Amazon cover image
Image from Amazon.com

Computer safety, reliability, and security : 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings / Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 9922. | LNCS sublibrary. SL 2, Programming and software engineering.Publisher: Switzerland : Springer, 2016Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319454771
  • 3319454773
Subject(s): Genre/Form: Additional physical formats: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Intro; Preface; Organization; Contents; Fault Injection; FISSC: A Fault Injection and Simulation Secure Collection; 1 Introduction; 1.1 Security Assessment Against Fault Injection Attacks; 1.2 The Need for a Code Collection; 2 The VerifyPIN Example; 3 The FISSC Framework; 3.1 Contents and File Organization; 3.2 The VerifyPIN Suite; 4 Comparing Tools; 4.1 Case Study; 4.2 Interpretation; 5 Conclusion; References; FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools; 1 Introduction; 2 Background; 2.1 LLFI; 2.2 Aspect-Oriented Programming (AOP); 3 Related Work
4 System Overview4.1 FIDL Structure; 4.2 Aspect Design; 5 Evaluation Metrics; 6 Evaluation; 6.1 Experimental Setup; 6.2 Experimental Results; 7 Summary; References; Safety Assurance; Using Process Models in System Assurance; 1 Introduction and Motivation; 2 Process Models; 3 Confidence Argument Patterns; 4 Instantiating Argument Patterns; 5 Conclusions; References; The Indispensable Role of Rationale in Safety Standards; Abstract; 1 Introduction; 2 Current Standards; 2.1 Development of Standards; 2.2 Using Standards; 2.3 Maintenance of Standards; 3 Rationalized Standards; 3.1 The Concept
3.2 Defining Reasoning3.3 Defining Guidance; 4 Analysis of a Safety Standard; 4.1 Example Element; 4.2 Analysis of Example Element; 4.3 Rationalized Standard Fragment; 5 Conclusion; Acknowledgment; References; Composition of Safety Argument Patterns; 1 Introduction; 2 Illustrative Example; 3 Pattern Composition; 3.1 Composition; 3.2 Correctness; 3.3 General Composition; 4 Application; 5 Related Work and Conclusions; References; Formal Verification; Formal Analysis of Security Properties on the OPC-UA SCADA Protocol; 1 Introduction; 2 OPC-UA OpenSecureChannel; 2.1 Modeling; 2.2 Results
2.3 Fixed Version3 OPC-UA CreateSession; 3.1 Modeling; 3.2 Results; 4 Conclusion; References; A Dedicated Algorithm for Verification of Interlocking Systems; 1 Introduction; 2 Interlocking Principles; 3 Verification Algorithm; 4 Experiments; 5 Conclusion; References; Catalogue of System and Software Properties; 1 Introduction; 2 Scope and Known Limitations; 3 Requirements Taxonomy and Design Attributes; 4 The CSSP; 4.1 Formalization of the CSSP; 4.2 Coverage of the Design Attributes; 4.3 COMPASS Tool Support; 4.4 Example; 5 Conclusions and Future Work; References
A High-Assurance, High-Performance Hardware-Based Cross-Domain System1 Introduction; 1.1 Guardol for Cross-Domain Systems; 1.2 Guardol and Hardware-Based Guards; 2 The Guardol Toolchain; 2.1 Guardol IDE; 2.2 Verification; 3 Adding Regular Expressions to Guardol; 3.1 Proof Translation; 3.2 Code Translation; 4 Guardol VHDL Code Generation; 5 FPGA-Based Guard Architecture and Implementation; 6 Results; 7 Related Work; 8 Conclusion; References; Automotive; Using STPA in an ISO 26262 Compliant Process; 1 Introduction; 2 Preliminaries; 2.1 Systems Theoretic Process Analysis (STPA)
Summary: This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

International conference proceedings.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed September 15, 2016).

This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis.

Intro; Preface; Organization; Contents; Fault Injection; FISSC: A Fault Injection and Simulation Secure Collection; 1 Introduction; 1.1 Security Assessment Against Fault Injection Attacks; 1.2 The Need for a Code Collection; 2 The VerifyPIN Example; 3 The FISSC Framework; 3.1 Contents and File Organization; 3.2 The VerifyPIN Suite; 4 Comparing Tools; 4.1 Case Study; 4.2 Interpretation; 5 Conclusion; References; FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools; 1 Introduction; 2 Background; 2.1 LLFI; 2.2 Aspect-Oriented Programming (AOP); 3 Related Work

4 System Overview4.1 FIDL Structure; 4.2 Aspect Design; 5 Evaluation Metrics; 6 Evaluation; 6.1 Experimental Setup; 6.2 Experimental Results; 7 Summary; References; Safety Assurance; Using Process Models in System Assurance; 1 Introduction and Motivation; 2 Process Models; 3 Confidence Argument Patterns; 4 Instantiating Argument Patterns; 5 Conclusions; References; The Indispensable Role of Rationale in Safety Standards; Abstract; 1 Introduction; 2 Current Standards; 2.1 Development of Standards; 2.2 Using Standards; 2.3 Maintenance of Standards; 3 Rationalized Standards; 3.1 The Concept

3.2 Defining Reasoning3.3 Defining Guidance; 4 Analysis of a Safety Standard; 4.1 Example Element; 4.2 Analysis of Example Element; 4.3 Rationalized Standard Fragment; 5 Conclusion; Acknowledgment; References; Composition of Safety Argument Patterns; 1 Introduction; 2 Illustrative Example; 3 Pattern Composition; 3.1 Composition; 3.2 Correctness; 3.3 General Composition; 4 Application; 5 Related Work and Conclusions; References; Formal Verification; Formal Analysis of Security Properties on the OPC-UA SCADA Protocol; 1 Introduction; 2 OPC-UA OpenSecureChannel; 2.1 Modeling; 2.2 Results

2.3 Fixed Version3 OPC-UA CreateSession; 3.1 Modeling; 3.2 Results; 4 Conclusion; References; A Dedicated Algorithm for Verification of Interlocking Systems; 1 Introduction; 2 Interlocking Principles; 3 Verification Algorithm; 4 Experiments; 5 Conclusion; References; Catalogue of System and Software Properties; 1 Introduction; 2 Scope and Known Limitations; 3 Requirements Taxonomy and Design Attributes; 4 The CSSP; 4.1 Formalization of the CSSP; 4.2 Coverage of the Design Attributes; 4.3 COMPASS Tool Support; 4.4 Example; 5 Conclusions and Future Work; References

A High-Assurance, High-Performance Hardware-Based Cross-Domain System1 Introduction; 1.1 Guardol for Cross-Domain Systems; 1.2 Guardol and Hardware-Based Guards; 2 The Guardol Toolchain; 2.1 Guardol IDE; 2.2 Verification; 3 Adding Regular Expressions to Guardol; 3.1 Proof Translation; 3.2 Code Translation; 4 Guardol VHDL Code Generation; 5 FPGA-Based Guard Architecture and Implementation; 6 Results; 7 Related Work; 8 Conclusion; References; Automotive; Using STPA in an ISO 26262 Compliant Process; 1 Introduction; 2 Preliminaries; 2.1 Systems Theoretic Process Analysis (STPA)

Powered by Koha