Vai al contenuto principale della pagina
Titolo: | Computer safety, reliability, and security : SAFECOMP 2022 workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6-9, 2022, proceedings / / edited by Mario Trapp [and three others] |
Pubblicazione: | Cham, Switzerland : , : Springer, , [2022] |
©2022 | |
Descrizione fisica: | 1 online resource (360 pages) |
Disciplina: | 005.3 |
Soggetto topico: | Computer logic |
Application software | |
Persona (resp. second.): | TrappMario |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Intro -- Preface -- Organization -- Contents -- 17th International ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems (DECSoS 2022) -- En -- 1 Introduction -- 2 ECSEL and KDT JU: The European Cyber-Physical Systems Initiative -- 3 This Year's Workshop -- International Program Committee 2022 -- Triggering Conditions Analysis and Use Case for Validation of ADAS/ADS Functions -- 1 Introduction -- 2 Use Case and Methodology -- 2.1 ADAS/ADS Function Description -- 2.2 Operational Design Domain -- 2.3 Triggering Conditions List -- 2.4 Relevant Scenarios -- 2.5 Hazard Analysis and Risk Assessment -- 2.6 Qualitative Analysis -- 2.7 Testing and Evaluation -- 2.8 SOTIF Modifications -- 2.9 Residual Risk Quantification -- 2.10 SOTIF Argumentation -- 3 Outlook -- References -- A Statistical View on Automated Driving System Safety Architectures -- 1 Functional Safety and Safety of the Intended Functionality -- 1.1 Terms -- 2 Tolerable Risk -- 3 Current Sense-Plan-Act Architectures -- 4 Challenge of Control and Protection System Architecture -- 4.1 Probabilistic Target to Demonstrate -- 4.2 Functional Safety Related to Systematic E/E-failures -- 4.3 SOTIF - Low Demand Frequency Events -- 4.4 SOTIF - High Demand Frequency Events -- 5 Consequences -- 5.1 Common Cause Factor -- 5.2 Architectural Consequence -- 5.3 Quantitative Injury Risk Reduction Due to the Warning Subsystem -- 5.4 Further Benefits of the Warning Subsystem -- 6 Conclusion -- References -- Building a Test Bed for the Periodical Technical Inspection of Sensors Perceiving the Environment in Autonomous Vehicles -- 1 Introduction -- 2 Periodic Technical Inspection in Germany -- 2.1 Driver Assistance Systems in the Periodic Technical Inspection -- 3 Sensor Verification in the Field -- 4 Advancing the Periodical Technical Inspection. |
4.1 Sensors for the Environmental Perception -- 4.2 Test Bed for the Sensor Systems in the Periodical Technical Inspection -- 4.3 Positioning of the Vehicle on the Test Bed -- 4.4 Inspection of the Sensor Systems -- 4.5 Positioning of Targets -- 4.6 Sensor Targets for the Inspection -- 4.7 Exemplary Test Performed in Regard to the Lidar System -- 4.8 Required Information About the Vehicle Under Test -- 4.9 Related Work and Differentiation -- 5 Conclusion and Future Work -- References -- Testing and Verification of the Deep Neural Networks Against Sparse Pixel Defects -- 1 Introduction -- 2 Related Work -- 3 Proposed DES-based Approach -- 3.1 Use of the DE -- 3.2 Use of the DES -- 4 Integration into Safety-Critical Systems Development -- 5 Results -- 6 Conclusions -- References -- Observing the Impact of Multicore Execution Platform for TSP Systems Under Schedulability, Security and Safety Constraints -- 1 Introduction -- 2 Background and Assumptions -- 2.1 System Model and Assumptions -- 2.2 Security and Safety -- 2.3 Multi-objective Optimization -- 3 Design Space Exploration (DSE) Approach for Multicore TSP Systems -- 4 Test Cases and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Security Assessment Prospects as Part of Vehicle Regulations -- 1 Introduction -- 2 Regulatory Background -- 2.1 Type Approval -- 2.2 Periodic Technical Inspections (PTI) -- 3 Cybersecurity Challenges over the Years of Vehicle Operation -- 4 Related Work -- 5 State of the Art - Security Standard and Regulations -- 5.1 ISO/SAE 21434 - Cybersecurity Engineering -- 5.2 UN R155 Cybersecurity Regulation -- 6 Discussion and Future Assessment Prospects -- 7 Conclusion -- References -- UNECE Threat List Case Study: Prediction of Cyber Risks in the Automotive Domain Using Regression Analysis -- 1 Introduction -- 2 UNECE Automotive Potential Threats. | |
2.1 Estimation of the Likelihood Factors -- 2.2 Estimation of the Impact Factors -- 2.3 Building the Dataset -- 2.4 Regression Analysis -- 3 Case Study: UNECE Automotive Threats List -- 3.1 Regression Approaches -- 3.2 Results Evaluation -- 4 Summary, Conclusion, and Future Work -- References -- Watch: A Validation Framework and Language for Tool Qualification -- 1 Introduction and Motivation -- 2 Related Work -- 3 The Watch Framework and Language -- 3.1 End-To-End Testing of FuSa Relevant Toolchains -- 3.2 White-Box Testing: Low-Level Testing of CI Jobs -- 4 Conclusion and Outlook -- References -- Criteria for the Analysis of Gaps and Limitations of V& -- V Methods for Safety- and Security-Critical Systems -- 1 Introduction -- 2 Background -- 2.1 The VALU3S Project -- 2.2 Related Work -- 3 Criteria for the Analysis of Gaps and Limitations of V& -- V Methods -- 4 Application of the Criteria for the Analysis of Gaps and Limitations of V& -- V Methods -- 4.1 Application of the Criteria to Two Methods -- 4.2 Application Results -- 4.3 Discussion -- 5 Conclusion -- References -- 3rd International Workshop on Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical System (DepDevOps 2022) -- En -- 1 Introduction -- 2 H2020 Projects: Dependable DevOps -- 3 Acknowledgments -- 4 International Program Committee -- A Guided Search for Races Based on Data Flow Patterns -- 1 Introduction -- 2 Related Work -- 3 Race-Prone Data Flow Patterns -- 3.1 Terminology and Assumptions -- 3.2 Pattern 1 -- 3.3 Pattern 2 -- 3.4 Pattern 3 -- 4 Pattern-Based Race Detection -- 4.1 Phase 1: Pattern-Based Identification of Internal Races -- 4.2 Phase 2: Analysis of Extendibility from Internal Races to System Races -- 5 Evaluation -- 5.1 Example -- 5.2 Race Detection Capability and Effort -- 5.3 Comparison with Random Search -- 6 Conclusion. | |
References -- 9th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2022) -- En -- 1 Introduction -- 2 This Year's Workshop -- Workshop Committees -- Organization Committee -- Programme Committee and Reviewers -- DevOps and Safety? SafeOps! Towards Ensuring Safety in Feature-Driven Development with Frequent Releases -- 1 Introduction -- 2 Foundations -- 3 The SafeOps Approach -- 3.1 Prerequisites -- 3.2 Safety Engineering Support -- 3.3 Safety Management Dashboard -- 3.4 Data-Driven Safety -- 4 Related Work -- 5 Conclusion and Future Work -- References -- Dynamic Checks of Evidence Models for Assurance Projects in Eclipse OpenCert -- 1 Introduction -- 2 Approach -- 2.1 Extensible Evidence Checks -- 2.2 Dynamic Evidence Checks and Log Streaming -- 3 Related Work -- 4 Conclusion and Perspectives -- References -- An Approach for Deriving Reduced Collision Scenarios for Highly Automated Driving Systems -- 1 Introduction -- 2 State-of-Art and Science -- 2.1 Standards and Regulations -- 2.2 Highly Automated Driving System -- 2.3 Variance-Based Sensitivity Analysis -- 3 Scenario Reduction Approaches -- 3.1 Scenario Description -- 3.2 Logical Scenario Reduction -- 3.3 Scenario Simulation and Sensitivity Analysis -- 4 Conclusion and Future Work -- References -- State of the Art Study of the Safety Argumentation Frameworks for Automated Driving System -- 1 The Need for a Safety Argumentation Framework -- 2 A New Safety Assurance Scheme and Global Initiatives -- 2.1 Regulatory Informal Working Groups for ADS Safety Topics -- 2.2 Global Standardization Activities -- 2.3 Research and Industry Communities, Initiatives, and Projects -- 3 Safety Case as a Core Approach to Argue the Safety of ADS -- 3.1 Safety Case Content and Format -- 3.2 Safety Goals -- 3.3 Acceptance Criteria. | |
4 Safety Evidence: An Attempt to "Quantify" the ADS Safety -- 4.1 Requirements-Based Testing with Numerical Approaches -- 4.2 Quantitative Hazard and Risk Analysis as a Part of the SOTIF Processes -- 5 Conclusions and Outlook -- References -- 1st International Workshop on Security and Safety Interaction (SENSEI 2022) -- En -- 1 Introduction -- International Program Committee 2022 -- Increasing IoT Security by Supply Power Measurement -- 1 Introduction -- 1.1 Attack Scenarios -- 1.2 Pre-requisites and Assumptions -- 1.3 Other Approaches/State of the Art -- 2 Medical IoT Devices -- 3 Current Measurement for Security -- 3.1 Description of the Expected Power Consumption -- 3.2 Technical Realization with Off-the-Shelf Hardware -- 3.3 Extension to Detect Replay Attacks -- 4 Results -- 5 Conclusion -- References -- Towards Interdependent Safety Security Assessments Using Bowties -- 1 Introduction -- 2 Diagrammatic Representations -- 3 Formalisation of Safety-Security Bowties -- 3.1 Structure Trees -- 3.2 Disruption Trees -- 3.3 Prevention Assessments -- 3.4 Consequence Assessments -- 3.5 Bowties -- 4 Interdependence Analysis -- 4.1 Running Example: Safety Security Interplay -- 4.2 Independence -- 4.3 Conditional Dependency -- 4.4 Reinforcing Dependency -- 4.5 Antagonistic Dependency -- 5 Conclusions -- 5.1 Related Work -- 5.2 Assessment Techniques -- 5.3 Next Steps -- References -- 3rd International Workshop on Underpinnings for Safe Distributed Artificial Intelligence (USDAI 2022) -- En -- 1 Introduction -- 2 This Year's Workshop -- Acknowledgement -- Workshop Committees -- Organization Committee -- Programme Committee -- On Explainability in AI-Solutions: A Cross-Domain Survey -- 1 Introduction -- 2 Related Work -- 3 What Is Explainability of AI -- 4 Domains for Expainability -- 5 Conclusion -- References. | |
Research Questions in the Acceptance of Cybersecurity by SMEs in the EU. | |
Titolo autorizzato: | Computer Safety, Reliability, and Security |
ISBN: | 3-031-14862-2 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 996490367703316 |
Lo trovi qui: | Univ. di Salerno |
Opac: | Controlla la disponibilità qui |