Certifications of critical systems - the CECRIS experience / / editors : Andrea Bondavalli, Francesco Brancati |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Gistrup, Denmark : , : River Publishers, , [2017] |
Descrizione fisica | 1 online resource (316 pages) : illustrations, tables |
Disciplina | 005.8 |
Collana | River Publishers series in information science and technology |
Soggetto topico |
Computer security
Electronic digital computers Electronic digital computers - Reliability |
ISBN |
1-00-333748-1
1-003-33748-1 1-000-79546-2 87-93519-55-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910632997103321 |
Gistrup, Denmark : , : River Publishers, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Safety, Reliability, and Security : 43rd International Conference, SAFECOMP 2024, Florence, Italy, September 18–20, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Friedemann Bitsch |
Autore | Ceccarelli Andrea |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (325 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
TrappMario
BondavalliAndrea BitschFriedemann |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks
Software engineering Information technology - Management Robotics Microprogramming Computer networks - Security measures Computer Communication Networks Software Engineering Computer Application in Administrative Data Processing Control Structures and Microprogramming Mobile and Network Security |
ISBN | 3-031-68606-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Fault Injection and Tolerance -- In-Memory Zero-Space Floating-Point-Based CNN Protection Using Non-significant and Invariant Bits -- 1 Introduction -- 2 Background -- 3 Proposed Methodology -- 3.1 Identification of non-Significant bits -- 3.2 Location of invariant bits -- 4 Case Study: LeNet-5 and GoogLeNet -- 4.1 Locating Non-Significant Bits -- 4.2 Locating Invariant Bits -- 4.3 Proposed Error Correcting Codes -- 4.4 Overhead Estimation of the Proposed ECCs -- 5 Discussion -- 6 Conclusions -- References -- A Failure Model Library for Simulation-Based Validation of Functional Safety -- 1 Introduction -- 2 Related Work -- 3 A Failure Model Library for Simulation-Based FI -- 3.1 Failure Model Collection -- 3.2 Failure Model Semantics -- 4 Case Study -- 5 Limitations -- 6 Conclusion -- References -- Strategic Resilience Evaluation of Neural Networks Within Autonomous Vehicle Software -- 1 Introduction -- 2 Autonomous Driving Frameworks -- 2.1 L4 System: LBC -- 2.2 L2 System: OpenPilot -- 2.3 Driving Simulator: CARLA -- 3 Methodology -- 3.1 Vulnerable Weights: Taylor Guided Fault Injection (TGFI) -- 3.2 Experimental Campaigns -- 4 Resilience Evaluation -- 4.1 Resilience of L4 LBC -- 4.2 Resilience of L2 OpenPilot -- 5 Mitigation -- 5.1 L4 LBC: Ranger -- 5.2 L2 OpenPilot: Driver Intervention -- 6 Case Studies and Discussion -- 6.1 Importance of Layer Depth for Resilience -- 6.2 Sensitivity to Single and Multi-bit Faults -- 6.3 Lessons Learned from L4 LBC and L2 OpenPilot -- 7 Related Work -- 8 Conclusions -- References -- System and Software Safety Assurance -- Reconciling Safety Measurement and Dynamic Assurance -- 1 Introduction -- 2 Conceptual Background -- 3 Motivating Example -- 3.1 Baseline Safety -- 3.2 Practical Drift -- 4 Framework -- 4.1 Defining Safety Metrics and Indicators.
4.2 Updating and Revising the Operational Risk Assessment -- 4.3 Characterizing the Change to Safety Risk -- 4.4 Numerical Examples -- 5 Towards Formal Foundations -- 6 Concluding Remarks -- References -- Safety Invariant Engineering for Interlocking Verification -- 1 Introduction -- 2 Safety Invariants -- 2.1 Requirements -- 2.2 Current Solutions -- 3 Property Engineering -- 3.1 Eliciting Safety Properties from Standards -- 3.2 Reducing the Number of False Positives -- 3.3 Redefining What the Property Violation Is -- 3.4 Regression Testing of Developed Safety Invariants -- 4 Discussion and Conclusions -- References -- Assurance Case Synthesis from a Curated Semantic Triplestore -- 1 Introduction -- 2 The Rapid Assurance Curation Kit (RACK) -- 3 Automated GSN Synthesis from RACK -- 3.1 The GSN Ontology -- 3.2 Project-Specific GSN Pattern Example -- 3.3 Automated Synthesis of GSN Fragments Using Patterns -- 3.4 GUI Support for GSN Generation and Analysis -- 4 Related Work -- 5 Conclusion -- References -- CyberDS: Auditable Monitoring in the Cloud -- 1 Introduction -- 2 Motivating Example -- 3 Monitoring Approach -- 3.1 Specification Language -- 3.2 Security Monitor -- 3.3 Tamper-Proof Claim Database and Auditability -- 4 Claim Revision Control -- 4.1 Revision Model -- 4.2 Monitoring with Revisions -- 5 Implementation and Experimental Results -- 6 Discussion -- 7 Related Work -- 7.1 Runtime Monitoring -- 7.2 Auditability of System Events -- 8 Conclusion -- References -- Automated Driving Systems -- Anatomy of a Robotaxi Crash: Lessons from the Cruise Pedestrian Dragging Mishap -- 1 Introduction -- 2 Background -- 2.1 Terminology -- 2.2 Crash Context and Overview -- 3 Crash Details -- 3.1 Crash Timeline -- 3.2 Crash Analysis -- 3.3 Potential Lessons -- 4 The Immediate Response -- 4.1 Immediate Response Timeline -- 4.2 Post-Crash Analysis. 4.3 Potential Lessons -- 5 Organizational Response -- 5.1 Organizational Response Analysis -- 5.2 Potential Lessons -- 6 Conclusions -- References -- Comprehensive Change Impact Analysis Applied to Advanced Automotive Systems -- 1 Introduction -- 2 Background on CIA for Incremental Safety Assurance -- 3 Running Example -- 4 Original Vehicle Family Models Stage 0 -- 4.1 HARA Metamodels -- 4.2 HAZOP Metamodels -- 4.3 Verification Metamodel -- 4.4 Instance Models -- 4.5 Instances for Stage 0 -- 5 CIA After a Change to the Battery Management System -- 5.1 Identifying Direct Changes - Stage 1 -- 5.2 Identifying Potential Impacts in the System - Stage 2 -- 5.3 Confirming Actual Impacts in the System - Stage 3 -- 5.4 Identifying Potential Impacts in the Assurance Case - Stage 4 -- 5.5 Confirming Actual Impacts in the Assurance - Stage 5 -- 5.6 Incremental Assurance - Stages 6 and 7 -- 6 Discussion -- 7 Conclusion -- References -- A Case Study of Continuous Assurance Argument for Level 4 Automated Driving -- 1 Introduction -- 2 Related Work -- 3 A Case Study in a Local City -- 3.1 Top Level of Assurance Case for Level 4 Automated Driving -- 3.2 GSN Module M2 for Identification of Risk and Hazard -- 3.3 GSN Module M4 for Evaluation and Validation -- 4 A Toolchain of an Assurance Case Tool and a Monitoring System -- 5 Lessons Obtained from the Case Study -- 6 Concluding Remarks -- References -- Security of Safety-Critical Systems -- TitanSSL: Towards Accelerating OpenSSL in a Full RISC-V Architecture Using OpenTitan Root-of-Trust -- 1 Introduction -- 2 Background and Related Works -- 3 Hardware Architecture -- 4 TitanSSL Software Architecture -- 4.1 Application Processor -- 4.2 Security Controller -- 5 Experimental Results -- 5.1 Comparison with Software Implementation -- 5.2 OpenTitan Firmware Analysis -- 6 Security Assumptions and Implications. 7 Conclusion -- References -- A Lightweight and Responsive On-Line IDS Towards Intelligent Connected Vehicles System -- 1 Introduction -- 2 Methodology -- 2.1 System Overview -- 2.2 Threat Model -- 2.3 ML-BF Model -- 2.4 Feature Engineering -- 2.5 Blacklist Filter -- 3 Implementation -- 3.1 Testbed Setting -- 3.2 Dataset Selection -- 3.3 Data Pre-processing -- 3.4 Machine Learning Approaches Adoption -- 3.5 Model Training -- 4 Experimental Results -- 4.1 Evaluation Metrics -- 4.2 Detection Performance -- 4.3 Computational Consumption -- 4.4 Analysis and Discussion -- 5 Related Work -- 5.1 Machine Learning for Intrusion Detection in ICV -- 5.2 Lightweight IDS in ICV -- 5.3 Responsive IDS in ICV -- 6 Conclusion -- References -- Evaluating the Vulnerability Detection Efficacy of Smart Contracts Analysis Tools -- 1 Introduction -- 2 Background -- 3 Related Works -- 4 Experimental Study Methodology -- 5 Experimental Study Results -- 5.1 RQ1: Contests Versus Vulnerabilities -- 5.2 RQ2: Tools Versus Vulnerabilities -- 5.3 RQ3: Tools in Theory Versus Tools in Practice -- 5.4 RQ4: Analysis Complexity Versus Tool Efficacy -- 6 Conclusions -- References -- Safety-Security Analysis via Attack-Fault-Defense Trees: Semantics and Cut Set Metrics -- 1 Introduction -- 2 Related Work -- 3 Case Study: Gridshield -- 4 Background -- 5 Attack-Fault-Defense Trees -- 5.1 Formal Definition of AFDT -- 5.2 Gridshield AFDT -- 6 Qualitative Analysis of AFDT -- 7 Safety and Security Dependencies via MCS -- 8 Conclusion and Future Work -- References -- Safety Verification -- Coyan: Fault Tree Analysis - Exact and Scalable -- 1 Introduction -- 2 Preliminaries -- 3 Computing Unreliability Values -- 4 Unreliability Through WMC of Tseitin Transformation -- 5 Implementation -- 6 Experimentation -- 6.1 Benchmarks -- 6.2 Results -- 6.3 Industrial Benchmarks -- 7 Concluding Remarks. References -- Safety Argumentation for Machinery Assembly Control Software -- 1 Introduction -- 2 Background -- 2.1 EN ISO 13849:2023 -- 2.2 Assurance Cases -- 2.3 Contract-Based Design -- 3 SAMACS: Safety Argumentation for Machinery Assembly Control Software -- 4 Case Study -- 4.1 Establishment of Software Responsibility -- 4.2 Definition of Software Safety Goals -- 4.3 Identification of Software Safety Requirements -- 4.4 Definition of Contracts -- 4.5 Identification of Verification Techniques and Evidence Provision -- 4.6 Composing the Safety Case Arguments -- 5 Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Sound Non-interference Analysis for C/C++ -- 1 Introduction -- 2 Sound Static Source Code Analysis -- 3 Data and Control Flow Errors -- 4 Data and Control Flow Analysis -- 5 Taint Analysis -- 5.1 Modeling Interference -- 5.2 Signal Flow Analysis -- 5.3 Freedom of Interference Between Software Components -- 6 Experimental Results -- 7 Related Work -- 8 Conclusion -- References -- Autonomous Systems -- A Dynamic Assurance Framework for an Autonomous Survey Drone -- 1 Introduction -- 2 Related Literature -- 3 Case Study and Monitor Examples -- 3.1 Monitoring Battery State and Required Power Consumption -- 3.2 Monitoring and Predicting Task Scheduling and Executing Times -- 3.3 Reconfigurations Calculation -- 4 Dynamic Assurance Case Approach -- 4.1 Battery Monitor Assurance Case -- 4.2 Discussion -- 4.3 Online Monitoring Interface -- 5 Conclusions -- References -- Redefining Safety for Autonomous Vehicles -- 1 Introduction -- 2 Existing Safety Definitions -- 2.1 ISO 26262 -- 2.2 ISO 21448 -- 2.3 ANSI/UL 4600 -- 2.4 Other Safety Definitions -- 3 Examples of AV Safety Problems -- 4 What is Missing from Safety Definitions -- 4.1 Open World Environment -- 4.2 Self-enforcement of Operational Limitations. 4.3 Ad Hoc Systems of Systems. |
Record Nr. | UNINA-9910886991403321 |
Ceccarelli Andrea | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Safety, Reliability, and Security [[electronic resource] ] : 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings / / edited by Andrea Bondavalli, Felicita Di Giandomenico |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXIV, 356 p. 131 illus.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer logic
Computer organization Software engineering Computer security Application software Logics and Meanings of Programs Computer Systems Organization and Communication Networks Software Engineering Systems and Data Security Computer Applications |
ISBN | 3-319-10506-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Verification &Validation Techniques -- Automotive Systems -- Coverage Models and Mitigation Techniques -- Assurance cases and arguments -- System Analysis -- Security and Trust -- Notations/Languages for Safety-related aspects -- Safety and Security. |
Record Nr. | UNISA-996202526603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Safety, Reliability, and Security [[electronic resource] ] : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings / / edited by Andrea Bondavalli, Andrea Ceccarelli, Frank Ortmeier |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 456 p. 155 illus.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer logic
Computer organization Software engineering Computer security Logics and Meanings of Programs Computer Systems Organization and Communication Networks Software Engineering Systems and Data Security |
ISBN | 3-319-10557-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Architecting Safety in Collaborative Mobile Systems (ASCoMS'14) -- ERCIM/EWICS/ARTEMIS Workshop on Dependable Embedded and Cyberphysical Systems and Systems-of-Systems (DECSoS’14) -- DEvelopment, Verification and VAlidation of cRiTical Systems (DEVVARTS'14) -- Integration of Safety and Security Engineering (ISSE'14) -- Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI'14) -- Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR'14). |
Record Nr. | UNISA-996202530603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Safety, Reliability, and Security : 33rd International Conference, SAFECOM 2014, Florence, Italy, September 10-12, 2014. Proceedings / / edited by Andrea Bondavalli, Felicita Di Giandomenico |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XXIV, 356 p. 131 illus.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer logic
Computer organization Software engineering Computer security Application software Logics and Meanings of Programs Computer Systems Organization and Communication Networks Software Engineering Systems and Data Security Computer Applications |
ISBN | 3-319-10506-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Verification &Validation Techniques -- Automotive Systems -- Coverage Models and Mitigation Techniques -- Assurance cases and arguments -- System Analysis -- Security and Trust -- Notations/Languages for Safety-related aspects -- Safety and Security. |
Record Nr. | UNINA-9910484397203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Safety, Reliability, and Security : SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014, Proceedings / / edited by Andrea Bondavalli, Andrea Ceccarelli, Frank Ortmeier |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 456 p. 155 illus.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer logic
Computer organization Software engineering Computer security Logics and Meanings of Programs Computer Systems Organization and Communication Networks Software Engineering Systems and Data Security |
ISBN | 3-319-10557-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Architecting Safety in Collaborative Mobile Systems (ASCoMS'14) -- ERCIM/EWICS/ARTEMIS Workshop on Dependable Embedded and Cyberphysical Systems and Systems-of-Systems (DECSoS’14) -- DEvelopment, Verification and VAlidation of cRiTical Systems (DEVVARTS'14) -- Integration of Safety and Security Engineering (ISSE'14) -- Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI'14) -- Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR'14). |
Record Nr. | UNINA-9910483100203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops : DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Erwin Schoitsch, Barbara Gallina, Friedemann Bitsch |
Autore | Ceccarelli Andrea |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (474 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
TrappMario
BondavalliAndrea SchoitschErwin GallinaBarbara BitschFriedemann |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks
Image processing - Digital techniques Computer vision Information technology - Management Software engineering Computer science Data protection Computer Communication Networks Computer Imaging, Vision, Pattern Recognition and Graphics Computer Application in Administrative Data Processing Software Engineering Theory of Computation Security Services |
ISBN | 3-031-68738-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- 19th International ERCIM/EWICS Workshop on Dependable Smart Embedded Cyber-Physical Systems and Systems-of Systems (DECSoS 2024) -- 19th International Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- International Program Committee 2024 -- A Systems Viewpoint on the Integration of Subsystems Developed with Heterogeneous Safety Standards -- 1 The Need for Integration -- 2 Why Existing Standards Don't Play Nicely Together -- 2.1 How Existing Standards Differ -- 2.2 Current Approaches to Importance Metrics -- 2.3 Summary of Integration Challenges -- 3 Addressing the Integration Issue -- 3.1 Existing Approaches -- 3.2 The IEC 63187 Approach -- 4 Conclusion -- References -- Intelligent Decision-Making in Lane Detection Systems Featuring Dynamic Framework for Autonomous Vehicles -- 1 Introduction -- 2 Background -- 2.1 AI-Based Approaches -- 2.2 Non AI-Based Approaches -- 2.3 Hybrid Approaches -- 3 Proposed Dynamic Framework -- 3.1 Experimental Setup - Vehicle Demonstrator -- 3.2 Conventional Algorithm -- 3.3 PilotNetC Architecture -- 4 Results -- 4.1 Results for Conventional Algorithms -- 4.2 Results for PilotNetC -- 4.3 The Dynamic Framework -- 5 Conclusion -- References -- Security and Safety in Urban Environments: Evaluating Threats and Risks of Autonomous Last-Mile Delivery Robots -- 1 Introduction -- 2 The Last-Mile Robot in Our Case Study -- 3 Case Study Modeling and Analysis -- 3.1 Extended Multi-level Model -- 3.2 Attack Types -- 4 Analysis of Attack Types and Human-Safety Levels -- 5 Ideas for a Theoretical Approach -- 6 Summary and Outlook -- References -- Safe Road-Crossing by Autonomous Wheelchairs: A Novel Dataset and Its Evaluation -- 1 Introduction -- 2 Related Works.
3 Reference Scenario for Safe Road-Crossing -- 4 Design of the Danger Function -- 5 Dataset Generation -- 5.1 Lab Environment -- 5.2 Data Collection and Preprocessing -- 5.3 Data Elaboration and Sensor Fusion -- 6 Experimental Evaluation -- 7 Threats to Validity -- 8 Conclusions -- References -- Automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety -- 1 Introduction -- 2 Safety-Critical Networked Control Systems -- 3 Security-Explicit SysML Modelling of NCSs -- 3.1 SysML Modeling of NCSs -- 3.2 Modelling Cyberattacks in SysML -- 4 Modelling and Refinement in Event-B -- 5 Generation of Event-B Specification from SysML Model -- 5.1 Architecture of SysMLToEventB -- 5.2 The Tool-Chain -- 5.3 Tool Validation -- 6 Related Work and Conclusions -- References -- Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 3 Preliminaries -- 3.1 Physically Unclonable Function -- 3.2 Network Model -- 3.3 Threat Assumptions -- 4 Two-Factor User Authentication Using PUF -- 4.1 Enrollment Phase -- 4.2 Authentication Phase -- 5 Security Analysis -- 5.1 Formal Security Analysis -- 5.2 Informal Analysis -- 6 Experimental Validation and Performance Analysis -- References -- Enhancing Tunnel Safety with Artery V2X Simulation for Real-Time Risk Assessment -- 1 Introduction -- 2 Related Work -- 3 Artery-Based Risk Assessment Framework -- 3.1 Artery Simulation Framework (Upper Part) -- 3.2 Data Manipulation and Risk Assessment (Lower Part) -- 4 Case Study: Simulation-Based Risk Assessment in Zederhaus Tunnel -- 4.1 Breakdown Scenario: Artery and SUMO Model -- 4.2 Breakdown Scenario: Risk Assessment -- 5 Conclusion and Future Work -- References -- Detecting and Mitigating Errors in Neural Networks -- 1 Introduction -- 2 State of the Art. 2.1 Error Correcting Memory (ECC Memory) -- 2.2 Memory Tagging -- 2.3 Storage Reduction -- 2.4 2-D ECC/2-D Cyclic Redundancy Check (CRC) -- 3 Layer Properties -- 4 The Proposed Framework -- 4.1 Preparation Step -- 4.2 Error Detection Phase -- 4.3 Error Correction Phase -- 5 Practical Examples -- 5.1 Deviation in the Weight -- 5.2 Deviation in the Architecture or the Activation Function -- 6 Conclusion -- References -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- Workshop Committees -- Organization Committee -- Programme Committee -- Additional Reviewers -- Challenges and Limitations of Utilizing Multi-core/Heterogeneous Logic Elements in the Railway Signaling Applications -- 1 Introduction -- 2 Railway Signaling System -- 3 EN 50129:2018: Hardware Requirements and Guidelines to Achieve SIL 4 -- 4 Architecture of State-of-the-Art Object Controller -- 5 Analysis of Using the Latest Logic Elements in Railway Signaling Systems -- 6 Conclusion -- 7 Future Work -- References -- Identifying Difficult Environmental Conditions with Scenario-Based Hazard and Fault Analysis -- 1 Introduction -- 2 Related Work -- 3 Identifying Triggering Conditions with SHFA -- 3.1 Step One: Scenario Modelling -- 3.2 Step Two: Hazardous Maneuver Identification -- 3.3 Step Three: Triggering Condition Identification -- 4 Illustrative Example -- 4.1 Scenario Modelling -- 4.2 Hazardous Maneuver Identification -- 4.3 Triggering Condition Identification -- 5 Result Analysis and Discussion -- 5.1 Triggering Condition Formalization -- 5.2 Findings -- 5.3 Capabilities and Limitations -- 6 Conclusion and Outlook -- References. Using GPT-4 to Generate Failure Logic -- 1 Introduction -- 2 FLAGPT: Developing a Failure Logic Analysis GPT -- 3 Task and System Descriptions -- 4 Results and Working Experience -- 4.1 Tank Overfill Failure Event -- 4.2 Air Bleed Cabin Supply System -- 4.3 Aircraft Wheel Brake and Gas Leak Systems -- 4.4 Alignment and Consistency -- 5 Conclusions -- References -- Towards an Argument Pattern for the Use of Safety Performance Indicators -- 1 Introduction -- 2 Background -- 3 A High-Level Argument Structure for Using SPIs -- 3.1 Systematic Definition of SPIs -- 3.2 Collection and Analysis of SPIs -- 3.3 Response to SPI Violations -- 4 Critical Analysis of the Argument About SPIs -- 5 Meta-SPIs to Validate the Argument About SPIs -- 6 Related Work -- 7 Summary and Future Work -- References -- Enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis -- 1 Introduction -- 2 Methodological Foundations for Continuous Assurance -- 2.1 Composing Assurance Cases with Theories and Defeater Patterns -- 2.2 Assessing Assurance Case for Soundness and Validity -- 3 Tools Support for Continuous Assurance -- 3.1 Property-Driven Semantics with LLM Support and Synthesized Prolog Logic-Based Analysis -- 3.2 Synthesis Assistant for Generating Assurance Cases -- 3.3 Continuous Assurance for CI/CD Software Designs Using ETB -- 4 Conclusion -- References -- Managing Changing Product Liability Obligations Emerging from New Proposed EU Directive -- 1 Introduction -- 1.1 Background -- 1.2 Recent and Ongoing Changes to the Legal Framework -- 1.3 Scope and Structure -- 2 How Automation Impacts Risk and Liability Obligations -- 3 The Socio-technical System Perspective -- 4 Impact of New EU Product Liability Directive -- 4.1 Overview of Changes -- 4.2 Overall Impact on Product Liability Obligations. 4.3 Impact on Liability Obligations Due to the Presumption of Defectiveness -- 4.4 Impact on Liability Obligations Due to the Presumption of Causality -- 5 Thoughts on Transparent and Efficient Management of Product Liability Obligations -- 5.1 Manufacturers' Defense Strategies -- 5.2 Liability Obligations Expressed in Modular Assurance Cases and Contracts -- 5.3 Integration of Present Assurance Cases Required by Standards -- 5.4 Capture Confidence in the Strength of Defense Through Independent and Continuous Assessments of the Modular Assurance Cases -- 5.5 Using Assurance Cases for Rebutting Other Presumptions in New PLD -- 6 Discussion, Conclusions and Further Work -- References -- Reaching Consensus on System-of-Systems Resilience Assurance: A Case of Mobility as a Service -- 1 Introduction -- 2 Concepts and Related Works -- 2.1 System Theoretic Process Analysis -- 2.2 Consensus Process Model -- 2.3 Mobility as a Service -- 3 Resilience Argumentation -- 3.1 Step 1: Identify Loss Scenarios -- 3.2 Step 2: Identify Resilience Requirement -- 4 Conflict and Consensus -- 4.1 Assumption -- 4.2 Conflict -- 4.3 Consensus Process Model -- 4.4 Example -- 5 Conclusion and Further Work -- References -- A Deductive Approach to Safety Assurance: Formalising Safety Contracts with Subjective Logic -- 1 Introduction -- 2 Background -- 2.1 Safety Assurance -- 2.2 Subjective Logic -- 3 A Formally Grounded Assurance Argument Structure -- 4 Constructing the Argument and Computing Confidence -- 5 Related Work -- 6 Discussion and Conclusions -- References -- A New Approach to Creating Clear Operational Safety Arguments -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Illustrative Examples -- 5 Conclusions and Future Work -- References -- Including Defeaters in Quantitative Confidence Assessments for Assurance Cases -- 1 Introduction. 2 Adding Defeaters to Confidence Assessment. |
Record Nr. | UNINA-9910886992003321 |
Ceccarelli Andrea | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-Physical Systems of Systems [[electronic resource] ] : Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy / / edited by Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 257 p. 124 illus.) |
Disciplina | 004.6 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer organization
Software engineering System theory Application software Computer Systems Organization and Communication Networks Software Engineering Complex Systems Information Systems Applications (incl. Internet) Computer Applications |
ISBN | 3-319-47590-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Basic concepts on systems of systems -- interfaces in evolving cyber-physical systems-of-systems -- emergence in cyber-physical systems-of-systems (CPSOSS) -- AMADEOS sysml profile for SoS conceptual modeling -- AMADEOS framework and supporting tools -- time and resilient master clocks in cyber-physical systems -- managing dynamicity in SoS -- case study definition and implementation. |
Record Nr. | UNINA-9910166651203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-Physical Systems of Systems [[electronic resource] ] : Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy / / edited by Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 257 p. 124 illus.) |
Disciplina | 004.6 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer organization
Software engineering System theory Application software Computer Systems Organization and Communication Networks Software Engineering Complex Systems Information Systems Applications (incl. Internet) Computer Applications |
ISBN | 3-319-47590-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Basic concepts on systems of systems -- interfaces in evolving cyber-physical systems-of-systems -- emergence in cyber-physical systems-of-systems (CPSOSS) -- AMADEOS sysml profile for SoS conceptual modeling -- AMADEOS framework and supporting tools -- time and resilient master clocks in cyber-physical systems -- managing dynamicity in SoS -- case study definition and implementation. |
Record Nr. | UNISA-996465510703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Dependable Computing [[electronic resource] ] : Third Latin-American Symposium, LADC 2007, Morelia, Mexico, September 26-28, 2007, Proceedings / / edited by Andrea Bondavalli, Francisco Brasileiro, Sergio Rajsbaum |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 |
Descrizione fisica | 1 online resource (XIV, 242 p.) |
Disciplina | 004.2 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer networks
Computers, Special purpose Electronic digital computers—Evaluation Software engineering Logic design Coding theory Information theory Computer Communication Networks Special Purpose and Application-Based Systems System Performance and Evaluation Software Engineering Logic Design Coding and Information Theory |
ISBN | 3-540-75294-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience. |
Record Nr. | UNISA-996466099503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|