictability, as well as both security and timing predictability as prerequisites for functional safety. Moreover, the paper identifies the gaps in the existing frameworks and techniques for the development of time- and safety-critical CPSs and describes our viewpoint on ensuring timing predictability and security in these systems. Finally, the paper emphasises the opportunities that artificial intelligence can provide in the development of these systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Petrenko, Vyacheslav, and Mikhail Gurchinskiy. "Multi-agent deep reinforcement learning concept for mobile cyber-physical systems control." E3S Web of Conferences 270 (2021): 01036. http://dx.doi.org/10.1051/e3sconf/202127001036.

Full text
Abstract:
High complexity of mobile cyber physical systems (MCPS) dynamics makes it difficult to apply classical methods to optimize the MCPS agent management policy. In this regard, the use of intelligent control methods, in particular, with the help of artificial neural networks (ANN) and multi-agent deep reinforcement learning (MDRL), is gaining relevance. In practice, the application of MDRL in MCPS faces the following problems: 1) existing MDRL methods have low scalability; 2) the inference of the used ANNs has high computational complexity; 3) MCPS trained using existing methods have low functional safety. To solve these problems, we propose the concept of a new MDRL method based on the existing MADDPG method. Within the framework of the concept, it is proposed: 1) to increase the scalability of MDRL by using information not about all other MCPS agents, but only about n nearest neighbors; 2) reduce the computational complexity of ANN inference by using a sparse ANN structure; 3) to increase the functional safety of trained MCPS by using a training set with uneven distribution of states. The proposed concept is expected to help address the challenges of applying MDRL to MCPS. To confirm this, it is planned to conduct experimental studies.
APA, Harvard, Vancouver, ISO, and other styles
10

Kriaa, Siwar, Marc Bouissou, and Youssef Laarouchi. "A new safety and security risk analysis framework for industrial control systems." Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability 233, no. 2 (April 19, 2018): 151–74. http://dx.doi.org/10.1177/1748006x18765885.

Full text
Abstract:
The migration of modern industrial control systems toward information and communication technologies exposes them to cyber-attacks that can alter the way they function, thereby causing adverse consequences on the system and its environment. It has consequently become crucial to consider security risks in traditional safety risk analyses for industrial systems controlled by modern industrial control system. We propose in this article a new framework for safety and security joint risk analysis for industrial control systems. S-cube (for supervisory control and data acquisition safety and security joint modeling) is a new model-based approach that enables, thanks to a knowledge base, formal modeling of the physical and functional architecture of cyber-physical systems and automatic generation of a qualitative and quantitative analysis encompassing safety risks (accidental) and security risks (malicious). We first give the principle and rationale of S-cube and then we illustrate its inputs and outputs on a case study.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Functional Safety, Cyber-Physical Systems"

1

Іванович, Рудик Юрій, Victor Kuts, Andrii Gavryliuk, Roman Naumchuk, and Rudyk Yuriy. "Required safety component of automotive cyber - physical systems." Thesis, IEEЕ, 2020. http://hdl.handle.net/123456789/7112.

Full text
Abstract:
This identification of possible hazardous events is a task for the risk assessment procedure. Current practices for risk characterization is based on known threats, their consequences and damage expectance. Modern technologies, such as electric, electronic, cyber- physical systems etc. have proven the existence of many challenges related to their practice and there is potential for improvements in how the hazard characterization can be conducted. Our purpose is to present practical methods that should be applied for hazardous events’ evaluation. Features of electric vehicles fire safety studies are highlighted. These approaches include furthering studies regarding rankings of risk factors and assumptions supporting the analysis. Focusing on events not included in existing studies. A simple example is used to illustrate how efficiency is reduced, due to a lack of a proper risk assessment perception from a safety standpoint. For the wires with polyvinylchloride insulating material with a most widespread cross-sectional areas the temperature and the time of the reaches the point of self- ignition was established.
APA, Harvard, Vancouver, ISO, and other styles
2

Sajjad, Imran. "Autonomous Highway Systems Safety and Security." DigitalCommons@USU, 2017. https://digitalcommons.usu.edu/etd/5696.

Full text
Abstract:
Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, there are tools to assess the level of influence a possible attacker can have on such a system, which then describes the level of safety and security. An attacker might attempt to counter the benefits of automation by causing collisions and/or decreasing highway throughput. These strings (platoons) of automated vehicles will rely on control algorithms to maintain required distances from other cars and objects around them. The vehicle dynamics themselves and the controllers used will form the cyber-physical system and its response to an attacker can be assessed in the context of multiple interacting vehicles. While the vehicle dynamics play a pivotal role in the security of this system, the choice of controller can also be leveraged to enhance the safety of such a system. After knowledge of some attacker capabilities, adversarial-aware controllers can be designed to react to the presence of an attacker, adding an extra level of security. This work will attempt to address these issues in vehicular platooning. Firstly, a general analysis concerning the capabilities of possible attacks in terms of control system theory will be presented. Secondly, mitigation strategies to some of these attacks will be discussed. Finally, the results of an experimental validation of these mitigation strategies and their implications will be shown.
APA, Harvard, Vancouver, ISO, and other styles
3

Amarasinghe, Kasun. "Explainable Neural Networks based Anomaly Detection for Cyber-Physical Systems." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/6091.

Full text
Abstract:
Cyber-Physical Systems (CPSs) are the core of modern critical infrastructure (e.g. power-grids) and securing them is of paramount importance. Anomaly detection in data is crucial for CPS security. While Artificial Neural Networks (ANNs) are strong candidates for the task, they are seldom deployed in safety-critical domains due to the perception that ANNs are black-boxes. Therefore, to leverage ANNs in CPSs, cracking open the black box through explanation is essential. The main objective of this dissertation is developing explainable ANN-based Anomaly Detection Systems for Cyber-Physical Systems (CP-ADS). The main objective was broken down into three sub-objectives: 1) Identifying key-requirements that an explainable CP-ADS should satisfy, 2) Developing supervised ANN-based explainable CP-ADSs, 3) Developing unsupervised ANN-based explainable CP-ADSs. In achieving those objectives, this dissertation provides the following contributions: 1) a set of key-requirements that an explainable CP-ADS should satisfy, 2) a methodology for deriving summaries of the knowledge of a trained supervised CP-ADS, 3) a methodology for validating derived summaries, 4) an unsupervised neural network methodology for learning cyber-physical (CP) behavior, 5) a methodology for visually and linguistically explaining the learned CP behavior. All the methods were implemented on real-world and benchmark datasets. The set of key-requirements presented in the first contribution was used to evaluate the performance of the presented methods. The successes and limitations of the presented methods were identified. Furthermore, steps that can be taken to overcome the limitations were proposed. Therefore, this dissertation takes several necessary steps toward developing explainable ANN-based CP-ADS and serves as a framework that can be expanded to develop trustworthy ANN-based CP-ADSs.
APA, Harvard, Vancouver, ISO, and other styles
4

CHRISTOFORAKIS, IOANNIS. "Protection and safety framework for on-chip communications and Mixed-Critical Cyber-Physical Systems." Doctoral thesis, Università Politecnica delle Marche, 2020. http://hdl.handle.net/11566/279598.

Full text
Abstract:
L'Internet of Things (IoT), una rete globale emergente di dispositivi elettronici embedded identificabili in modo univoco all'interno della rete Internet, sta trasformando il modo in cui viviamo e lavoriamo aumentando la connessione di persone e cose su una scala che un tempo era inimmaginabile. Oltre a una maggiore efficienza di comunicazione tra gli oggetti connessi, l'IoT comporta anche nuove sfide in termini di sicurezza e privacy. La specifica della sicurezza deve essere implementata in dispositive IoT che hanno il vincolo di memoria limitata, middleware vincolato, bassa potenza di calcolo e basso consumo. La sicurezza è uno degli aspetti fondamentali che differenzia l’IoT dai generici dispositivi embedded. L'implementazione hardware su circuito integrato di diverse funzionalità di sicurezza migliora la protezione di un sistema implementando il controllo degli accessi a risorse critiche, il rilevamento di manomissioni e guasti, la protezione dei canali laterali e la protezione contro il reverse engineering e il furto di IP. La presente tesi ha come obiettivo la definizione di una metodologia di progettazione hardware che garantisca sicurezza e protezione. Questa metodologia è stata implementata in un framework sviluppato per estendere le capacità del sistema al controllo delle minacce alla sicurezza del sistema attraverso una protezione a livello hardware. In questa tesi presentiamo il framework dell'architettura hardware, che combina la TAMMU (Translation and Allocation Memory Management Unit) utilizzata in SoC eterogenei che supportano la virtualizzazione integrata con un'architettura di protezione hardware (MSU). Questi miglioramenti hardware si concentrano sull'isolamento dei compartimenti della memoria fisica applicando regole di accesso. Il framework, pertanto, consente l'applicazione di politiche dinamiche di sicurezza sull'hardware per la protezione da componenti hardware o software non affidabili. D'altra parte, nelle Networks-on-Chip la velocità di iniezione del traffico è gestita principalmente impiegando tecniche complesse. Questo lavoro propone un Traffic Shaper Module che supporta sia il monitoraggio che il controllo del traffico sull'interfaccia di rete su chip o sul controller di memoria. Il vantaggio di questo Traffic Shaper Module è che garantisce una larghezza di banda di memoria alle applicazioni critiche limitando il traffico di attività non critiche. Il sistema è sviluppato hardware Xilinx ZYNQ7000 system-on-chip, mentre le misurazioni sono state acquisite su una scheda di sviluppo Xilinx Zed-board. Abilitando il Traffic Shaper nella nostra architettura, abbiamo raggiunto il controllo della larghezza di banda con un sovraccarico trascurabile, fornendo allo stesso tempo una larghezza di banda dello 0,5-5 per cento in meno rispetto alla larghezza di banda teorica specificata. L'architettura TAMMU proposta offre funzionalità innovative uniche che supportano più istanze di macchine virtuali (VM) simultaneamente attive con commutazione del contesto con latenza zero e abilitando i servizi di traslazione degli indirizzi per un massimo di mille domini virtuali mentre servono più dispositivi. Allo stesso tempo, il progetto proposto consente di soddisfare più richieste di traslazione di indirizzi in parallel e una in invalidazione per dominio del Translation Look-aside Buffer (TLB). L’architettura proposta è innovative rispetto allo stato dell’arte in quanto combina i servizi di enabling address translation con una larghezza di banda di memoria garantita e protesione della memoria. L’implementazione sulla piattaforma programabile FPGA Xilinx XC5VLX110T ha permesso il confronto con architetture alternative. La tesi è organizzata nel seguente modo: lo stato dell’arte è presentato nell’introduzione. Le caratteristiche del framework proposto sono descritte nella Sezione 2. La viosione generale del Sistema è presentato nella Sezione 3. La Sezione 4 riporta il test del sistema con la valutazione delle performances e le risorse richieste. Un confronto con le prestazioni di altre architetture è presentato nella Sezione 5.Un esempio applicativo sull’healtcare è presentato nella Sezione 6. Infine, la Sezione 7 riporta le conclusioni.
The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to increased communication efficiency between connected objects, the IoT also brings new security and privacy challenges. The security requirements for the huge base of connected embedded devices are distinct on account of their limited memory, constrained middleware, and low computing power. Security is the new differentiator for embedded and IoT devices. At the on-chip level, several security features enhance the protection of a system by implementing access control to critical resources, by tamper and fault detection, by side-channel protection, and by protection against reverse engineering and IP theft. The thesis targets the design of on-chip system by implementing a methodology that ensures safety and security by design. This methodology is enabled by a framework developed to extend system capabilities so as to control the concurrent effects of security threats on the system behavior focusing on hardware level protection. We present the hardware architecture Framework, that combines Translation and Allocation Memory Management Unit (TAMMU) utilized in heterogeneous SoCs that support full virtualization integrated with a hardware protection architecture (MSU). These hardware enhancements focus on isolating physical memory compartments by applying access rules; thus, we allow dynamic security policies to be enforced at the hardware for protection against untrustworthy hardware or software components. On the other hand, Networks-on-Chip manage the traffic injection rate mainly by employing complex techniques; either back-pressure based low-control mechanisms or rate-control of traffic load (i.e. traffic shaping). This work proposes such a Traffic Shaper Module that supports both monitoring and traffic control at the on-chip network interface or the memory controller. The advantage of this Traffic Shaper Module is that proposed security framework provides guaranteed memory bandwidth to the critical applications by limiting traffic of non-critical tasks. The system is developed in the Xilinx ZYNQ7000 System-on-Chip while the measurements were captured on a Zed-board development board. By enabling the Traffic Shaper in our architecture, we achieved ne-grain bandwidth control with negligible overhead, while providing bandwidth of only 0.5-5 percent less than the theoretical specified bandwidth The proposed TAMMU architecture offers unique innovative features supporting multiple concurrently active virtual machine instances (VMs) with zero-latency world-context switching and enabling address translation services for up to a thousand virtual domains while serving multiple devices. At the same the proposed design allows for serving multiple address translation requests in parallel and per domain Translation Look-aside Buffer (TLB) invalidation. Proposed architecture is innovative in relation to the state of the art as it combines enabling address translation services with the capability that the proposed security framework provides guaranteed memory bandwidth and memory protection. The combination of these two complex features is not supported in previous systems. We prove that despite the increased need for hardware, our design manages to keep resource utilization at least at the same level as other known technologies implemented in modern systems. Significant differentiation, favorable to our architecture, is also achieved in performance compared to the state of the art. The need for comparisons with alternative architectures made it necessary to integrate our system into the Xilinx XC5VLX110T FPGA platform as well. The thesis is organized as follows. An overview of state of the art is given in Introduction section. The techniques that our framework include and its features are described in Section 2, followed by full system overview in Section 3. In Section 4, the testing of Framework and the performance and resource requirements are discussed. In Section 5, comparison with the State of the Art presented. A healthcare example is given in Section 6. Finally, Section 7 concludes the thesis.
APA, Harvard, Vancouver, ISO, and other styles
5

Asplund, Fredrik. "Risks Related to the Use of Software Tools when Developing Cyber-Physical Systems : A Critical Perspective on the Future of Developing Complex, Safety-Critical Systems." Doctoral thesis, KTH, Mekatronik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152672.

Full text
Abstract:
The increasing complexity and size of modern Cyber-Physical Systems (CPS) has led to a sharp decline in productivity among CPS designers. Requirements on safety aggravate this problem further, both by being difficult to ensure and due to their high importance to the public. Tools, or rather efforts to facilitate the automation of development processes, are a central ingredient in many of the proposed innovations to mitigate this problem. Even though the safety-related implications of introducing automation in development processes have not been extensively studied, it is known that automation has already had a large impact on operational systems. If tools are to play a part in mitigating the increase in safety-critical CPS complexity, then their actual impact on CPS development, and thereby the safety of the corresponding end products, must be sufficiently understood. An survey of relevant research fields, such as system safety, software engineering and tool integration, is provided to facilitate the discussion on safety-related implications of tool usage. Based on the identification of industrial safety standards as an important source of information and considering that the risks posed by separate tools have been given considerable attention in the transportation domain, several high-profile safety standards in this domain have been surveyed. According to the surveyed standards, automation should primarily be evaluated on its reliable execution of separate process steps independent of human operators. Automation that only supports the actions of operators during CPS development is viewed as relatively inconsequential. A conceptual model and a reference model have been created based on the surveyed research fields. The former defines the entities and relationships most relevant to safety-related risks associated with tool usage. The latter describes aspects of tool integration and how these relate to each other. By combining these models, a risk analysis could be performed and properties of tool chains which need to be ensured to mitigate risk identified. Ten such safety-related characteristics of tool chains are described. These safety-related characteristics provide a systematic way to narrow down what to look for with regard to tool usage and risk. The hypothesis that a large set of factors related to tool usage may introduce risk could thus be tested through an empirical study, which identified safety-related weaknesses in support environments tied both to high and low levels of automation. The conclusion is that a broader perspective, which includes more factors related to tool usage than those considered by the surveyed standards, will be needed. Three possible reasons to disregard such a broad perspective have been refuted, namely requirements on development processes enforced by the domain of CPS itself, certain characteristics of safety-critical CPS and the possibility to place trust in a proven, manual development process. After finding no strong reason to keep a narrow perspective on tool usage, arguments are put forward as to why the future evolution of support environments may actually increase the importance of such a broad perspective. Suggestions for how to update the mental models of the surveyed safety standards, and other standards like them, are put forward based on this identified need for a broader perspective.
Den ökande komplexiteten och storleken på Cyber-Fysiska System (CPS) har lett till att produktiviteten i utvecklingen av CPS har minskat kraftigt. Krav på att CPS ska vara säkra att använda förvärrar problemet ytterligare, då dessa ofta är svåra att säkerställa och samtidigt av stor vikt för samhället. Mjukvaruverktyg, eller egentligen alla insatser för att automatisera utvecklingen av CPS, är en central komponent i många innovationer menade att lösa detta problem. Även om forskningen endast delvis studerat säkerhetsrelaterade konsekvenser av att automatisera produktutveckling, så är det känt att automation har haft en kraftig (och subtil) inverkan på operationella system. Om verktyg ska lösa problemet med en ökande komplexitet hos säkerhetskritiska CPS, så måste verktygens påverkan på produktutveckling, och i förlängningen på det säkra användandet av slutprodukterna, vara känd. Den här boken ger en översikt av forskningsfronten gällande säkerhetsrelaterade konsekvenser av verktygsanvändning. Denna kommer från en litteraturstudie i områdena systemsäkerhet, mjukvaruutveckling och verktygsintegration. Industriella säkerhetsstandarder identifieras som en viktig informationskälla. Då riskerna med användandet av enskilda verktyg har undersökts i stor utsträckning hos producenter av produkter relaterade till transport, studeras flera välkända säkerhetsstandarder från denna domän. Enligt de utvalda standarderna bör automation primärt utvärderas utifrån dess förmåga att självständigt utföra enskilda processteg på ett robust sätt. Automation som stödjer operatörers egna handlingar ses som tämligen oviktig. En konceptuell modell och en referensmodell har utvecklats baserat på litteraturstudien. Den förstnämnda definierar vilka entiteter och relationer som är av vikt för säkerhetsrelaterade konsekvenser av verktygsanvändning. Den sistnämnda beskriver olika aspekter av verktygsintegration och hur dessa relaterar till varandra. Genom att kombinera modellerna och utföra en riskanalys har egenskaper hos verktygskedjor som måste säkerställas för att undvika risk identifierats. Tio sådana säkerhetsrelaterade egenskaper beskrivs. Dessa säkerhetsrelaterade egenskaper möjliggör ett systematiskt sätt att begränsa vad som måste beaktas under studier av risker relaterade till verktygsanvändning. Hypotesen att ett stort antal faktorer relaterade till verktygsanvändning innebär risk kunde därför testas i en empirisk studie. Denna studie identifierade säkerhetsrelaterade svagheter i utvecklingsmiljöer knutna både till höga och låga nivåer av automation. Slutsatsen är att ett brett perspektiv, som inkluderar fler faktorer än de som beaktas av de utvalda standarderna, kommer att behövas i framtiden. Tre möjliga orsaker till att ett bredare perspektiv ändå skulle vara irrelevant analyseras, nämligen egenskaper specifika för CPS-domänen, egenskaper hos säkerhetskritiska CPS och möjligheten att lita på en beprövad, manuell process. Slutsatsen blir att ett bredare perspektiv är motiverat, och att den framtida utvecklingen av utvecklingsmiljöer för CPS sannolikt kommer att öka denna betydelse. Baserat på detta breda perspektiv läggs förslag fram för hur de mentala modellerna som bärs fram av de utvalda säkerhetstandarderna (och andra standarder som dem) kan utvecklas.

QC 20141001

APA, Harvard, Vancouver, ISO, and other styles
6

von, Wenckstern Michael [Verfasser]. "Verification of Structural and Extra-Functional Properties in Component and Connector Models for Embedded and Cyber-Physical Systems / Michael von Wenckstern." Düren : Shaker, 2020. http://d-nb.info/1208599623/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Laarouchi, Mohamed Emine. "A safety approach for CPS-IoT." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS010.

Full text
Abstract:
Depuis plusieurs années, nous assistons à une convergence entre les systèmes cyber-physiques (CPS) et l’Internet des Objets (IoT). Les CPS intègrent les systèmes embarqués avec leur environnement physique et humain en assurant une communication entre différents capteurs et actionneurs. L’IoT vise le réseau et les protocoles de communication entre les objets connectés. Cette convergence offre des perspectives d’applications diverses allant des véhicules connectés aux réseaux électriques intelligents ainsi qu’aux usines du futur. Le but de cette thèse est d’assurer et garantir la sûreté de fonctionnement des systèmes CPS-IoT. Pour ceci, nous avons considéré un cas d’étude spécifique tout au long de la thèse qui est les drones. Dans un premier temps, on s’est focalisé sur les différentes méthodes d’analyse de sûreté de fonctionnement qui sont déjà existantes. Ces méthodes ont fait leurs preuves pour la conception et la réalisation des systèmes embarqués. Tout au long de ce process, on a essayé de répondre à la question suivante: est-ce que ces méthodes existantes sont adéquates pour réaliser les analyses de sûreté de fonctionnement nécessaires pour les CPS-IoT? On a conclu la nécessité de nouvelles approches pour analyser la sûreté de fonctionnement des systèmes CPS-IoT du fait de la complexité significative de ces systèmes. Dans un second temps, on a proposé une méthodologie pour l’analyse prédictive de la résilience des CPS-IoT. La résilience est définie comme étant la capacité d’un système à tolérer les pannes, à continuer à fournir le service demandé tout en considérant les différentes contraintes internes et externes au système. On a différencié deux types différents de résilience qui sont la résilience endogène et exogène. La résilience endogène est la capacité inhérente du système à détecter et à traiter les défauts internes et les attaques malveillantes. La résilience exogène est la capacité permanente du système à maintenir un fonctionnement sûr dans son environnement ambiant. La dernière partie de notre travail a consisté à investiguer l’impact de l’intelligence artificielle sur la sûreté de fonctionnement des CPS-IoT. Plus spécifiquement, on s’est intéressé à comment serait-il possible d’utiliser l’intelligence artificielle pour accroître la sûreté des drones lors de la phase de planification de chemin. Les résultats obtenus ont été comparés avec les algorithmes de planification existants
For several years, we have been witnessing a convergence between cyber-physical systems (CPS) and the Internet of Things (IoT). CPS integrate embedded systems with their physical and human environment by ensuring communication between different sensors and actuators. The IoT targets the network and communication protocols between connected objects. This convergence offers prospects for various applications ranging from connected vehicles to smart grids and the factories of the future. The aim of this thesis is to ensure and guarantee the operational safety of CPS-IoT systems. For this, we have considered a specific case study throughout the thesis which is UAVs. Initially, we focused on the different methods of analysis of operational safety that already exist. These methods have proved their worth for the design and implementation of on-board systems. Throughout this process, we tried to answer the following question: are these existing methods adequate to perform the necessary safety analyses for CPS-IoT? It was concluded that new approaches to analyse the safety of operation of CPS-IoT systems are needed due to the significant complexity of these systems. As a second step, a methodology for predictive analysis of the resilience of CPS-IoTs was proposed. Resilience is defined as being the ability of a system to tolerate failures, to continue to provide the requested service while considering the various internal and external constraints of the system. Two different types of resilience have been differentiated: endogenous and exogenous resilience. Endogenous resilience is the inherent ability of the system to detect and deal with internal faults and malicious attacks. Exogenous resilience is the ongoing ability of the system to maintain safe operation in its surrounding environment. The last part of our work was to investigate the impact of artificial intelligence on the safe operation of CPS-IoTs. More specifically, we looked at how artificial intelligence could be used to enhance UAV safety in the path planning phase. The results obtained were compared with existing planning algorithms
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Hyoseung. "Towards Predictable Real-Time Performance on Multi-Core Platforms." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/836.

Full text
Abstract:
Cyber-physical systems (CPS) integrate sensing, computing, communication and actuation capabilities to monitor and control operations in the physical environment. A key requirement of such systems is the need to provide predictable real-time performance: the timing correctness of the system should be analyzable at design time with a quantitative metric and guaranteed at runtime with high assurance. This requirement of predictability is particularly important for safety-critical domains such as automobiles, aerospace, defense, manufacturing and medical devices. The work in this dissertation focuses on the challenges arising from the use of modern multi-core platforms in CPS. Even as of today, multi-core platforms are rarely used in safety-critical applications primarily due to the temporal interference caused by contention on various resources shared among processor cores, such as caches, memory buses, and I/O devices. Such interference is hard to predict and can significantly increase task execution time, e.g., up to 12 commodity quad-core platforms. To address the problem of ensuring timing predictability on multi-core platforms, we develop novel analytical and systems techniques in this dissertation. Our proposed techniques theoretically bound temporal interference that tasks may suffer from when accessing shared resources. Our techniques also involve software primitives and algorithms for real-time operating systems and hypervisors, which significantly reduce the degree of the temporal interference. Specifically, we tackle the issues of cache and memory contention, locking and synchronization, interrupt handling, and access control for computational accelerators such as general-purpose graphics processing units (GPGPUs), all of which are crucial to achieving predictable real-time performance on a modern multi-core platform. Our solutions are readily applicable to commodity multi-core platforms, and can be used not only for developing new systems but also migrating existing applications from single-core to multi-core platforms.
APA, Harvard, Vancouver, ISO, and other styles
9

Kriaa, Siwar. "Modélisation conjointe de la sûreté et de la sécurité pour l’évaluation des risques dans les systèmes cyber-physiques." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLC014/document.

Full text
Abstract:
Les Systèmes Cyber Physiques (CPS) intègrent des composants programmables afin de contrôler un processus physique. Ils sont désormais largement répandus dans différentes industries comme l’énergie, l’aéronautique, l’automobile ou l’industrie chimique. Parmi les différents CPS existants, les systèmes SCADA (Supervisory Control And Data Acquisition) permettent le contrôle et la supervision des installations industrielles critiques. Leur dysfonctionnement peut engendrer des impacts néfastes sur l’installation et son environnement.Les systèmes SCADA ont d’abord été isolés et basés sur des composants et standards propriétaires. Afin de faciliter la supervision du processus industriel et réduire les coûts, ils intègrent de plus en plus les technologies de communication et de l’information (TIC). Ceci les rend plus complexes et les expose à des cyber-attaques qui exploitent les vulnérabilités existantes des TIC. Ces attaques peuvent modifier le fonctionnement du système et nuire à sa sûreté.On associe dans la suite la sûreté aux risques de nature accidentelle provenant du système, et la sécurité aux risques d’origine malveillante et en particulier les cyber-attaques. Dans ce contexte où les infrastructures industrielles sont contrôlées par les nouveaux systèmes SCADA, les risques et les exigences liés à la sûreté et à la sécurité convergent et peuvent avoir des interactions mutuelles. Une analyse de risque qui couvre à la fois la sûreté et la sécurité est indispensable pour l’identification de ces interactions ce qui conditionne l’optimalité de la gestion de risque.Dans cette thèse, on donne d’abord un état de l’art complet des approches qui traitent la sûreté et la sécurité des systèmes industriels et on souligne leur carences par rapport aux quatre critères suivants qu’on juge nécessaires pour une bonne approche basée sur les modèles : formelle, automatique, qualitative et quantitative, et robuste (i.e. intègre facilement dans le modèle des variations d’hypothèses sur le système).On propose ensuite une nouvelle approche orientée modèle d’analyse conjointe de la sûreté et de la sécurité : S-cube (SCADA Safety and Security modeling), qui satisfait les critères ci-dessus. Elle permet une modélisation formelle des CPS et génère l’analyse de risque qualitative et quantitative associée. Grâce à une modélisation graphique de l’architecture du système, S-cube permet de prendre en compte différentes hypothèses et de générer automatiquement les scenarios de risque liés à la sûreté et à la sécurité qui amènent à un évènement indésirable donné, avec une estimation de leurs probabilités.L’approche S-cube est basée sur une base de connaissance (BDC) qui décrit les composants typiques des architectures industrielles incluant les systèmes d’information, le contrôle et la supervision, et l’instrumentation. Cette BDC a été conçue sur la base d’une taxonomie d’attaques et modes de défaillances et un mécanisme de raisonnement hiérarchique. Elle a été mise en œuvre à l’aide du langage de modélisation Figaro et ses outils associés. Afin de construire le modèle du système, l’utilisateur saisit graphiquement l’architecture physique et fonctionnelle (logiciels et flux de données) du système. L’association entre la BDC et ce modèle produit un modèle d’états dynamiques : une chaîne de Markov à temps continu. Pour limiter l’explosion combinatoire, cette chaîne n’est pas construite mais peut être explorée de deux façons : recherche de séquences amenant à un évènement indésirable ou simulation de Monte Carlo, ce qui génère des résultats qualitatifs et quantitatifs.On illustre enfin l’approche S-cube sur un cas d’étude réaliste : un système de stockage d’énergie par pompage, et on montre sa capacité à générer une analyse holistique couvrant les risques liés à la sûreté et à la sécurité. Les résultats sont ensuite analysés afin d’identifier les interactions potentielles entre sûreté et sécurité et de donner des recommandations
Cyber physical systems (CPS) denote systems that embed programmable components in order to control a physical process or infrastructure. CPS are henceforth widely used in different industries like energy, aeronautics, automotive, medical or chemical industry. Among the variety of existing CPS stand SCADA (Supervisory Control And Data Acquisition) systems that offer the necessary means to control and supervise critical infrastructures. Their failure or malfunction can engender adverse consequences on the system and its environment.SCADA systems used to be isolated and based on simple components and proprietary standards. They are nowadays increasingly integrating information and communication technologies (ICT) in order to facilitate supervision and control of the industrial process and to reduce exploitation costs. This trend induces more complexity in SCADA systems and exposes them to cyber-attacks that exploit vulnerabilities already existent in the ICT components. Such attacks can reach some critical components within the system and alter its functioning causing safety harms.We associate throughout this dissertation safety with accidental risks originating from the system and security with malicious risks with a focus on cyber-attacks. In this context of industrial systems supervised by new SCADA systems, safety and security requirements and risks converge and can have mutual interactions. A joint risk analysis covering both safety and security aspects would be necessary to identify these interactions and optimize the risk management.In this thesis, we give first a comprehensive survey of existing approaches considering both safety and security issues for industrial systems, and highlight their shortcomings according to the four following criteria that we believe essential for a good model-based approach: formal, automatic, qualitative and quantitative and robust (i.e. easily integrates changes on system into the model).Next, we propose a new model-based approach for a safety and security joint risk analysis: S-cube (SCADA Safety and Security modeling), that satisfies all the above criteria. The S-cube approach enables to formally model CPS and yields the associated qualitative and quantitative risk analysis. Thanks to graphical modeling, S-cube enables to input the system architecture and to easily consider different hypothesis about it. It enables next to automatically generate safety and security risk scenarios likely to happen on this architecture and that lead to a given undesirable event, with an estimation of their probabilities.The S-cube approach is based on a knowledge base that describes the typical components of industrial architectures encompassing information, process control and instrumentation levels. This knowledge base has been built upon a taxonomy of attacks and failure modes and a hierarchical top-down reasoning mechanism. It has been implemented using the Figaro modeling language and the associated tools. In order to build the model of a system, the user only has to describe graphically the physical and functional (in terms of software and data flows) architectures of the system. The association of the knowledge base and the system architecture produces a dynamic state based model: a Continuous Time Markov Chain. Because of the combinatorial explosion of the states, this CTMC cannot be exhaustively built, but it can be explored in two ways: by a search of sequences leading to an undesirable event, or by Monte Carlo simulation. This yields both qualitative and quantitative results.We finally illustrate the S-cube approach on a realistic case study: a pumped storage hydroelectric plant, in order to show its ability to yield a holistic analysis encompassing safety and security risks on such a system. We investigate the results obtained in order to identify potential safety and security interactions and give recommendations
APA, Harvard, Vancouver, ISO, and other styles
10

Fraccaroli, Enrico. "A Holistic Approach to Functional Safety for Networked Cyber-Physical Systems." Doctoral thesis, 2019. http://hdl.handle.net/11562/995239.

Full text
Abstract:
Functional safety is a significant concern in today's networked cyber-physical systems such as connected machines, autonomous vehicles, and intelligent environments. Simulation is a well-known methodology for the assessment of functional safety. Simulation models of networked cyber-physical systems are very heterogeneous relying on digital hardware, analog hardware, and network domains. Current functional safety assessment is mainly focused on digital hardware failures while minor attention is devoted to analog hardware and not at all to the interconnecting network. In this work we believe that in networked cyber-physical systems, the dependability must be verified not only for the nodes in isolation but also by taking into account their interaction through the communication channel. For this reason, this work proposes a holistic methodology for simulation-based safety assessment in which safety mechanisms are tested in a simulation environment reproducing the high-level behavior of digital hardware, analog hardware, and network communication. The methodology relies on three main automatic processes: 1) abstraction of analog models to transform them into system-level descriptions, 2) synthesis of network infrastructures to combine multiple cyber-physical systems, and 3) multi-domain fault injection in digital, analog, and network. Ultimately, the flow produces a homogeneous optimized description written in C++ for fast and reliable simulation which can have many applications. The focus of this thesis is performing extensive fault simulation and evaluating different functional safety metrics, \eg, fault and diagnostic coverage of all the safety mechanisms.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Functional Safety, Cyber-Physical Systems"

1

Furrer, Frank J. Safety and Security of Cyber-Physical Systems. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37182-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ferrari, Riccardo M. G., and André M. H. Teixeira, eds. Safety, Security and Privacy for Cyber-Physical Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65048-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sayed-Mouchaweh, Moamar, ed. Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74962-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Griffor, Edward. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Griffor, Edward. Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems. Elsevier Science & Technology Books, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ferrari, Riccardo M. G., and André M. H. Teixeira. Safety, Security and Privacy for Cyber-Physical Systems. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferrari, Riccardo M. G., and André M. H. Teixeira. Safety, Security, and Privacy for Cyber-Physical Systems. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ward, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.

Full text
Abstract:
Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems and components that govern safety must be protected from harmful attacks, unauthorized access, damage, or anything else that might interfere with safety functions. Automotive Cybersecurity: An Introduction to ISO/SAE 21434 provides readers with an overview of the standard developed to help manufacturers keep up with changing technology and cyber-attack methods. ISO/SAE 21434 presents a comprehensive cybersecurity tool that addresses all the needs and challenges at a global level. Industry experts, David Ward and Paul Wooderson, break down the complex topic to just what you need to know to get started including a chapter dedicated to frequently asked questions. Topics include defining cybersecurity, understanding cybersecurity as it applies to automotive cyber-physical systems, establishing a cybersecurity process for your company, and explaining assurances and certification.
APA, Harvard, Vancouver, ISO, and other styles
9

Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sayed-Mouchaweh, Moamar. Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems. Springer International Publishing AG, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Functional Safety, Cyber-Physical Systems"

1

Duracz, Adam, Ayman Aljarbouh, Ferenc A. Bartha, Jawad Masood, Roland Philippsen, Henrik Eriksson, Jan Duracz, Fei Xu, Yingfu Zeng, and Christian Grante. "Advanced Hazard Analysis and Risk Assessment in the ISO 26262 Functional Safety Standard Using Rigorous Simulation." In Cyber Physical Systems. Model-Based Design, 108–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41131-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gharib, Mohamad, Paolo Lollini, Andrea Ceccarelli, and Andrea Bondavalli. "Dealing with Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach." In Critical Information Infrastructures Security, 194–206. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99843-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Broy, Manfred, Wolfgang Böhm, and Bernhard Rumpe. "Advanced Systems Engineering." In Model-Based Engineering of Collaborative Embedded Systems, 353–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62136-0_19.

Full text
Abstract:
AbstractAdvanced systems engineering (ASE) is a new paradigm for agile, efficient, evolutionary, and quality-aware development of complex cyber-physical systems using modern digital technologies and tools. ASE is essentially enabled by smart digital modeling tools for specifying, modeling, testing, simulating, and analyzing the system under development embedded in a coherent and consistent methodology.The German Federal Ministry of Education and Research (BMBF) projects SPES2020, SPES_XT, and CrESt offer such a methodology and framework for model-based systems engineering (MBSE). The framework provides a comprehensive methodology for MBSE that is independent of tools and modeling languages. The framework also offers a comprehensive set of concrete modeling techniques and activities that build on a formal, mathematical foundation. The SPES framework is based on four principles that are of paramount importance: (1) Functional as well as non-functional requirements fully modeled and understood at system level. (2) Consistent consideration of interfaces at each system level. (3) Decomposition of systems into subsystems and their interfaces. (4) Models for a variety of cross-sectional topics (e.g., variability, safety, dynamics).
APA, Harvard, Vancouver, ISO, and other styles
4

Furrer, Frank J. "Cyber-Physical Systems." In Safety and Security of Cyber-Physical Systems, 9–76. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37182-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gkioulos, Vasileios. "Safety in Cyber-Physical Systems." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1730-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Juhász, Dávid, László Domoszlai, and Barnabás Králik. "Rea: Workflows for Cyber-Physical Systems." In Central European Functional Programming School, 479–506. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15940-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Platzer, André. "Safety & Contracts." In Logical Foundations of Cyber-Physical Systems, 95–136. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63588-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Haddadin, Sami. "Physical Safety in Robotics." In Formal Modeling and Verification of Cyber-Physical Systems, 249–71. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-09994-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Furrer, Frank J. "Principles for Safety." In Safety and Security of Cyber-Physical Systems, 433–48. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-37182-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bukunov, Alexander. "Functional Modeling of an Integration Information System for Building Design." In Cyber-Physical Systems and Control, 525–35. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34983-7_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Functional Safety, Cyber-Physical Systems"

1

Fraccaroli, Enrico, Davide Quaglia, and Franco Fummi. "Simulation-based Holistic Functional Safety Assessment for Networked Cyber-Physical Systems." In 2018 Forum on specification & Design Languages (FDL). IEEE, 2018. http://dx.doi.org/10.1109/fdl.2018.8524050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gharib, Mohamad, Paolo Lollini, Andrea Ceccarelli, and Andrea Bondavalli. "Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach." In 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 2019. http://dx.doi.org/10.1109/hase.2019.00021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Madala, Kaushik, and Hyunsook Do. "Functional Safety Hazards for Machine Learning Components in Autonomous Vehicles." In 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS). IEEE, 2021. http://dx.doi.org/10.1109/icps49255.2021.9468143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aceituna, Daniel, Kaushik Madala, and Hyunsook Do. "Deriving Functional Safety Requirements Using Undesired Combination State Templates." In 2018 4th International Workshop on Requirements Engineering for Self-Adaptive, Collaborative, and Cyber Physical Systems (RESACS). IEEE, 2018. http://dx.doi.org/10.1109/resacs.2018.00006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gu, Ai, Zhenyu Yin, Yue Li, Bo Su, and Lan Shen. "Functional Safety Assessment and Security Protection Framework of Cyber Physical Machine Tool System." In 2018 IEEE 4th International Conference on Computer and Communications (ICCC). IEEE, 2018. http://dx.doi.org/10.1109/compcomm.2018.8780915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Anyi. "Discussion on Functional Safety and Cyber Security of I&C System in Nuclear Facilities." In 2022 29th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/icone29-90807.

Full text
Abstract:
Abstract The safety of I&C system of nuclear facilities is one of the key points of nuclear safety supervision. Due to the use of proprietary technology and generally not connected with IT systems, traditional I&C system of nuclear facilities mainly focuses on functional safety in design. Relevant standards such as IEC 61508, IEC 61511 and IEC 61513 all focus on ensuring functional safety. The extensive use of information technology in nuclear energy field has brought about cyber security threats, and cyber-attacks against nuclear facilities have been reported occasionally. The International Atomic Energy Agency (IAEA) and nuclear safety regulators around the world have issued laws, regulations and technical standards to strengthen the supervision of cyber security of nuclear facilities. However, how to properly deal with the relationship between functional safety and cyber security has become a hot issue when strengthening the supervision of cyber security of nuclear facilities. Based on the relevant international standards and national practices, this paper further clarifies the relevant concepts, review current construction practices, analyzes and discusses the relationship between functional safety and cyber security. The research lays a foundation for the subsequent establishment of applicable nuclear power cyber security standard system.
APA, Harvard, Vancouver, ISO, and other styles
7

Jin, Jianghong, Zhicong Zhao, and Yutian Wang. "Coordination Method of Functional Safety and Cyber Security for Industrial Control Systems." In 2021 China Automation Congress (CAC). IEEE, 2021. http://dx.doi.org/10.1109/cac53003.2021.9727479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tian, Yukun, Jianghai Li, and Xiaojin Huang. "Integrated Risk Analysis of Function Safety and Cyber Security on I&C System of HTP-PM With STPA-SafeSec." In 2022 29th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/icone29-93395.

Full text
Abstract:
Abstract Cyber security risk analysis can identify and assess factors that may damage to the system such as digital instrumentation and control system of nuclear power plants. Performing cyber security risk analysis is important for instrumentation and control system of nuclear power plants because it could assess overall impacts of risks and help to identify vulnerabilities to determine next steps to address security risks. With the integration of information system and physical system, cyber security of information system and functional safety of physical system interact with each other, resulting in a type of new comprehensive security problem and introducing serious security risks. Most of the existing cyber security risk analysis methods pay more attention to cyberattacks like attack tree analysis method, Petri net method, and Bayesian network method. STPA-SafeSec is a top-down security risk analysis method focusing on the system itself based on system theory, which starts from unacceptable losses of the system and pays attention to the causal factors that produce unsafe control. In this paper, STPA-SafeSec is applied to the primary circuit pressure control system of high temperature gas-cold reactors in order to perform the hazard analysis of integrated risk assessment for both functional safety and cyber security. The application details are given and a part of the hazardous scenarios tree is obtained for the formulation of mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
9

Svoboda, Jiří, and Vladislav Kocián. "Framework for Virtual and Physical Testing of Automated Vehicle Systems." In FISITA World Congress 2021. FISITA, 2021. http://dx.doi.org/10.46720/f2020-acm-046.

Full text
Abstract:
Massive expansion and implementation of Advanced Driver Assistant Systems and advent of Highly Automated Driving functions brings huge challenges in terms of design and development, but also function validation and certification process which is a limiting factor for their market introduction. To ensure safety of such systems, whose complexity is rapidly growing, it is essential to evaluate functionality of automated driving systems within the mandatory certification before it’s deployed on the road. And after their deployment, they must be a subject to periodical technical inspection during life cycle as well. The number of regulations and standards considering safety of AD functions gradually increases, but current safety standards and regulations still have to be adopted and enhanced. For highly automated driving functions and AVs that do not require permanent monitoring by the driver, a theoretically infinite number of possible traffic situations, that a self-driving car could possibly encounter, needs be tested. One promising method to overcome this matter is the scenario-based approach focused on critical, dangerous and extreme situations. Such approach ensures a repeatability and robustness of an approval process if it is supported by a significant sample of harmonized scenarios. Since confronting conventional physical driving tests with this test effort is not feasible anymore, virtualization of testing methods by means of computer simulation needs to be emphasized. To meet above described challenges, TÜV SÜD is developing a methodology for scenario-based evaluation of AD functionality as a supplement for either development or future certification of automated driving systems. The methodology combines virtual-based approach and physical testing and guarantees repeatability of test conditions. Virtual-based testing is provided by an in-house simulation toolchain with an open architecture. The toolchain consists of functional blocks as: database of standardized scenario, virtual environment model, high fidelity physics-based sensor simulation, model of vehicle dynamics, control functions and algorithms, automated and standardized post-processing and reporting. Physical testing provides real-world data measurement used among other purposes for validation of the simulation toolchain and its relevant functional blocks respectively. Physical testing is performed on our own test track using typical equipment as: driving robots, inertial measurement unit, guided soft target, soft VRU targets, master control station and others. In presentation, an overview of the current state of methodology is given and the workflow is demonstrated for a specific operational design domain (ODD). Architecture of simulation toolchain is described and explanation how functional blocks are embedded into overall architecture and how they interact with each other is given. Trustworthiness for virtual test execution will be discussed by means of a comparison and correlation between real-world and virtual-simulation measurement results for a specific operational design domain.
APA, Harvard, Vancouver, ISO, and other styles
10

Zelinko, Ilona, Vyacheslav Kharchenko, and Konstantin Leontiev. "Cyber Security Assessment of Component Off-the-Shelf Based NPP I&C System Using IMECA Technique." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67120.

Full text
Abstract:
Nowadays cyber security assurance is one of the key challenges of safety critical software based NPP I&C (Nuclear Power Plants Instrumentation and Control) systems requirements profiling, development and operation. Any I&C system consists of a set of standard software (SW), hardware (HW) and FPGA components. These components can be selected and combined in different ways to address the particular control and safety assurance related tasks. Some of them are proprietary software (PS) and commercial off-the-shelf (COTS) components developed previously. Application of such components reduces the level of safety and cyber security, because they can contain vulnerabilities that were created intentionally. In this case, targeted attacks can lead to a system failure. National Vulnerability Database (NVD) and other open databases contain information about vulnerabilities which can be attacked by insiders or other intruders and decrease cyber security of NPP I&C systems. In this paper, we propose a safety assessment technique of NPP I&C systems, which consists of the following procedures: 1. Analysis of I&C architecture to assess influence of OTS component failures on dependability (reliability and safety) of the system. For that purpose, FMEDA or similar techniques can be applied. As a result, three-dimension criticality matrixes (CM) (with metrics of detection, probability and severity) are developed for different components (SWFCM and HW/FPGAFCM). 2. The IMECA-based assessment of OTS components and their configuration. In this case, CMs (SWICM and HW/FPGAICM) describe the degree of failure component influence on cyber security. 3. Joining of criticality matrixes (SWFCM and HW/FPGAFCM, SWICM and HW/FPGAICM), impact analysis of components depending on degree of influence on cyber security and safety as a whole. 4. Developing of Security Assurance Case and selecting of countermeasures according to safety (cyber security)/costs criteria. The developed tool supports creation of criticality matrixes for each analyzed component of the system and I&C as a whole. Joining of criticality matrixes allows creating common matrix for system cyber security and functional safety. The tool supports decision making to optimize choice of countermeasures according to criterion of safety and security/cost criterion.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography