2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC) 2019
DOI: 10.1109/dasc43569.2019.9081652
|View full text |Cite
|
Sign up to set email alerts
|

Architectural and Behavioral Analysis for Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…A prototype of ADTree-based security analysis and synthesis was implemented in the VERDICT 2 toolchain [15] [16], which is a plugin for the OSATE tool [17].…”
Section: Discussionmentioning
confidence: 99%
“…A prototype of ADTree-based security analysis and synthesis was implemented in the VERDICT 2 toolchain [15] [16], which is a plugin for the OSATE tool [17].…”
Section: Discussionmentioning
confidence: 99%
“…Note that the connector connects the drone to the delivery truck in order to receive the delivery location and other initialization parameters prior to take-off. Threats (Siu, et al, 2019) is a Model-based System Engineering (MBSE) tool for analyzing cyber resiliency early in development (GE, 2020), (Meng, et al, 2021). The tool analyzes the system model for vulnerabilities and provides concrete, actionable feedback that can be incorporated into the development process.…”
Section: Example Aadl Model: Delivery Dronementioning
confidence: 99%
“…Another use of IVCs, and MUST sets in particular, is in the analysis of a system's tolerance to faults [20] or resiliency to cyberattacks [18]. For instance, an empty MUST set for a system S and its invariant P indicates that the property is satisfied by S in various ways, making the system fault tolerant or resilient against cyberattacks as far as property P is concerned.…”
Section: Ivcs For Fault-tolerance or Cyber-resiliency Analysismentioning
confidence: 99%
“…In general, proof-based traceability information can be used to perform a variety of engineering analyses, including vacuity detection [14]; coverage analysis [8,11]; impact analysis [16], design optimization; and robustness analysis [18,20]. Identifying which model elements are required for a proof, and assessing the relative importance of different model elements is critical to determine the quality of the overall model (including its assume-guarantee specification), determining when and where to implement changes, identifying components that need to be reverified, and measure the tolerance and resilience of the system against faults and attacks.…”
Section: Introductionmentioning
confidence: 99%