TY - BOOK AU - Skavhaug,Amund AU - Guiochet,Jérémie AU - Bitsch,Friedemann ED - SAFECOMP (Conference) TI - Computer safety, reliability, and security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings T2 - Lecture notes in computer science SN - 9783319454771 AV - QA76.9.A25 U1 - 005.8 23 PY - 2016/// CY - Switzerland PB - Springer KW - Computer security KW - Congresses KW - Computer systems KW - Reliability KW - Sécurité informatique KW - Congrès KW - Systèmes informatiques KW - Fiabilité KW - Programming & scripting languages: general KW - bicssc KW - Software Engineering KW - Information technology: general issues KW - Computer networking & communications KW - Computer programming KW - software development KW - Computers KW - Programming Languages KW - General KW - bisacsh KW - Software Development & Engineering KW - Security KW - Data Processing KW - Hardware KW - Programming KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - International conference proceedings; Includes author index; Intro; Preface; Organization; Contents; Fault Injection; FISSC: A Fault Injection and Simulation Secure Collection; 1 Introduction; 1.1 Security Assessment Against Fault Injection Attacks; 1.2 The Need for a Code Collection; 2 The VerifyPIN Example; 3 The FISSC Framework; 3.1 Contents and File Organization; 3.2 The VerifyPIN Suite; 4 Comparing Tools; 4.1 Case Study; 4.2 Interpretation; 5 Conclusion; References; FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools; 1 Introduction; 2 Background; 2.1 LLFI; 2.2 Aspect-Oriented Programming (AOP); 3 Related Work; 4 System Overview4.1 FIDL Structure; 4.2 Aspect Design; 5 Evaluation Metrics; 6 Evaluation; 6.1 Experimental Setup; 6.2 Experimental Results; 7 Summary; References; Safety Assurance; Using Process Models in System Assurance; 1 Introduction and Motivation; 2 Process Models; 3 Confidence Argument Patterns; 4 Instantiating Argument Patterns; 5 Conclusions; References; The Indispensable Role of Rationale in Safety Standards; Abstract; 1 Introduction; 2 Current Standards; 2.1 Development of Standards; 2.2 Using Standards; 2.3 Maintenance of Standards; 3 Rationalized Standards; 3.1 The Concept; 3.2 Defining Reasoning3.3 Defining Guidance; 4 Analysis of a Safety Standard; 4.1 Example Element; 4.2 Analysis of Example Element; 4.3 Rationalized Standard Fragment; 5 Conclusion; Acknowledgment; References; Composition of Safety Argument Patterns; 1 Introduction; 2 Illustrative Example; 3 Pattern Composition; 3.1 Composition; 3.2 Correctness; 3.3 General Composition; 4 Application; 5 Related Work and Conclusions; References; Formal Verification; Formal Analysis of Security Properties on the OPC-UA SCADA Protocol; 1 Introduction; 2 OPC-UA OpenSecureChannel; 2.1 Modeling; 2.2 Results; 2.3 Fixed Version3 OPC-UA CreateSession; 3.1 Modeling; 3.2 Results; 4 Conclusion; References; A Dedicated Algorithm for Verification of Interlocking Systems; 1 Introduction; 2 Interlocking Principles; 3 Verification Algorithm; 4 Experiments; 5 Conclusion; References; Catalogue of System and Software Properties; 1 Introduction; 2 Scope and Known Limitations; 3 Requirements Taxonomy and Design Attributes; 4 The CSSP; 4.1 Formalization of the CSSP; 4.2 Coverage of the Design Attributes; 4.3 COMPASS Tool Support; 4.4 Example; 5 Conclusions and Future Work; References; A High-Assurance, High-Performance Hardware-Based Cross-Domain System1 Introduction; 1.1 Guardol for Cross-Domain Systems; 1.2 Guardol and Hardware-Based Guards; 2 The Guardol Toolchain; 2.1 Guardol IDE; 2.2 Verification; 3 Adding Regular Expressions to Guardol; 3.1 Proof Translation; 3.2 Code Translation; 4 Guardol VHDL Code Generation; 5 FPGA-Based Guard Architecture and Implementation; 6 Results; 7 Related Work; 8 Conclusion; References; Automotive; Using STPA in an ISO 26262 Compliant Process; 1 Introduction; 2 Preliminaries; 2.1 Systems Theoretic Process Analysis (STPA) N2 - This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis UR - https://link.springer.com/10.1007/978-3-319-45477-1 ER -