top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Safety, Reliability, and Security : 43rd International Conference, SAFECOMP 2024, Florence, Italy, September 18–20, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Friedemann Bitsch
Computer Safety, Reliability, and Security : 43rd International Conference, SAFECOMP 2024, Florence, Italy, September 18–20, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Friedemann Bitsch
Autore Ceccarelli Andrea
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (325 pages)
Disciplina 004.6
Altri autori (Persone) TrappMario
BondavalliAndrea
BitschFriedemann
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Software engineering
Information technology - Management
Robotics
Microprogramming
Computer networks - Security measures
Computer Communication Networks
Software Engineering
Computer Application in Administrative Data Processing
Control Structures and Microprogramming
Mobile and Network Security
ISBN 3-031-68606-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Fault Injection and Tolerance -- In-Memory Zero-Space Floating-Point-Based CNN Protection Using Non-significant and Invariant Bits -- 1 Introduction -- 2 Background -- 3 Proposed Methodology -- 3.1 Identification of non-Significant bits -- 3.2 Location of invariant bits -- 4 Case Study: LeNet-5 and GoogLeNet -- 4.1 Locating Non-Significant Bits -- 4.2 Locating Invariant Bits -- 4.3 Proposed Error Correcting Codes -- 4.4 Overhead Estimation of the Proposed ECCs -- 5 Discussion -- 6 Conclusions -- References -- A Failure Model Library for Simulation-Based Validation of Functional Safety -- 1 Introduction -- 2 Related Work -- 3 A Failure Model Library for Simulation-Based FI -- 3.1 Failure Model Collection -- 3.2 Failure Model Semantics -- 4 Case Study -- 5 Limitations -- 6 Conclusion -- References -- Strategic Resilience Evaluation of Neural Networks Within Autonomous Vehicle Software -- 1 Introduction -- 2 Autonomous Driving Frameworks -- 2.1 L4 System: LBC -- 2.2 L2 System: OpenPilot -- 2.3 Driving Simulator: CARLA -- 3 Methodology -- 3.1 Vulnerable Weights: Taylor Guided Fault Injection (TGFI) -- 3.2 Experimental Campaigns -- 4 Resilience Evaluation -- 4.1 Resilience of L4 LBC -- 4.2 Resilience of L2 OpenPilot -- 5 Mitigation -- 5.1 L4 LBC: Ranger -- 5.2 L2 OpenPilot: Driver Intervention -- 6 Case Studies and Discussion -- 6.1 Importance of Layer Depth for Resilience -- 6.2 Sensitivity to Single and Multi-bit Faults -- 6.3 Lessons Learned from L4 LBC and L2 OpenPilot -- 7 Related Work -- 8 Conclusions -- References -- System and Software Safety Assurance -- Reconciling Safety Measurement and Dynamic Assurance -- 1 Introduction -- 2 Conceptual Background -- 3 Motivating Example -- 3.1 Baseline Safety -- 3.2 Practical Drift -- 4 Framework -- 4.1 Defining Safety Metrics and Indicators.
4.2 Updating and Revising the Operational Risk Assessment -- 4.3 Characterizing the Change to Safety Risk -- 4.4 Numerical Examples -- 5 Towards Formal Foundations -- 6 Concluding Remarks -- References -- Safety Invariant Engineering for Interlocking Verification -- 1 Introduction -- 2 Safety Invariants -- 2.1 Requirements -- 2.2 Current Solutions -- 3 Property Engineering -- 3.1 Eliciting Safety Properties from Standards -- 3.2 Reducing the Number of False Positives -- 3.3 Redefining What the Property Violation Is -- 3.4 Regression Testing of Developed Safety Invariants -- 4 Discussion and Conclusions -- References -- Assurance Case Synthesis from a Curated Semantic Triplestore -- 1 Introduction -- 2 The Rapid Assurance Curation Kit (RACK) -- 3 Automated GSN Synthesis from RACK -- 3.1 The GSN Ontology -- 3.2 Project-Specific GSN Pattern Example -- 3.3 Automated Synthesis of GSN Fragments Using Patterns -- 3.4 GUI Support for GSN Generation and Analysis -- 4 Related Work -- 5 Conclusion -- References -- CyberDS: Auditable Monitoring in the Cloud -- 1 Introduction -- 2 Motivating Example -- 3 Monitoring Approach -- 3.1 Specification Language -- 3.2 Security Monitor -- 3.3 Tamper-Proof Claim Database and Auditability -- 4 Claim Revision Control -- 4.1 Revision Model -- 4.2 Monitoring with Revisions -- 5 Implementation and Experimental Results -- 6 Discussion -- 7 Related Work -- 7.1 Runtime Monitoring -- 7.2 Auditability of System Events -- 8 Conclusion -- References -- Automated Driving Systems -- Anatomy of a Robotaxi Crash: Lessons from the Cruise Pedestrian Dragging Mishap -- 1 Introduction -- 2 Background -- 2.1 Terminology -- 2.2 Crash Context and Overview -- 3 Crash Details -- 3.1 Crash Timeline -- 3.2 Crash Analysis -- 3.3 Potential Lessons -- 4 The Immediate Response -- 4.1 Immediate Response Timeline -- 4.2 Post-Crash Analysis.
4.3 Potential Lessons -- 5 Organizational Response -- 5.1 Organizational Response Analysis -- 5.2 Potential Lessons -- 6 Conclusions -- References -- Comprehensive Change Impact Analysis Applied to Advanced Automotive Systems -- 1 Introduction -- 2 Background on CIA for Incremental Safety Assurance -- 3 Running Example -- 4 Original Vehicle Family Models Stage 0 -- 4.1 HARA Metamodels -- 4.2 HAZOP Metamodels -- 4.3 Verification Metamodel -- 4.4 Instance Models -- 4.5 Instances for Stage 0 -- 5 CIA After a Change to the Battery Management System -- 5.1 Identifying Direct Changes - Stage 1 -- 5.2 Identifying Potential Impacts in the System - Stage 2 -- 5.3 Confirming Actual Impacts in the System - Stage 3 -- 5.4 Identifying Potential Impacts in the Assurance Case - Stage 4 -- 5.5 Confirming Actual Impacts in the Assurance - Stage 5 -- 5.6 Incremental Assurance - Stages 6 and 7 -- 6 Discussion -- 7 Conclusion -- References -- A Case Study of Continuous Assurance Argument for Level 4 Automated Driving -- 1 Introduction -- 2 Related Work -- 3 A Case Study in a Local City -- 3.1 Top Level of Assurance Case for Level 4 Automated Driving -- 3.2 GSN Module M2 for Identification of Risk and Hazard -- 3.3 GSN Module M4 for Evaluation and Validation -- 4 A Toolchain of an Assurance Case Tool and a Monitoring System -- 5 Lessons Obtained from the Case Study -- 6 Concluding Remarks -- References -- Security of Safety-Critical Systems -- TitanSSL: Towards Accelerating OpenSSL in a Full RISC-V Architecture Using OpenTitan Root-of-Trust -- 1 Introduction -- 2 Background and Related Works -- 3 Hardware Architecture -- 4 TitanSSL Software Architecture -- 4.1 Application Processor -- 4.2 Security Controller -- 5 Experimental Results -- 5.1 Comparison with Software Implementation -- 5.2 OpenTitan Firmware Analysis -- 6 Security Assumptions and Implications.
7 Conclusion -- References -- A Lightweight and Responsive On-Line IDS Towards Intelligent Connected Vehicles System -- 1 Introduction -- 2 Methodology -- 2.1 System Overview -- 2.2 Threat Model -- 2.3 ML-BF Model -- 2.4 Feature Engineering -- 2.5 Blacklist Filter -- 3 Implementation -- 3.1 Testbed Setting -- 3.2 Dataset Selection -- 3.3 Data Pre-processing -- 3.4 Machine Learning Approaches Adoption -- 3.5 Model Training -- 4 Experimental Results -- 4.1 Evaluation Metrics -- 4.2 Detection Performance -- 4.3 Computational Consumption -- 4.4 Analysis and Discussion -- 5 Related Work -- 5.1 Machine Learning for Intrusion Detection in ICV -- 5.2 Lightweight IDS in ICV -- 5.3 Responsive IDS in ICV -- 6 Conclusion -- References -- Evaluating the Vulnerability Detection Efficacy of Smart Contracts Analysis Tools -- 1 Introduction -- 2 Background -- 3 Related Works -- 4 Experimental Study Methodology -- 5 Experimental Study Results -- 5.1 RQ1: Contests Versus Vulnerabilities -- 5.2 RQ2: Tools Versus Vulnerabilities -- 5.3 RQ3: Tools in Theory Versus Tools in Practice -- 5.4 RQ4: Analysis Complexity Versus Tool Efficacy -- 6 Conclusions -- References -- Safety-Security Analysis via Attack-Fault-Defense Trees: Semantics and Cut Set Metrics -- 1 Introduction -- 2 Related Work -- 3 Case Study: Gridshield -- 4 Background -- 5 Attack-Fault-Defense Trees -- 5.1 Formal Definition of AFDT -- 5.2 Gridshield AFDT -- 6 Qualitative Analysis of AFDT -- 7 Safety and Security Dependencies via MCS -- 8 Conclusion and Future Work -- References -- Safety Verification -- Coyan: Fault Tree Analysis - Exact and Scalable -- 1 Introduction -- 2 Preliminaries -- 3 Computing Unreliability Values -- 4 Unreliability Through WMC of Tseitin Transformation -- 5 Implementation -- 6 Experimentation -- 6.1 Benchmarks -- 6.2 Results -- 6.3 Industrial Benchmarks -- 7 Concluding Remarks.
References -- Safety Argumentation for Machinery Assembly Control Software -- 1 Introduction -- 2 Background -- 2.1 EN ISO 13849:2023 -- 2.2 Assurance Cases -- 2.3 Contract-Based Design -- 3 SAMACS: Safety Argumentation for Machinery Assembly Control Software -- 4 Case Study -- 4.1 Establishment of Software Responsibility -- 4.2 Definition of Software Safety Goals -- 4.3 Identification of Software Safety Requirements -- 4.4 Definition of Contracts -- 4.5 Identification of Verification Techniques and Evidence Provision -- 4.6 Composing the Safety Case Arguments -- 5 Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Sound Non-interference Analysis for C/C++ -- 1 Introduction -- 2 Sound Static Source Code Analysis -- 3 Data and Control Flow Errors -- 4 Data and Control Flow Analysis -- 5 Taint Analysis -- 5.1 Modeling Interference -- 5.2 Signal Flow Analysis -- 5.3 Freedom of Interference Between Software Components -- 6 Experimental Results -- 7 Related Work -- 8 Conclusion -- References -- Autonomous Systems -- A Dynamic Assurance Framework for an Autonomous Survey Drone -- 1 Introduction -- 2 Related Literature -- 3 Case Study and Monitor Examples -- 3.1 Monitoring Battery State and Required Power Consumption -- 3.2 Monitoring and Predicting Task Scheduling and Executing Times -- 3.3 Reconfigurations Calculation -- 4 Dynamic Assurance Case Approach -- 4.1 Battery Monitor Assurance Case -- 4.2 Discussion -- 4.3 Online Monitoring Interface -- 5 Conclusions -- References -- Redefining Safety for Autonomous Vehicles -- 1 Introduction -- 2 Existing Safety Definitions -- 2.1 ISO 26262 -- 2.2 ISO 21448 -- 2.3 ANSI/UL 4600 -- 2.4 Other Safety Definitions -- 3 Examples of AV Safety Problems -- 4 What is Missing from Safety Definitions -- 4.1 Open World Environment -- 4.2 Self-enforcement of Operational Limitations.
4.3 Ad Hoc Systems of Systems.
Record Nr. UNINA-9910886991403321
Ceccarelli Andrea  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer safety, reliability, and security : 41st International Conference, SAFECOMP 2022, Munich, Germany, September 6-9, 2002, proceedings / / Mario Trapp [and three others] (editors)
Computer safety, reliability, and security : 41st International Conference, SAFECOMP 2022, Munich, Germany, September 6-9, 2002, proceedings / / Mario Trapp [and three others] (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (383 pages)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Software engineering
Programming languages (Electronic computers)
ISBN 3-031-14835-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910590071803321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer safety, reliability, and security : 41st International Conference, SAFECOMP 2022, Munich, Germany, September 6-9, 2002, proceedings / / Mario Trapp [and three others] (editors)
Computer safety, reliability, and security : 41st International Conference, SAFECOMP 2022, Munich, Germany, September 6-9, 2002, proceedings / / Mario Trapp [and three others] (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (383 pages)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Software engineering
Programming languages (Electronic computers)
ISBN 3-031-14835-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996485666703316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer safety, reliability, and security : SAFECOMP 2022 workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6-9, 2022, proceedings / / edited by Mario Trapp [and three others]
Computer safety, reliability, and security : SAFECOMP 2022 workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6-9, 2022, proceedings / / edited by Mario Trapp [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (360 pages)
Disciplina 005.3
Collana Lecture Notes in Computer Science Ser.
Soggetto topico Computer logic
Application software
ISBN 3-031-14862-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- 17th International ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems (DECSoS 2022) -- En -- 1 Introduction -- 2 ECSEL and KDT JU: The European Cyber-Physical Systems Initiative -- 3 This Year's Workshop -- International Program Committee 2022 -- Triggering Conditions Analysis and Use Case for Validation of ADAS/ADS Functions -- 1 Introduction -- 2 Use Case and Methodology -- 2.1 ADAS/ADS Function Description -- 2.2 Operational Design Domain -- 2.3 Triggering Conditions List -- 2.4 Relevant Scenarios -- 2.5 Hazard Analysis and Risk Assessment -- 2.6 Qualitative Analysis -- 2.7 Testing and Evaluation -- 2.8 SOTIF Modifications -- 2.9 Residual Risk Quantification -- 2.10 SOTIF Argumentation -- 3 Outlook -- References -- A Statistical View on Automated Driving System Safety Architectures -- 1 Functional Safety and Safety of the Intended Functionality -- 1.1 Terms -- 2 Tolerable Risk -- 3 Current Sense-Plan-Act Architectures -- 4 Challenge of Control and Protection System Architecture -- 4.1 Probabilistic Target to Demonstrate -- 4.2 Functional Safety Related to Systematic E/E-failures -- 4.3 SOTIF - Low Demand Frequency Events -- 4.4 SOTIF - High Demand Frequency Events -- 5 Consequences -- 5.1 Common Cause Factor -- 5.2 Architectural Consequence -- 5.3 Quantitative Injury Risk Reduction Due to the Warning Subsystem -- 5.4 Further Benefits of the Warning Subsystem -- 6 Conclusion -- References -- Building a Test Bed for the Periodical Technical Inspection of Sensors Perceiving the Environment in Autonomous Vehicles -- 1 Introduction -- 2 Periodic Technical Inspection in Germany -- 2.1 Driver Assistance Systems in the Periodic Technical Inspection -- 3 Sensor Verification in the Field -- 4 Advancing the Periodical Technical Inspection.
4.1 Sensors for the Environmental Perception -- 4.2 Test Bed for the Sensor Systems in the Periodical Technical Inspection -- 4.3 Positioning of the Vehicle on the Test Bed -- 4.4 Inspection of the Sensor Systems -- 4.5 Positioning of Targets -- 4.6 Sensor Targets for the Inspection -- 4.7 Exemplary Test Performed in Regard to the Lidar System -- 4.8 Required Information About the Vehicle Under Test -- 4.9 Related Work and Differentiation -- 5 Conclusion and Future Work -- References -- Testing and Verification of the Deep Neural Networks Against Sparse Pixel Defects -- 1 Introduction -- 2 Related Work -- 3 Proposed DES-based Approach -- 3.1 Use of the DE -- 3.2 Use of the DES -- 4 Integration into Safety-Critical Systems Development -- 5 Results -- 6 Conclusions -- References -- Observing the Impact of Multicore Execution Platform for TSP Systems Under Schedulability, Security and Safety Constraints -- 1 Introduction -- 2 Background and Assumptions -- 2.1 System Model and Assumptions -- 2.2 Security and Safety -- 2.3 Multi-objective Optimization -- 3 Design Space Exploration (DSE) Approach for Multicore TSP Systems -- 4 Test Cases and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Security Assessment Prospects as Part of Vehicle Regulations -- 1 Introduction -- 2 Regulatory Background -- 2.1 Type Approval -- 2.2 Periodic Technical Inspections (PTI) -- 3 Cybersecurity Challenges over the Years of Vehicle Operation -- 4 Related Work -- 5 State of the Art - Security Standard and Regulations -- 5.1 ISO/SAE 21434 - Cybersecurity Engineering -- 5.2 UN R155 Cybersecurity Regulation -- 6 Discussion and Future Assessment Prospects -- 7 Conclusion -- References -- UNECE Threat List Case Study: Prediction of Cyber Risks in the Automotive Domain Using Regression Analysis -- 1 Introduction -- 2 UNECE Automotive Potential Threats.
2.1 Estimation of the Likelihood Factors -- 2.2 Estimation of the Impact Factors -- 2.3 Building the Dataset -- 2.4 Regression Analysis -- 3 Case Study: UNECE Automotive Threats List -- 3.1 Regression Approaches -- 3.2 Results Evaluation -- 4 Summary, Conclusion, and Future Work -- References -- Watch: A Validation Framework and Language for Tool Qualification -- 1 Introduction and Motivation -- 2 Related Work -- 3 The Watch Framework and Language -- 3.1 End-To-End Testing of FuSa Relevant Toolchains -- 3.2 White-Box Testing: Low-Level Testing of CI Jobs -- 4 Conclusion and Outlook -- References -- Criteria for the Analysis of Gaps and Limitations of V& -- V Methods for Safety- and Security-Critical Systems -- 1 Introduction -- 2 Background -- 2.1 The VALU3S Project -- 2.2 Related Work -- 3 Criteria for the Analysis of Gaps and Limitations of V& -- V Methods -- 4 Application of the Criteria for the Analysis of Gaps and Limitations of V& -- V Methods -- 4.1 Application of the Criteria to Two Methods -- 4.2 Application Results -- 4.3 Discussion -- 5 Conclusion -- References -- 3rd International Workshop on Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical System (DepDevOps 2022) -- En -- 1 Introduction -- 2 H2020 Projects: Dependable DevOps -- 3 Acknowledgments -- 4 International Program Committee -- A Guided Search for Races Based on Data Flow Patterns -- 1 Introduction -- 2 Related Work -- 3 Race-Prone Data Flow Patterns -- 3.1 Terminology and Assumptions -- 3.2 Pattern 1 -- 3.3 Pattern 2 -- 3.4 Pattern 3 -- 4 Pattern-Based Race Detection -- 4.1 Phase 1: Pattern-Based Identification of Internal Races -- 4.2 Phase 2: Analysis of Extendibility from Internal Races to System Races -- 5 Evaluation -- 5.1 Example -- 5.2 Race Detection Capability and Effort -- 5.3 Comparison with Random Search -- 6 Conclusion.
References -- 9th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2022) -- En -- 1 Introduction -- 2 This Year's Workshop -- Workshop Committees -- Organization Committee -- Programme Committee and Reviewers -- DevOps and Safety? SafeOps! Towards Ensuring Safety in Feature-Driven Development with Frequent Releases -- 1 Introduction -- 2 Foundations -- 3 The SafeOps Approach -- 3.1 Prerequisites -- 3.2 Safety Engineering Support -- 3.3 Safety Management Dashboard -- 3.4 Data-Driven Safety -- 4 Related Work -- 5 Conclusion and Future Work -- References -- Dynamic Checks of Evidence Models for Assurance Projects in Eclipse OpenCert -- 1 Introduction -- 2 Approach -- 2.1 Extensible Evidence Checks -- 2.2 Dynamic Evidence Checks and Log Streaming -- 3 Related Work -- 4 Conclusion and Perspectives -- References -- An Approach for Deriving Reduced Collision Scenarios for Highly Automated Driving Systems -- 1 Introduction -- 2 State-of-Art and Science -- 2.1 Standards and Regulations -- 2.2 Highly Automated Driving System -- 2.3 Variance-Based Sensitivity Analysis -- 3 Scenario Reduction Approaches -- 3.1 Scenario Description -- 3.2 Logical Scenario Reduction -- 3.3 Scenario Simulation and Sensitivity Analysis -- 4 Conclusion and Future Work -- References -- State of the Art Study of the Safety Argumentation Frameworks for Automated Driving System -- 1 The Need for a Safety Argumentation Framework -- 2 A New Safety Assurance Scheme and Global Initiatives -- 2.1 Regulatory Informal Working Groups for ADS Safety Topics -- 2.2 Global Standardization Activities -- 2.3 Research and Industry Communities, Initiatives, and Projects -- 3 Safety Case as a Core Approach to Argue the Safety of ADS -- 3.1 Safety Case Content and Format -- 3.2 Safety Goals -- 3.3 Acceptance Criteria.
4 Safety Evidence: An Attempt to "Quantify" the ADS Safety -- 4.1 Requirements-Based Testing with Numerical Approaches -- 4.2 Quantitative Hazard and Risk Analysis as a Part of the SOTIF Processes -- 5 Conclusions and Outlook -- References -- 1st International Workshop on Security and Safety Interaction (SENSEI 2022) -- En -- 1 Introduction -- International Program Committee 2022 -- Increasing IoT Security by Supply Power Measurement -- 1 Introduction -- 1.1 Attack Scenarios -- 1.2 Pre-requisites and Assumptions -- 1.3 Other Approaches/State of the Art -- 2 Medical IoT Devices -- 3 Current Measurement for Security -- 3.1 Description of the Expected Power Consumption -- 3.2 Technical Realization with Off-the-Shelf Hardware -- 3.3 Extension to Detect Replay Attacks -- 4 Results -- 5 Conclusion -- References -- Towards Interdependent Safety Security Assessments Using Bowties -- 1 Introduction -- 2 Diagrammatic Representations -- 3 Formalisation of Safety-Security Bowties -- 3.1 Structure Trees -- 3.2 Disruption Trees -- 3.3 Prevention Assessments -- 3.4 Consequence Assessments -- 3.5 Bowties -- 4 Interdependence Analysis -- 4.1 Running Example: Safety Security Interplay -- 4.2 Independence -- 4.3 Conditional Dependency -- 4.4 Reinforcing Dependency -- 4.5 Antagonistic Dependency -- 5 Conclusions -- 5.1 Related Work -- 5.2 Assessment Techniques -- 5.3 Next Steps -- References -- 3rd International Workshop on Underpinnings for Safe Distributed Artificial Intelligence (USDAI 2022) -- En -- 1 Introduction -- 2 This Year's Workshop -- Acknowledgement -- Workshop Committees -- Organization Committee -- Programme Committee -- On Explainability in AI-Solutions: A Cross-Domain Survey -- 1 Introduction -- 2 Related Work -- 3 What Is Explainability of AI -- 4 Domains for Expainability -- 5 Conclusion -- References.
Research Questions in the Acceptance of Cybersecurity by SMEs in the EU.
Record Nr. UNISA-996490367703316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6–9, 2022, Proceedings / / edited by Mario Trapp, Erwin Schoitsch, Jérémie Guiochet, Friedemann Bitsch
Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops : DECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6–9, 2022, Proceedings / / edited by Mario Trapp, Erwin Schoitsch, Jérémie Guiochet, Friedemann Bitsch
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (360 pages)
Disciplina 005.3
Collana Lecture Notes in Computer Science
Soggetto topico Computer engineering
Computer networks
Image processing—Digital techniques
Computer vision
Application software
Software engineering
Computer science
Data protection
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer and Information Systems Applications
Software Engineering
Theory of Computation
Security Services
Seguretat informàtica
Organització d'ordinadors
Enginyeria de programari
Llenguatges de programació
Lògica informàtica
Programari d'aplicació
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031148620
3031148622
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems -- Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical System -- Next Generation of System Assurance Approaches for Critical Systems -- Security and Safety Interaction -- Underpinnings for Safe Distributed Artificial Intelligence -- Artificial Intelligence Safety Engineering.
Record Nr. UNINA-9910592980603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops : DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Erwin Schoitsch, Barbara Gallina, Friedemann Bitsch
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops : DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings / / edited by Andrea Ceccarelli, Mario Trapp, Andrea Bondavalli, Erwin Schoitsch, Barbara Gallina, Friedemann Bitsch
Autore Ceccarelli Andrea
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (474 pages)
Disciplina 004.6
Altri autori (Persone) TrappMario
BondavalliAndrea
SchoitschErwin
GallinaBarbara
BitschFriedemann
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Image processing - Digital techniques
Computer vision
Information technology - Management
Software engineering
Computer science
Data protection
Computer Communication Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Administrative Data Processing
Software Engineering
Theory of Computation
Security Services
ISBN 3-031-68738-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- 19th International ERCIM/EWICS Workshop on Dependable Smart Embedded Cyber-Physical Systems and Systems-of Systems (DECSoS 2024) -- 19th International Workshop on Dependable Smart Cyber-Physical Systems and Systems-of-Systems (DECSoS 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- International Program Committee 2024 -- A Systems Viewpoint on the Integration of Subsystems Developed with Heterogeneous Safety Standards -- 1 The Need for Integration -- 2 Why Existing Standards Don't Play Nicely Together -- 2.1 How Existing Standards Differ -- 2.2 Current Approaches to Importance Metrics -- 2.3 Summary of Integration Challenges -- 3 Addressing the Integration Issue -- 3.1 Existing Approaches -- 3.2 The IEC 63187 Approach -- 4 Conclusion -- References -- Intelligent Decision-Making in Lane Detection Systems Featuring Dynamic Framework for Autonomous Vehicles -- 1 Introduction -- 2 Background -- 2.1 AI-Based Approaches -- 2.2 Non AI-Based Approaches -- 2.3 Hybrid Approaches -- 3 Proposed Dynamic Framework -- 3.1 Experimental Setup - Vehicle Demonstrator -- 3.2 Conventional Algorithm -- 3.3 PilotNetC Architecture -- 4 Results -- 4.1 Results for Conventional Algorithms -- 4.2 Results for PilotNetC -- 4.3 The Dynamic Framework -- 5 Conclusion -- References -- Security and Safety in Urban Environments: Evaluating Threats and Risks of Autonomous Last-Mile Delivery Robots -- 1 Introduction -- 2 The Last-Mile Robot in Our Case Study -- 3 Case Study Modeling and Analysis -- 3.1 Extended Multi-level Model -- 3.2 Attack Types -- 4 Analysis of Attack Types and Human-Safety Levels -- 5 Ideas for a Theoretical Approach -- 6 Summary and Outlook -- References -- Safe Road-Crossing by Autonomous Wheelchairs: A Novel Dataset and Its Evaluation -- 1 Introduction -- 2 Related Works.
3 Reference Scenario for Safe Road-Crossing -- 4 Design of the Danger Function -- 5 Dataset Generation -- 5.1 Lab Environment -- 5.2 Data Collection and Preprocessing -- 5.3 Data Elaboration and Sensor Fusion -- 6 Experimental Evaluation -- 7 Threats to Validity -- 8 Conclusions -- References -- Automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety -- 1 Introduction -- 2 Safety-Critical Networked Control Systems -- 3 Security-Explicit SysML Modelling of NCSs -- 3.1 SysML Modeling of NCSs -- 3.2 Modelling Cyberattacks in SysML -- 4 Modelling and Refinement in Event-B -- 5 Generation of Event-B Specification from SysML Model -- 5.1 Architecture of SysMLToEventB -- 5.2 The Tool-Chain -- 5.3 Tool Validation -- 6 Related Work and Conclusions -- References -- Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 3 Preliminaries -- 3.1 Physically Unclonable Function -- 3.2 Network Model -- 3.3 Threat Assumptions -- 4 Two-Factor User Authentication Using PUF -- 4.1 Enrollment Phase -- 4.2 Authentication Phase -- 5 Security Analysis -- 5.1 Formal Security Analysis -- 5.2 Informal Analysis -- 6 Experimental Validation and Performance Analysis -- References -- Enhancing Tunnel Safety with Artery V2X Simulation for Real-Time Risk Assessment -- 1 Introduction -- 2 Related Work -- 3 Artery-Based Risk Assessment Framework -- 3.1 Artery Simulation Framework (Upper Part) -- 3.2 Data Manipulation and Risk Assessment (Lower Part) -- 4 Case Study: Simulation-Based Risk Assessment in Zederhaus Tunnel -- 4.1 Breakdown Scenario: Artery and SUMO Model -- 4.2 Breakdown Scenario: Risk Assessment -- 5 Conclusion and Future Work -- References -- Detecting and Mitigating Errors in Neural Networks -- 1 Introduction -- 2 State of the Art.
2.1 Error Correcting Memory (ECC Memory) -- 2.2 Memory Tagging -- 2.3 Storage Reduction -- 2.4 2-D ECC/2-D Cyclic Redundancy Check (CRC) -- 3 Layer Properties -- 4 The Proposed Framework -- 4.1 Preparation Step -- 4.2 Error Detection Phase -- 4.3 Error Correction Phase -- 5 Practical Examples -- 5.1 Deviation in the Weight -- 5.2 Deviation in the Architecture or the Activation Function -- 6 Conclusion -- References -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems (SASSUR 2024) -- 1 Introduction -- 2 This Year's Workshop -- Organization -- Workshop Committees -- Organization Committee -- Programme Committee -- Additional Reviewers -- Challenges and Limitations of Utilizing Multi-core/Heterogeneous Logic Elements in the Railway Signaling Applications -- 1 Introduction -- 2 Railway Signaling System -- 3 EN 50129:2018: Hardware Requirements and Guidelines to Achieve SIL 4 -- 4 Architecture of State-of-the-Art Object Controller -- 5 Analysis of Using the Latest Logic Elements in Railway Signaling Systems -- 6 Conclusion -- 7 Future Work -- References -- Identifying Difficult Environmental Conditions with Scenario-Based Hazard and Fault Analysis -- 1 Introduction -- 2 Related Work -- 3 Identifying Triggering Conditions with SHFA -- 3.1 Step One: Scenario Modelling -- 3.2 Step Two: Hazardous Maneuver Identification -- 3.3 Step Three: Triggering Condition Identification -- 4 Illustrative Example -- 4.1 Scenario Modelling -- 4.2 Hazardous Maneuver Identification -- 4.3 Triggering Condition Identification -- 5 Result Analysis and Discussion -- 5.1 Triggering Condition Formalization -- 5.2 Findings -- 5.3 Capabilities and Limitations -- 6 Conclusion and Outlook -- References.
Using GPT-4 to Generate Failure Logic -- 1 Introduction -- 2 FLAGPT: Developing a Failure Logic Analysis GPT -- 3 Task and System Descriptions -- 4 Results and Working Experience -- 4.1 Tank Overfill Failure Event -- 4.2 Air Bleed Cabin Supply System -- 4.3 Aircraft Wheel Brake and Gas Leak Systems -- 4.4 Alignment and Consistency -- 5 Conclusions -- References -- Towards an Argument Pattern for the Use of Safety Performance Indicators -- 1 Introduction -- 2 Background -- 3 A High-Level Argument Structure for Using SPIs -- 3.1 Systematic Definition of SPIs -- 3.2 Collection and Analysis of SPIs -- 3.3 Response to SPI Violations -- 4 Critical Analysis of the Argument About SPIs -- 5 Meta-SPIs to Validate the Argument About SPIs -- 6 Related Work -- 7 Summary and Future Work -- References -- Enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis -- 1 Introduction -- 2 Methodological Foundations for Continuous Assurance -- 2.1 Composing Assurance Cases with Theories and Defeater Patterns -- 2.2 Assessing Assurance Case for Soundness and Validity -- 3 Tools Support for Continuous Assurance -- 3.1 Property-Driven Semantics with LLM Support and Synthesized Prolog Logic-Based Analysis -- 3.2 Synthesis Assistant for Generating Assurance Cases -- 3.3 Continuous Assurance for CI/CD Software Designs Using ETB -- 4 Conclusion -- References -- Managing Changing Product Liability Obligations Emerging from New Proposed EU Directive -- 1 Introduction -- 1.1 Background -- 1.2 Recent and Ongoing Changes to the Legal Framework -- 1.3 Scope and Structure -- 2 How Automation Impacts Risk and Liability Obligations -- 3 The Socio-technical System Perspective -- 4 Impact of New EU Product Liability Directive -- 4.1 Overview of Changes -- 4.2 Overall Impact on Product Liability Obligations.
4.3 Impact on Liability Obligations Due to the Presumption of Defectiveness -- 4.4 Impact on Liability Obligations Due to the Presumption of Causality -- 5 Thoughts on Transparent and Efficient Management of Product Liability Obligations -- 5.1 Manufacturers' Defense Strategies -- 5.2 Liability Obligations Expressed in Modular Assurance Cases and Contracts -- 5.3 Integration of Present Assurance Cases Required by Standards -- 5.4 Capture Confidence in the Strength of Defense Through Independent and Continuous Assessments of the Modular Assurance Cases -- 5.5 Using Assurance Cases for Rebutting Other Presumptions in New PLD -- 6 Discussion, Conclusions and Further Work -- References -- Reaching Consensus on System-of-Systems Resilience Assurance: A Case of Mobility as a Service -- 1 Introduction -- 2 Concepts and Related Works -- 2.1 System Theoretic Process Analysis -- 2.2 Consensus Process Model -- 2.3 Mobility as a Service -- 3 Resilience Argumentation -- 3.1 Step 1: Identify Loss Scenarios -- 3.2 Step 2: Identify Resilience Requirement -- 4 Conflict and Consensus -- 4.1 Assumption -- 4.2 Conflict -- 4.3 Consensus Process Model -- 4.4 Example -- 5 Conclusion and Further Work -- References -- A Deductive Approach to Safety Assurance: Formalising Safety Contracts with Subjective Logic -- 1 Introduction -- 2 Background -- 2.1 Safety Assurance -- 2.2 Subjective Logic -- 3 A Formally Grounded Assurance Argument Structure -- 4 Constructing the Argument and Computing Confidence -- 5 Related Work -- 6 Discussion and Conclusions -- References -- A New Approach to Creating Clear Operational Safety Arguments -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Illustrative Examples -- 5 Conclusions and Future Work -- References -- Including Defeaters in Quantitative Confidence Assessments for Assurance Cases -- 1 Introduction.
2 Adding Defeaters to Confidence Assessment.
Record Nr. UNINA-9910886992003321
Ceccarelli Andrea  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui