Systematic Model-based Design Assurance and Property-based Fault Injection for Safety Critical Digital Systems.
Jayakumar, A. V.
Theses and Dissertations. January 2020.
Paper
doi
link
bibtex
@article{jayakumar_systematic_2020,
title = {Systematic {Model}-based {Design} {Assurance} and {Property}-based {Fault} {Injection} for {Safety} {Critical} {Digital} {Systems}},
url = {https://scholarscompass.vcu.edu/etd/6239},
doi = {https://doi.org/10.25772/Z555-M644},
journal = {Theses and Dissertations},
author = {Jayakumar, Athira Varma},
month = jan,
year = {2020},
}
On the Application of Systematic t-way Software Testing for Safety Critical Embedded Digital Devices in Nuclear Power.
Jayakumar, A.; Gautham, S.; Kuhn, R.; Simons, B.; Collins, A.; Dirsch, T.; Kacker, R.; and Elks, C.
submitted to The 31st International Symposium on Software Reliability Engineering(ISSRE), waiting decision. 2020.
link
bibtex
@article{jayakumar_application_2020,
title = {On the {Application} of {Systematic} t-way {Software} {Testing} for {Safety} {Critical} {Embedded} {Digital} {Devices} in {Nuclear} {Power}},
journal = {submitted to The 31st International Symposium on Software Reliability Engineering(ISSRE), waiting decision},
author = {Jayakumar, Athira and Gautham, Smitha and Kuhn, Richard and Simons, Brandon and Collins, Aidan and Dirsch, Thomas and Kacker, Raghu and Elks, Carl},
year = {2020},
}
Finding Synergy Between Design-time Assurance and Runtime Verification by Means of Model Based Engineering.
Gautham, S.; Jayakumar, A.; and Elks, C.
In
Submitted to 20th International Conference on Runtime Verification, 2020, waiting decision, 2020.
link
bibtex
@inproceedings{gautham_finding_2020,
title = {Finding {Synergy} {Between} {Design}-time {Assurance} and {Runtime} {Verification} by {Means} of {Model} {Based} {Engineering}},
booktitle = {Submitted to 20th {International} {Conference} on {Runtime} {Verification}, 2020, waiting decision},
author = {Gautham, Smitha and Jayakumar, Athira and Elks, Carl},
year = {2020},
}
Experiences on Applying IEC 61508 Compliant Model-based Verification to an FPGA based System for Nuclear Power Applications.
Gautham, S.; Jayakumar, A.; Hite, R.; Deloglos, C.; Moore, J.; Tantawy, A.; Gibson, M.; and Elks, C.
submitted to IEEE Transactions on Nuclear Science, in revision. 2020.
link
bibtex
@article{gautham_experiences_2020,
title = {Experiences on {Applying} {IEC} 61508 {Compliant} {Model}-based {Verification} to an {FPGA} based {System} for {Nuclear} {Power} {Applications}},
journal = {submitted to IEEE Transactions on Nuclear Science, in revision},
author = {Gautham, Smitha and Jayakumar, Athira and Hite, Richard and Deloglos, Christopher and Moore, Jason and Tantawy, Ashraf and Gibson, Matt and Elks, Carl},
year = {2020},
}
Self-repairing hardware architecture for safety-critical cyber-physical-systems.
Khairullah, S. S.; and Elks, C. R.
IET Cyber-Physical Systems: Theory Applications, 5(1): 92–99. 2020.
doi
link
bibtex
abstract
1 download
@article{khairullah_self-repairing_2020,
title = {Self-repairing hardware architecture for safety-critical cyber-physical-systems},
volume = {5},
issn = {2398-3396},
doi = {10.1049/iet-cps.2019.0022},
abstract = {Digital embedded systems in safety-critical cyber-physical-systems (CPSs) require high levels of resilience and robustness against different fault classes. In recent years, self-healing concepts based on biological physiology have received attention for the design and implementation of reliable systems. However, many of these approaches have not been architected from the outset with safety in mind, nor have they been targeted for the safety-related automation industry where the significant need exists. This study presents a new self-healing hardware architecture inspired by integrating biological concepts, fault tolerance techniques, and IEC 61131-3 operational schematics to facilitate adaption in automation and critical infrastructure. The proposed architecture is organised in two levels: the critical functions layer used for providing the intended service of the application and the healing layer that continuously monitors the correct execution of that application and generates health syndromes to heal any failure occurrence inside the functions layer. Finally, two industrial applications have been mapped on this architecture to date, and the authors believe the nexus of its concepts can positively impact the next generation of critical CPSs in industrial automation.},
number = {1},
journal = {IET Cyber-Physical Systems: Theory Applications},
author = {Khairullah, Shawkat S. and Elks, Carl R.},
year = {2020},
keywords = {IEC 61131-3 operational schematics, IEC standards, biocomputing, biological concepts, critical function layer, critical infrastructure, cyber-physical systems, digital embedded systems, embedded systems, factory automation, failure analysis, failure occurrence, fault classes, fault tolerance techniques, fault tolerant computing, healing layer, industrial automation, programmable controllers, reliable systems, safety-critical CPS, safety-critical cyber-physical-systems, safety-related automation industry, self-healing hardware architecture},
pages = {92--99},
}
Digital embedded systems in safety-critical cyber-physical-systems (CPSs) require high levels of resilience and robustness against different fault classes. In recent years, self-healing concepts based on biological physiology have received attention for the design and implementation of reliable systems. However, many of these approaches have not been architected from the outset with safety in mind, nor have they been targeted for the safety-related automation industry where the significant need exists. This study presents a new self-healing hardware architecture inspired by integrating biological concepts, fault tolerance techniques, and IEC 61131-3 operational schematics to facilitate adaption in automation and critical infrastructure. The proposed architecture is organised in two levels: the critical functions layer used for providing the intended service of the application and the healing layer that continuously monitors the correct execution of that application and generates health syndromes to heal any failure occurrence inside the functions layer. Finally, two industrial applications have been mapped on this architecture to date, and the authors believe the nexus of its concepts can positively impact the next generation of critical CPSs in industrial automation.
Property-Based Fault Injection: A Novel Approach to Model-Based Fault Injection for Safety Critical Systems.
Jayakumar, A. V.; and Elks, C.
In Zeller, M.; and Höfig, K., editor(s),
Model-Based Safety and Assessment, of
Lecture Notes in Computer Science, pages 115–129, Cham, 2020. Springer International Publishing
doi
link
bibtex
abstract
@inproceedings{jayakumar_property-based_2020,
address = {Cham},
series = {Lecture {Notes} in {Computer} {Science}},
title = {Property-{Based} {Fault} {Injection}: {A} {Novel} {Approach} to {Model}-{Based} {Fault} {Injection} for {Safety} {Critical} {Systems}},
isbn = {978-3-030-58920-2},
shorttitle = {Property-{Based} {Fault} {Injection}},
doi = {10.1007/978-3-030-58920-2_8},
abstract = {With the recent popularity of model-based design and verification (MBDE), fault injection testing at the functional model level is gaining significant interest. The reason for this interest is it aids in detecting design errors and incorrect requirements on fault detection and tolerance features, very early in the development lifecycle. This is evidenced by the fact that functional safety standards like IEC 61508 and ISO 26262 identify fault injection testing as a highly recommended technique for SIL-3 and SIL-4. The main challenges to date with model-based fault injection are lack of completeness in the fault injection space, semi-manual integration and insertion of fault injection modules into the models and manual identification of fault activation conditions. The work presented in this paper describes a novel model-based fault injection technique that is property-based and applies formal model checking verification methods at the functional model level of design thereby guaranteeing a near-exhaustive state, input and fault space coverage. This method also introduces the usage of properties and model checking capabilities to automate the identification of fault activation conditions for all the faults within the fault space. We describe the workflow and implementation of the property-based Fault injection using Simulink Design Verifier and its application on the functional model of a representative safety-critical system.},
language = {en},
booktitle = {Model-{Based} {Safety} and {Assessment}},
publisher = {Springer International Publishing},
author = {Jayakumar, Athira Varma and Elks, Carl},
editor = {Zeller, Marc and Höfig, Kai},
year = {2020},
keywords = {Fault injection, Fault tolerance assessment, Model-based fault injection, Model-checking, Safety-critical systems},
pages = {115--129},
}
With the recent popularity of model-based design and verification (MBDE), fault injection testing at the functional model level is gaining significant interest. The reason for this interest is it aids in detecting design errors and incorrect requirements on fault detection and tolerance features, very early in the development lifecycle. This is evidenced by the fact that functional safety standards like IEC 61508 and ISO 26262 identify fault injection testing as a highly recommended technique for SIL-3 and SIL-4. The main challenges to date with model-based fault injection are lack of completeness in the fault injection space, semi-manual integration and insertion of fault injection modules into the models and manual identification of fault activation conditions. The work presented in this paper describes a novel model-based fault injection technique that is property-based and applies formal model checking verification methods at the functional model level of design thereby guaranteeing a near-exhaustive state, input and fault space coverage. This method also introduces the usage of properties and model checking capabilities to automate the identification of fault activation conditions for all the faults within the fault space. We describe the workflow and implementation of the property-based Fault injection using Simulink Design Verifier and its application on the functional model of a representative safety-critical system.
Fundamental Challenges of Cyber-Physical Systems Security Modeling.
Bakirtzis, G.; Ward, G.; Deloglos, C.; Elks, C.; Horowitz, B.; and Fleming, C.
In
2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), pages 33–36, June 2020.
doi
link
bibtex
abstract
4 downloads
@inproceedings{bakirtzis_fundamental_2020,
title = {Fundamental {Challenges} of {Cyber}-{Physical} {Systems} {Security} {Modeling}},
doi = {10.1109/DSN-S50200.2020.00021},
abstract = {Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can intentionally trigger accidents. By implementing security assessment tools for modeling languages we are better able to address threats earlier in the system's lifecycle and, therefore, assure their safe and secure behavior in their eventual deployment. We posit that cyber-physical systems security modeling is practiced insufficiently because it is still addressed similarly to information technology systems.},
booktitle = {2020 50th {Annual} {IEEE}-{IFIP} {International} {Conference} on {Dependable} {Systems} and {Networks}-{Supplemental} {Volume} ({DSN}-{S})},
author = {Bakirtzis, Georgios and Ward, Garrett and Deloglos, Christopher and Elks, Carl and Horowitz, Barry and Fleming, Cody},
month = jun,
year = {2020},
keywords = {Analytical models, Data models, Safety, Security, Temperature sensors, Tools, cyber-physical system security modeling, information technology systems, modeling languages, n/a, safe behavior, safety critical cyber-physical systems, safety-critical software, secure behavior, security analysis tools, security assessment tools, security violations, systems modeling practice},
pages = {33--36},
}
Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can intentionally trigger accidents. By implementing security assessment tools for modeling languages we are better able to address threats earlier in the system's lifecycle and, therefore, assure their safe and secure behavior in their eventual deployment. We posit that cyber-physical systems security modeling is practiced insufficiently because it is still addressed similarly to information technology systems.
Multilevel Runtime Security and Safety Monitoring for Cyber Physical Systems using Model-based Engineering.
Gautham, S.; Jayakumar, A.; and Elks, C.
submitted to SafeComp DevOps Workshop on Safety and Security. September 2020.
Acceptance rate 30%
link
bibtex
@article{gautham_multilevel_2020,
title = {Multilevel {Runtime} {Security} and {Safety} {Monitoring} for {Cyber} {Physical} {Systems} using {Model}-based {Engineering}},
journal = {submitted to SafeComp DevOps Workshop on Safety and Security},
author = {Gautham, Smitha and Jayakumar, Athira and Elks, Carl},
month = sep,
year = {2020},
note = {Acceptance rate 30\%},
}
An Attacker Modeling Framework for the Assessment of Cyber-Physical Systems Security.
Deloglos, C.; Elks, C.; and Tantawy, A.
In Casimiro, A.; Ortmeier, F.; Bitsch, F.; and Ferreira, P., editor(s),
Computer Safety, Reliability, and Security, of
Lecture Notes in Computer Science, pages 150–163, Cham, 2020. Springer International Publishing
Acceptance rate 20%
doi
link
bibtex
abstract
1 download
@inproceedings{deloglos_attacker_2020,
address = {Cham},
series = {Lecture {Notes} in {Computer} {Science}},
title = {An {Attacker} {Modeling} {Framework} for the {Assessment} of {Cyber}-{Physical} {Systems} {Security}},
isbn = {978-3-030-54549-9},
doi = {10.1007/978-3-030-54549-9_10},
abstract = {Characterizing attacker behavior with respect to Cyber-Physical Systems is important to assuring the security posture and resilience of these systems. Classical cyber vulnerability assessment approaches rely on the knowledge and experience of cyber-security experts to conduct security analyses and can be inconsistent where the experts’ knowledge and experience are lacking. This paper proposes a flexible attacker modeling framework that aids in the security analysis process by simulating a diverse set of attacker behaviors to predict attack progression and provide consistent system vulnerability analysis. The model proposes an expanded architecture of vulnerability databases to maximize its effectiveness and consistency in detecting CPS vulnerabilities while being compatible with existing vulnerability databases. The model has the power to be implemented and simulated against an actual or virtual CPS. Execution of the attacker model is demonstrated against a simulated industrial control system architecture, resulting in a probabilistic prediction of attacker behavior.},
language = {en},
booktitle = {Computer {Safety}, {Reliability}, and {Security}},
publisher = {Springer International Publishing},
author = {Deloglos, Christopher and Elks, Carl and Tantawy, Ashraf},
editor = {Casimiro, António and Ortmeier, Frank and Bitsch, Friedemann and Ferreira, Pedro},
year = {2020},
note = {Acceptance rate 20\%},
keywords = {Attacker modeling, CPS, Security},
pages = {150--163},
}
Characterizing attacker behavior with respect to Cyber-Physical Systems is important to assuring the security posture and resilience of these systems. Classical cyber vulnerability assessment approaches rely on the knowledge and experience of cyber-security experts to conduct security analyses and can be inconsistent where the experts’ knowledge and experience are lacking. This paper proposes a flexible attacker modeling framework that aids in the security analysis process by simulating a diverse set of attacker behaviors to predict attack progression and provide consistent system vulnerability analysis. The model proposes an expanded architecture of vulnerability databases to maximize its effectiveness and consistency in detecting CPS vulnerabilities while being compatible with existing vulnerability databases. The model has the power to be implemented and simulated against an actual or virtual CPS. Execution of the attacker model is demonstrated against a simulated industrial control system architecture, resulting in a probabilistic prediction of attacker behavior.