TY - GEN
T1 - Reconciling systems-theoretic and component-centric methods for safety and security co-analysis
AU - Temple, William G.
AU - Wu, Yue
AU - Chen, Binbin
AU - Kalbarczyk, Zbigniew
N1 - Publisher Copyright:
© Springer International Publishing AG 2017.
PY - 2017
Y1 - 2017
N2 - As safety-critical systems increasingly rely on computing, communication, and control, there have been a number of safety and security co-analysis methods put forth to identify, assess, and mitigate risks. However, there is an ideological gap between qualitative system-level methods that focus on control interactions, and more traditional methods based on component failure and/or vulnerability. The growing complexity of cyber-physical and socio-technical systems as well as their interactions with their environments seem to demand a systems-theoretic perspective. Yet, at the same time, more complex threats and failure modes imply a greater need for risk-based analysis to understand and prioritize the large volume of information. In this work we identify promising aspects from two existing safety/security co-analysis methods and outline a vision for reconciling them in a new analysis method.
AB - As safety-critical systems increasingly rely on computing, communication, and control, there have been a number of safety and security co-analysis methods put forth to identify, assess, and mitigate risks. However, there is an ideological gap between qualitative system-level methods that focus on control interactions, and more traditional methods based on component failure and/or vulnerability. The growing complexity of cyber-physical and socio-technical systems as well as their interactions with their environments seem to demand a systems-theoretic perspective. Yet, at the same time, more complex threats and failure modes imply a greater need for risk-based analysis to understand and prioritize the large volume of information. In this work we identify promising aspects from two existing safety/security co-analysis methods and outline a vision for reconciling them in a new analysis method.
UR - http://www.scopus.com/inward/record.url?scp=85029511303&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85029511303&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-66284-8_9
DO - 10.1007/978-3-319-66284-8_9
M3 - Conference contribution
AN - SCOPUS:85029511303
SN - 9783319662831
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 87
EP - 93
BT - Computer Safety, Reliability, and Security - SAFECOMP 2017 Workshops ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Proceedings
A2 - Bitsch, Friedemann
A2 - Tonetta, Stefano
A2 - Schoitsch, Erwin
PB - Springer
T2 - International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2017 and 5th International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE 2017, 12th Workshop on Dependable Embedded and Cyber-physical Systems and Systems-of Systems, DECSoS 2017, 6th International Workshop on Next Generation of System Assurance Approaches for Safety Critical Systems, SASSUR 2017, 3rd International Workshop on Technical and Legal Aspects of Data Privacy and Security, TELERISE 2017 and 2nd International Workshop on the Timing Performance in Safety Engineering, TIPS 2017
Y2 - 12 September 2017 through 12 September 2017
ER -