Skip to main content
Top

2020 | OriginalPaper | Chapter

Safety and Security Interference Analysis in the Design Stage

Authors : Jabier Martinez, Jean Godot, Alejandra Ruiz, Abel Balbis, Ricardo Ruiz Nolasco

Published in: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Safety and security engineering have been traditionally separated disciplines (e.g., different required knowledge and skills, terminology, standards and life-cycles) and operated in quasi-silos of knowledge and practices. However, the co-engineering of these two critical qualities of a system is being largely investigated as it promises the removal of redundant work and the detection of trade-offs in early stages of the product development life-cycle. In this work, we enrich an existing safety-security co-analysis method in the design stage providing capabilities for interference analysis. Reports on interference analyses are crucial to trigger co-engineering meetings leading to the trade-offs analyses and system refinements. We detail our automatic approach for this interference analysis, performed through fault trees generated from safety and security local analyses. We evaluate and discuss our approach from the perspective of two industrial case studies on the space and medical domains.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference ISO/IEC 27005:2018 - Information security risk management ISO/IEC 27005:2018 - Information security risk management
2.
go back to reference Abdulkhaleq, A., Wagner, S., Lammering, D., Boehmert, H., Blueher, P.: Using STPA in compliance with ISO 26262 for developing a safe architecture for fully automated vehicles. In: Automotive-Safety and Security 2017, Stuttgart (2017) Abdulkhaleq, A., Wagner, S., Lammering, D., Boehmert, H., Blueher, P.: Using STPA in compliance with ISO 26262 for developing a safe architecture for fully automated vehicles. In: Automotive-Safety and Security 2017, Stuttgart (2017)
4.
go back to reference Apvrille, L., Li, L.W.: Harmonizing safety, security and performance requirements in embedded systems. In: DATE 2019, pp. 1631–1636. IEEE (2019) Apvrille, L., Li, L.W.: Harmonizing safety, security and performance requirements in embedded systems. In: DATE 2019, pp. 1631–1636. IEEE (2019)
6.
go back to reference Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE TDSC 1(1), 11–33 (2004) Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE TDSC 1(1), 11–33 (2004)
9.
go back to reference Fenelon, P., McDermid, J.A., Nicolson, M., Pumfrey, D.J.: Towards integrated safety analysis and design. SIGAPP Appl. Comput. Rev. 2(1), 21–32 (1994)CrossRef Fenelon, P., McDermid, J.A., Nicolson, M., Pumfrey, D.J.: Towards integrated safety analysis and design. SIGAPP Appl. Comput. Rev. 2(1), 21–32 (1994)CrossRef
11.
go back to reference Gehlot, V., Nigro, C.: An introduction to systems modeling and simulation with colored petri nets. In: Winter Simulation Conference, pp. 104–118 (2010) Gehlot, V., Nigro, C.: An introduction to systems modeling and simulation with colored petri nets. In: Winter Simulation Conference, pp. 104–118 (2010)
14.
go back to reference IEC 61025: Fault Tree Analysis, 2nd edn. (2006) IEC 61025: Fault Tree Analysis, 2nd edn. (2006)
15.
go back to reference Kaiser, B., et al.: Advances in component fault trees. In: ESREL (2018) Kaiser, B., et al.: Advances in component fault trees. In: ESREL (2018)
17.
go back to reference Lee, W.S., Grosh, D.L., Tillman, F.A., Lie, C.H.: Fault tree analysis, methods, and applications - a review. IEEE Trans. Reliab. R–34(3), 194–203 (1985)CrossRef Lee, W.S., Grosh, D.L., Tillman, F.A., Lie, C.H.: Fault tree analysis, methods, and applications - a review. IEEE Trans. Reliab. R–34(3), 194–203 (1985)CrossRef
18.
go back to reference Leveson, N.G.: Engineering a Safer World: Systems Thinking Applied to Safety. The MIT Press, Cambridge (2012)CrossRef Leveson, N.G.: Engineering a Safer World: Systems Thinking Applied to Safety. The MIT Press, Cambridge (2012)CrossRef
20.
go back to reference Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: Sahara: a security-aware hazard and risk analysis method. In: DATE (2015) Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: Sahara: a security-aware hazard and risk analysis method. In: DATE (2015)
21.
go back to reference Netkachova, K., Bloomfield, R.E.: Security-informed safety. IEEE Comput. 49(6), 98–102 (2016)CrossRef Netkachova, K., Bloomfield, R.E.: Security-informed safety. IEEE Comput. 49(6), 98–102 (2016)CrossRef
24.
go back to reference Paul, S., et al.: Recommendations for Security and Safety Co-engineering - Part A. MERGE project (2016) Paul, S., et al.: Recommendations for Security and Safety Co-engineering - Part A. MERGE project (2016)
25.
go back to reference Pomante, L., et al.: The AQUAS ECSEL Project aggregated quality assurance for systems: co-engineering inside and across the product life cycle. Microprocess. Microsyst. 69, 54–67 (2019)CrossRef Pomante, L., et al.: The AQUAS ECSEL Project aggregated quality assurance for systems: co-engineering inside and across the product life cycle. Microprocess. Microsyst. 69, 54–67 (2019)CrossRef
26.
go back to reference Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15, 29–62 (2015)MathSciNetCrossRef Ruijters, E., Stoelinga, M.: Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 15, 29–62 (2015)MathSciNetCrossRef
27.
go back to reference Ruiz, A., Puelles, J., Martinez, J., Gruber, T., Matschnig, M., Fischer, B.: Preliminary safety-security co-engineering process in the industrial automation sector. In: ERTS 2020, 10th European Congress on Embedded Real Time Systems (2020) Ruiz, A., Puelles, J., Martinez, J., Gruber, T., Matschnig, M., Fischer, B.: Preliminary safety-security co-engineering process in the industrial automation sector. In: ERTS 2020, 10th European Congress on Embedded Real Time Systems (2020)
28.
go back to reference Sango, M., Godot, J., Gonzalez, A., Nolasco, R.R.: Model-based system, safety and security co-engineering method and toolchain for medical devices design. In: 2019 Design of Medical Devices Conference (DMDC) (2019) Sango, M., Godot, J., Gonzalez, A., Nolasco, R.R.: Model-based system, safety and security co-engineering method and toolchain for medical devices design. In: 2019 Design of Medical Devices Conference (DMDC) (2019)
30.
go back to reference Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999) Schneier, B.: Attack trees. Dr. Dobb’s J. 24(12), 21–29 (1999)
31.
go back to reference Shipman, F.M., McCall, R.J.: Integrating different perspectives on design rationale: supporting the emergence of design rationale from design communication. AI Eng. Des. Anal. Manuf. 11(2), 141–154 (1997) Shipman, F.M., McCall, R.J.: Integrating different perspectives on design rationale: supporting the emergence of design rationale from design communication. AI Eng. Des. Anal. Manuf. 11(2), 141–154 (1997)
32.
go back to reference Steiner, M.: Integrating Security Concerns into Safety Analysis of Embedded Systems Using Component Fault Trees. Ph.D. thesis, TU Kaiserslautern (2016) Steiner, M.: Integrating Security Concerns into Safety Analysis of Embedded Systems Using Component Fault Trees. Ph.D. thesis, TU Kaiserslautern (2016)
33.
go back to reference The Consultative Committee for Space Data Systems: CCSDS Cryptographic Algorithms, December 2014 The Consultative Committee for Space Data Systems: CCSDS Cryptographic Algorithms, December 2014
34.
go back to reference Vacca, J.R.: Computer and Information Security Handbook, 3rd edn. Morgan Kaufmann Publishers Inc., Burlington (2017) Vacca, J.R.: Computer and Information Security Handbook, 3rd edn. Morgan Kaufmann Publishers Inc., Burlington (2017)
36.
go back to reference Yi, S., Wang, H., Ma, Y., Xie, F., Zhang, P., Di, L.: A safety-security assessment approach for communication-based train control (CBTC) systems based on the extended fault tree. In: ICCCN (2018) Yi, S., Wang, H., Ma, Y., Xie, F., Zhang, P., Di, L.: A safety-security assessment approach for communication-based train control (CBTC) systems based on the extended fault tree. In: ICCCN (2018)
Metadata
Title
Safety and Security Interference Analysis in the Design Stage
Authors
Jabier Martinez
Jean Godot
Alejandra Ruiz
Abel Balbis
Ricardo Ruiz Nolasco
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-55583-2_4

Premium Partner