Safety Assurance in Software Systems From Airplanes to Atoms

Size: px
Start display at page:

Download "Safety Assurance in Software Systems From Airplanes to Atoms"

Transcription

1 Safety Assurance in Software Systems From Airplanes to Atoms MDEP Conference on New Reactor Design Activities Session Digital I&C: Current & Emerging Technical Challenges September 07 Dr. Darren Cofer

2 Rockwell Collins: Advanced Technology Center Trusted Systems Group Formal methods for verification Model-based development Practical and effective tools Certification (DO-78C) Domains Avionics systems Commercial and military Manned and unmanned Safety and security

3 Similar Concerns Safety-critical Regulated Redundancy for fault-tolerance Software intensive Fail-safe Fail-op 3

4 Similar Challenges Increased use of software in safetycritical functions Houston, we have a problem. Complexity of software Incorporation of COTS hardware/software New technologies that challenge the existing certification process Limitations of testing for safety assurance Cybersecurity What can the nuclear industry learn from civil aviation experience? 4

5 Assertion : The nuclear industry can benefit from aerospace software development and verification practices. 5

6 Certification Process for Civil Aviation Design Assurance CFR Title 4 Part 5 Airworthiness Standards: Transport Category Intended Aircraft Function Function, Failure, & Safety Information Safety Assessment Process Guidelines and Methods (ARP 476) System Design Operational Environment Means of Compliance System Development Processes (ARP 4754A) Functional Aircraft Requirements Implementation Hardware Requirements Guidelines for Integrated Modular Avionics (DO-97) Software Requirements Implementation Hardware Development Life-Cycle (DO-54) Software Development Life-Cycle (DO-78C) 6

7 DO-78 Principles Primarily a quality document, not safety Demonstrate that software implements requirements and nothing else (no surprises) Requirements-based testing Traceability among requirements, test cases, code Structural coverage metrics to determine adequacy of testing 7

8 Assertion : To cope with software complexity, the aerospace industry is moving toward use of formal methods. 8

9 Throttle Throttle V_cmd [m/s] V_s [m/s] V_cmd [m/s] V_s [m/s] h_cmd [m/s] psi_cmd [rad] psi [rad] h [m] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Throttle V_cmd [m/s] V_s [m/s] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Throttle Throttle V_cmd [m/s] V_s [m/s] V_cmd [m/s] V_s [m/s] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Throttle V_cmd [m/s] V_s [m/s] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Formal Methods: Complete Exploration of Design = 5 Velocity Tracker Velocity Tracker - control_cmd control_cmd Velocity Tracker Velocity Tracker elevator [rad] theta [rad] q [rad/sec] theta_cmd [rad] elevator [rad] rudder [rad] r [rad/sec] theta [rad] q [rad/sec] rudder [rad] phi [rad] r [rad/sec] aileron [rad] p [rad/sec] baseline control phi [rad] - aileron [rad] p [rad/sec] 0 flaps baseline control 0 flaps - control_cmd 0 flaps Altitude Tracker Psi Tracker Altitude Tracker Psi Tracker elevator [rad] theta [rad] q [rad/sec] rudder [rad] r [rad/sec] phi [rad] aileron [rad] p [rad/sec] baseline control [theta_cmd] [phi_cmd] [theta_cmd] Altitude Tracker Psi Tracker feedback feedback ref_cmds ref_cmds [theta_cmd] [phi_cmd] feedback ref_cmds - control_cmd control_cmd Velocity Tracker Velocity Tracker elevator [rad] theta [rad] q [rad/sec] theta_cmd [rad] elevator [rad] rudder [rad] r [rad/sec] theta [rad] q [rad/sec] rudder [rad] phi [rad] r [rad/sec] aileron [rad] p [rad/sec] baseline control phi [rad] - aileron [rad] p [rad/sec] 0 flaps baseline control 0 flaps - control_cmd 0 flaps Altitude Tracker Psi Tracker Altitude Tracker Psi Tracker elevator [rad] theta [rad] q [rad/sec] rudder [rad] r [rad/sec] phi [rad] aileron [rad] p [rad/sec] baseline control [theta_cmd] [phi_cmd] [theta_cmd] [phi_cmd] Altitude Tracker Psi Tracker Proof [theta_cmd] [phi_cmd] feedback feedback ref_cmds ref_cmds feedback ref_cmds [phi_cmd] Testing can only show the presence of bugs (and only if you are lucky) Analysis can show the absence of bugs (with evidence of correctness) 9

10 Formal Methods and Aircraft Certification Mode Logic Flight Guidance System DO-78C/DO-333 Case Study Theorem Proving demonstrated on the FGS design model Model Checking demonstrated on the Mode Logic Simulink model Abstract Interpretation demonstrated on the Heading Control Law source code control_cmd - 0 flaps V_cmd [m/s] Throttle V_s [m/s] Velocity Tracker h_cmd [m/s] h [m] elevator [rad] theta [rad] Altitude Tracker q [rad/sec] rudder [rad] r [rad/sec] psi_cmd [rad] psi [rad] phi [rad] aileron [rad] Psi Tracker p [rad/sec] baseline control Heading Control [theta_cmd] [phi_cmd] feedback ref_cmds Formal methods reduce cost and increase confidence through early detection and elimination of errors 0

11 Assertion 3: Formal methods can also address cybersecurity concerns for high-assurance systems.

12 High-Assurance Cyber Military Systems

13 Boeing Unmanned Little Bird Helicopter 3

14 High-Assurance Cyber Military Systems Final Demonstrations Boeing Unmanned Little Bird (ULB): Mesa AZ, Feb 07 Quadcopter: Sterling VA, Apr 07 Demonstrated cyber-resiliency of both vehicles Before and after flight demonstrations Attacked in-flight Comprehensive evaluation by white hat cyber-attackers Cyber-resiliency achieved through application of formal methods Model checking of architecture properties Synthesis/verification of software components Comprehensive proof of correctness of operating system Formal methods are practical and effective for achieving cybersecurity in real aerospace systems 4

15 For More Information HACMS final demo video DARPA Blocks Cyberattacks on Unmanned Little Bird In Flight (Aviation Week) Cybersecurity Skeptics Now Embracing Formal Methods (ACM Ubiquity) DO-78C/333 Certification Case Studies Using Formal Methods 5

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context

Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.

More information

High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity

High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity Distribution A: SSC17-V-01 High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity Daria C. Lane, Enrique S. Leon, Francisco C. Tacliad, Dexter H. Solio, Ian L. Rodney, Dmitriy

More information

Verification and Validation of Models for Embedded Software Development Prashant Hegde MathWorks India Pvt. Ltd.

Verification and Validation of Models for Embedded Software Development Prashant Hegde MathWorks India Pvt. Ltd. Verification and Validation of Models for Embedded Software Development Prashant Hegde MathWorks India Pvt. Ltd. 2015 The MathWorks, Inc. 1 Designing complex systems Is there something I don t know about

More information

Certification Management Application Tool for Aircraft Certification Management

Certification Management Application Tool for Aircraft Certification Management Certification Management Application Tool for Aircraft Certification Management Ministerie van Defensie NLR - Dedicated to innovation in aerospace www.nlr.nl projectarea versioning area lookup tables 2

More information

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat 2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation

More information

Boeing Certification Techniques for Advanced Flight Critical Systems Challenge Problem Integration (CerTA FCS CPI) Briefing at the

Boeing Certification Techniques for Advanced Flight Critical Systems Challenge Problem Integration (CerTA FCS CPI) Briefing at the Boeing Certification Techniques for Advanced Flight Critical Systems Challenge Problem Integration (CerTA FCS CPI) Briefing at the AFRL Safe & Secure Systems & Software Symposium (S5) BOEING is a trademark

More information

WHITE PAPER. 10 Reasons to Use Static Analysis for Embedded Software Development

WHITE PAPER. 10 Reasons to Use Static Analysis for Embedded Software Development WHITE PAPER 10 Reasons to Use Static Analysis for Embedded Software Development Overview Software is in everything. And in many embedded systems like flight control, medical devices, and powertrains, quality

More information

From Design to Production

From Design to Production From Design to Production An integrated approach Paolo Fabbri Senior Engineer 2014 The MathWorks, Inc. 1 Do you know what it is? Requirements System Test Functional Spec Integration Test Detailed Design

More information

Model-Based Design for High Integrity Software Development Mike Anthony Senior Application Engineer The MathWorks, Inc.

Model-Based Design for High Integrity Software Development Mike Anthony Senior Application Engineer The MathWorks, Inc. Model-Based Design for High Integrity Software Development Mike Anthony Senior Application Engineer The MathWorks, Inc. Tucson, AZ USA 2009 The MathWorks, Inc. Model-Based Design for High Integrity Software

More information

Development Guidance and Certification Considerations

Development Guidance and Certification Considerations Integrated Modular Avionics Development Guidance and Certification Considerations René L.C. Eveleens National Aerospace Laboratory NLR P.O. Box 90502 1006BM Amsterdam RTO SCI LS-176: Mission System Engineering

More information

Integrated Modular Avionics Development Guidance and Certification Considerations

Integrated Modular Avionics Development Guidance and Certification Considerations René L.C. Eveleens National Aerospace Laboratory NLR P.O. Box 90502 1006BM Amsterdam Netherlands eveleens@nlr.nl ABSTRACT From 2001 to 2005 a working group within the European Organisation for Civil Aviation

More information

Changing the way the world does software

Changing the way the world does software Changing the way the world does software Automated Certification from Soup to Nuts Nick Tudor njt@drisq.com Introducing D-RisQ D-RisQ is a SME based in Malvern, UK. All personnel have a background in mathematics,

More information

정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석

정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석 정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석 Develop high quality embedded software 이영준 Principal Application Engineer 2015 The MathWorks, Inc. 1 Agendas Unit-proving of AUTOSAR Component and Runtime error Secure Coding

More information

Using Formal Methods Tools to Improve Security in an Autonomous Military Truck

Using Formal Methods Tools to Improve Security in an Autonomous Military Truck U.S. ARMY TANK AUTOMOTIVE RESEARCH, DEVELOPMENT AND ENGINEERING CENTER Using Formal Methods Tools to Improve Security in an Autonomous Military Truck Dariusz Mikulski, Ph.D. SANS Automotive Cybersecurity

More information

S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation

S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING Competitiveness of Industry by means of Cross Fertilisation STORYLINE: FOCUS ON KEY ENABLERS FOR DISTRIBUTED INDUSTRIALS SYSTEMS HOW

More information

High-assurance software for autonomous ground systems

High-assurance software for autonomous ground systems High-assurance software for autonomous ground systems Aleksey Nogin HRL Laboratories, LLC December 15, 2016 Acknowledgment: This material is based upon work supported by the United States Air Force and

More information

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making

More information

Certification Requirements for High Assurance Systems

Certification Requirements for High Assurance Systems for High Assurance Systems Gordon M. Uchenick Senior Mentor/Principal Engineer Objective Interface Systems, Inc. and W. Mark Vanfleet Senior Cryptologic Mathematician/ Senior INFOSEC Analyst National Security

More information

FACE Technology Demonstration

FACE Technology Demonstration FACE Technology Demonstration August 17, 2017 FACE Vehicle Control, Navigation, and Guidance Architecture Experiments FACE is a Trademark of The Open Group BLUF PEO Aviation funded a FACE reference implementation

More information

MCGILL UNIVERSITY/PEOPIL CONFERENCE DUBLIN OCTOBER 2018

MCGILL UNIVERSITY/PEOPIL CONFERENCE DUBLIN OCTOBER 2018 Cyber Security: Airport risk and liability Jean-Michel Fobe Adrian Cioranu MCGILL UNIVERSITY/PEOPIL Conference on International Aviation & Liability DUBLIN 19-20 Airport cybersecurity concerns Airport

More information

High Assurance Cyber Military Systems (HACMS)

High Assurance Cyber Military Systems (HACMS) High Assurance Cyber Military Systems (HACMS) Ray Richards, I2O Program Manager November 19, 2018 11/19/2018 Distribution Statement A - Approved for Public Release, Distribution Unlimited 1 Many Remote

More information

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1 Addressing Future Challenges in the Development of Safe and Secure Software Components 2016 The MathWorks, Inc. 1 Cybersecurity Emerging Topic in the Auto Industry Vehicle-to-Infrastructure Wifi Hotspot

More information

Why testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties

Why testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties Why testing and analysis Software Testing Adapted from FSE 98 Tutorial by Michal Young and Mauro Pezze Software is never correct no matter what developing testing technique is used All software must be

More information

! Use of formal notations. ! in software system descriptions. ! for a broad range of effects. ! and varying levels of use. !

! Use of formal notations. ! in software system descriptions. ! for a broad range of effects. ! and varying levels of use. ! What Are Formal Methods? David S. Rosenblum ICS 221 Winter 2001! Use of formal notations! first-order logic, state machines, etc.! in software system descriptions! system models, constraints, specifications,

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

UAS Operation in National Air Space (NAS) Secure UAS Command and Control UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,

More information

Verification by Static Analysis

Verification by Static Analysis Verification by Static Analysis Intelligent Testing Conference Bristol, 17 th March 2014 Verification overview Software Verification is The process of evaluating software during or at the end of the development

More information

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of

More information

AQMS AUDITOR APPLICATION GUIDE

AQMS AUDITOR APPLICATION GUIDE AQMS OR AUTHENTICATION BODY AQMS OR APPLICATION GUIDE PROBITAS AUTHENTICATION 10 27 2015 RA 002 AAA UG AQMS Auditor Application User Guide pg. 1 of 22 TABLE OF CONTENTS 1 Introduction... 2 2 Certification

More information

Verification and Test with Model-Based Design

Verification and Test with Model-Based Design Verification and Test with Model-Based Design Flight Software Workshop 2015 Jay Abraham 2015 The MathWorks, Inc. 1 The software development process Develop, iterate and specify requirements Create high

More information

Aircraft Stability and Performance 2nd Year, Aerospace Engineering. Dr. M. Turner

Aircraft Stability and Performance 2nd Year, Aerospace Engineering. Dr. M. Turner Aircraft Stability and Performance 2nd Year, Aerospace Engineering Dr. M. Turner Basic Info Timetable 15.00-16.00 Monday ENG LT1 16.00-17.00 Monday ENG LT1 Typical structure of lectures Part 1 Theory Part

More information

Automating Best Practices to Improve Design Quality

Automating Best Practices to Improve Design Quality Automating Best Practices to Improve Design Quality 임베디드 SW 개발에서의품질확보방안 이제훈차장 2015 The MathWorks, Inc. 1 Key Takeaways Author, manage requirements in Simulink Early verification to find defects sooner

More information

1. INTRODUCTION. Constrained Control Allocation for Systems with Redundant Control Effectors

1. INTRODUCTION. Constrained Control Allocation for Systems with Redundant Control Effectors 1. INTRODUCTION Control allocation algorithms determine how the controls of a system should be positioned so that they produce some desired effect. Constrained controls have limits on their maximum positions

More information

Introducing Cyber Resiliency Concerns Into Engineering Education

Introducing Cyber Resiliency Concerns Into Engineering Education Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference

More information

SAE IVHM Initiative. PHM Standards Panel PHM Society Conference Minneapolis September 26th David Alexander SAE Aerospace Standards Europe

SAE IVHM Initiative. PHM Standards Panel PHM Society Conference Minneapolis September 26th David Alexander SAE Aerospace Standards Europe SAE IVHM Initiative PHM Standards Panel PHM Society Conference Minneapolis September 26th 2012 David Alexander SAE Aerospace Standards Europe SAE IVHM History and Future 1905 SAE formed in 1905 to promote

More information

Verification and Validation of High-Integrity Systems

Verification and Validation of High-Integrity Systems Verification and Validation of High-Integrity Systems Chethan CU, MathWorks Vaishnavi HR, MathWorks 2015 The MathWorks, Inc. 1 Growing Complexity of Embedded Systems Emergency Braking Body Control Module

More information

Software Engineering 2 A practical course in software engineering. Ekkart Kindler

Software Engineering 2 A practical course in software engineering. Ekkart Kindler Software Engineering 2 A practical course in software engineering Quality Management Main Message Planning phase Definition phase Design phase Implem. phase Acceptance phase Mainten. phase 3 1. Overview

More information

Aerospace Software Engineering

Aerospace Software Engineering 16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated

More information

Static Analysis of Embedded Systems

Static Analysis of Embedded Systems Static Analysis of Embedded Systems Xavier RIVAL rival@di.ens.fr Outline Case study Certification of embedded softwares Demo Static Analysisof Embedded Systems p.2/12 Ariane 5 Flight 501 Ariane 5: sattelite

More information

ACARE WG 4 Security Overview

ACARE WG 4 Security Overview ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/

More information

Troubleshooting and Cyber Protection Josh Wheeler

Troubleshooting and Cyber Protection Josh Wheeler May 4, 2016 Troubleshooting and Cyber Protection Josh Wheeler Network Security Network Security Risks Video Network Security Risks Article Network Security Risks Data stealing or disruption of network

More information

Database Integrity Policy for Aeronautical Data

Database Integrity Policy for Aeronautical Data Database Integrity Policy for Aeronautical Data Presented to: By: Date: 2008 Software and Airborne Electronic Hardware Standardization Conference Denver, Colorado Brad Miller, AIR-130 Background Prior

More information

Rockwell Collins Evolving FM Methodology

Rockwell Collins Evolving FM Methodology Rockwell Collins Evolving FM Methodology Konrad Slind Trusted Systems Group Rockwell Collins January 25, 2014 Collaborators Rockwell Collins: Andrew Gacek, David Hardin, Darren Cofer, John Backes, Luas

More information

Automotive Functional Safety

Automotive Functional Safety Automotive Functional Safety Complexity, Confidence, Compliance, Certification Farmington, 2018-03-22 23.03.2018 150 years TÜV SÜD 150 years of inspiring trust Inspiring trust since 1866 The year 2016

More information

List of proposed requirements for Avionics domain Annex D1.1.b to deliverable D1.1

List of proposed requirements for Avionics domain Annex D1.1.b to deliverable D1.1 Collaborative Large-scale Integrating Project Open Platform for EvolutioNary Certification Of Safety-critical Systems List of proposed requirements for domain to deliverable D1.1 Work Package: WP1: Use

More information

Using Formal Methods to Enable More Secure Vehicles: DARPA's HACMS Program

Using Formal Methods to Enable More Secure Vehicles: DARPA's HACMS Program Using Formal Methods to Enable More Secure Vehicles: DARPA's HACMS Program Kathleen Fisher Tufts University 16 April 2015 (Slides based on original DARPA HACMS slides) Pervasive Vulnerability to Cyber

More information

Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A)

Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A) Washington, DC August 28, 2018 Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A) 1. RTCA Background RTCA is a private,

More information

A Model-Based Reference Workflow for the Development of Safety-Related Software

A Model-Based Reference Workflow for the Development of Safety-Related Software A Model-Based Reference Workflow for the Development of Safety-Related Software 2010-01-2338 Published 10/19/2010 Michael Beine dspace GmbH Dirk Fleischer dspace Inc. Copyright 2010 SAE International ABSTRACT

More information

ECE 587 Hardware/Software Co-Design Lecture 11 Verification I

ECE 587 Hardware/Software Co-Design Lecture 11 Verification I ECE 587 Hardware/Software Co-Design Spring 2018 1/23 ECE 587 Hardware/Software Co-Design Lecture 11 Verification I Professor Jia Wang Department of Electrical and Computer Engineering Illinois Institute

More information

Executive summary. by Michel Bonnet, Maximilien Laforge, and Jean-Baptiste Samuel

Executive summary. by Michel Bonnet, Maximilien Laforge, and Jean-Baptiste Samuel 998-2095-02-21-14AR0 by Michel Bonnet, Maximilien Laforge, and Jean-Baptiste Samuel Executive summary Improper integration of Intelligent Electronic Devices (IED) into medium / high voltage electrical

More information

Fault Propagation and Transformation: A Safety Analysis. Malcolm Wallace

Fault Propagation and Transformation: A Safety Analysis. Malcolm Wallace Fault Propagation and Transformation: A Safety Analysis Malcolm Wallace Software Safety Safety is not the same as correctness. Correctness = theorem-proving, model-checking, abstract interpretation, etc.

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Certification Authorities Software Team (CAST) Position Paper CAST-25

Certification Authorities Software Team (CAST) Position Paper CAST-25 Certification Authorities Software Team (CAST) Position Paper CAST-25 CONSIDERATIONS WHEN USING A QUALIFIABLE DEVELOPMENT ENVIRONMENT (QDE) IN CERTIFICATION PROJECTS COMPLETED SEPTEMBER 2005 (Rev 0) NOTE:

More information

Dual Redundant Flight Control System Design for Microminiature UAV Xiao-Lin ZHANG 1,a, Hai-Sheng Li 2,b, Dan-Dan YUAN 2,c

Dual Redundant Flight Control System Design for Microminiature UAV Xiao-Lin ZHANG 1,a, Hai-Sheng Li 2,b, Dan-Dan YUAN 2,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) Dual Redundant Flight Control System Design for Microminiature UAV Xiao-Lin ZHANG 1,a, Hai-Sheng Li 2,b, Dan-Dan

More information

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP ARINC cybersecurity solutions DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP Getting started is as simple as assessing your baseline THE RIGHT CYBERSECURITY SOLUTIONS FOR YOUR UNIQUE NEEDS Comprehensive threat

More information

What are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software

What are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software What are Embedded Systems? 1 Lecture 1 Introduction to Embedded Systems & Software Roopa Rangaswami October 9, 2002 Embedded systems are computer systems that monitor, respond to, or control an external

More information

A Path Planning Algorithm to Enable Well-Clear Low Altitude UAS Operation Beyond Visual Line of Sight

A Path Planning Algorithm to Enable Well-Clear Low Altitude UAS Operation Beyond Visual Line of Sight A Path Planning Algorithm to Enable Well-Clear Low Altitude UAS Operation Beyond Visual Line of Sight Swee Balachandran National Institute of Aerospace, Hampton, VA Anthony Narkawicz, César Muñoz, María

More information

Simulation of sensor failure accommodation in flight control system of transport aircraft: a modular approach

Simulation of sensor failure accommodation in flight control system of transport aircraft: a modular approach ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 11 (2015) No. 1, pp. 55-68 Simulation of sensor failure accommodation in flight control system of transport aircraft: a modular

More information

Safety & Cybersecurity of embedded softwares in product and process

Safety & Cybersecurity of embedded softwares in product and process Safety & Cybersecurity of embedded softwares in product and process PROCESS SAFETY congress May 30, 2018 Franck SADMI- Project Manager Safety & Cybersecurity Technical Centre Europe No Safety without CYBERSECURITY

More information

Reaching for the sky with certified and safe solutions for the aerospace market

Reaching for the sky with certified and safe solutions for the aerospace market www.tttech.com/aerospace Reaching for the sky with certified and safe solutions for the aerospace market More about our certified and safe products inside Advancing safe technologies, improving human lives

More information

Industrial Verification Using the KIND Model Checker Lucas Wagner Jedidiah McClurg

Industrial Verification Using the KIND Model Checker Lucas Wagner Jedidiah McClurg Industrial Verification Using the KIND Model Checker Lucas Wagner Jedidiah McClurg {lgwagner,jrmcclur}@rockwellcollins.com Software Complexity is Becoming Overwhelming Advancements in computing technology

More information

Embedded Fault Detection for Low-Cost, Safety-Critical Systems (NSF CPS )

Embedded Fault Detection for Low-Cost, Safety-Critical Systems (NSF CPS ) Embedded Fault Detection for Low-Cost, Safety-Critical Systems (NSF CPS-0931931) Gary Balas Peter Seiler Mats Per Erik Heimdahl Jaideep Srivastava Antonia Zhai Aerospace Engineering and Mechanics/ Computer

More information

Complexity-Reducing Design Patterns for Cyber-Physical Systems. DARPA META Project. AADL Standards Meeting January 2011 Steven P.

Complexity-Reducing Design Patterns for Cyber-Physical Systems. DARPA META Project. AADL Standards Meeting January 2011 Steven P. Complexity-Reducing Design Patterns for Cyber-Physical Systems DARPA META Project AADL Standards Meeting 24-27 January 2011 Steven P. Miller Delivered to the Government in Accordance with Contract FA8650-10-C-7081

More information

Efficient Development of Airborne Software with SCADE Suite

Efficient Development of Airborne Software with SCADE Suite Efficient Development of Airborne Software with SCADE Suite Esterel Technologies 2003 Abstract This white paper addresses the issue of cost and productivity improvement in the development of safety-critical

More information

Medical Device Cybersecurity: FDA Perspective

Medical Device Cybersecurity: FDA Perspective Medical Device Cybersecurity: FDA Perspective Suzanne B. Schwartz MD, MBA Associate Director for Science and Strategic Partnerships Office of the Center Director (OCD) Center for Devices and Radiological

More information

TSW Reliability and Fault Tolerance

TSW Reliability and Fault Tolerance TSW Reliability and Fault Tolerance Alexandre David 1.2.05 Credits: some slides by Alan Burns & Andy Wellings. Aims Understand the factors which affect the reliability of a system. Introduce how software

More information

Cyber Security Requirements for Supply Chain. June 17, 2015

Cyber Security Requirements for Supply Chain. June 17, 2015 Cyber Security Requirements for Supply Chain June 17, 2015 Topics Cyber Threat Legislation and Regulation Nuts and Bolts of NEI 08-09 Nuclear Procurement EPRI Methodology for Procurement Something to think

More information

PSEG Nuclear Cyber Security Supply Chain Guidance

PSEG Nuclear Cyber Security Supply Chain Guidance PSEG Nuclear Cyber Security Supply Chain Guidance Developed by: Jim Shank PSEG Site IT Manager & Cyber Security Program Manager Presented at Rapid 2018 by: Bob Tilton- Director Procurement PSEG Power Goals

More information

AQMS AUDITOR AUTHENTICATION BODY AQMS AUDITOR APPLICATION GUIDE

AQMS AUDITOR AUTHENTICATION BODY AQMS AUDITOR APPLICATION GUIDE AQMS OR AUTHENTICATION BODY AQMS OR APPLICATION GUIDE AQMS OR APPLICATION GUIDE PROBITAS AUTHENTICATION 6 1 2014 TABLE OF CONTENTS 1 Introduction... 2 2 Certification Schemes... 3 3 Certification Grades...

More information

Automatización de Métodos y Procesos para Mejorar la Calidad del Diseño

Automatización de Métodos y Procesos para Mejorar la Calidad del Diseño Automatización de Métodos y Procesos para Mejorar la Calidad del Diseño Luis López 2015 The MathWorks, Inc. 1 Growing Complexity of Embedded Systems Emergency Braking Body Control Module Voice Recognition

More information

Standardkonforme Absicherung mit Model-Based Design

Standardkonforme Absicherung mit Model-Based Design Standardkonforme Absicherung mit Model-Based Design MATLAB EXPO 2014 Dr. Marc Segelken Principal Application Engineer 2014 The MathWorks, Inc. 1 Safety Standards for Embedded Systems IEC 61508 ISO 26262

More information

MONIKA HEINER.

MONIKA HEINER. LESSON 1 testing, intro 1 / 25 SOFTWARE TESTING - STATE OF THE ART, METHODS, AND LIMITATIONS MONIKA HEINER monika.heiner@b-tu.de http://www.informatik.tu-cottbus.de PRELIMINARIES testing, intro 2 / 25

More information

Model-Based Design for Safety Critical Automotive Applications

Model-Based Design for Safety Critical Automotive Applications Model-Based Design for Safety Critical Automotive Applications Mirko Conrad Senior Team Lead Simulink Certification and Standards 2008 The MathWorks, Inc. Model-Based Design for Safety-Critical Applications

More information

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs.

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs. In this Lecture you will Learn: Testing in Software Development Process Examine the verification and validation activities in software development process stage by stage Introduce some basic concepts of

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Simulink 모델과 C/C++ 코드에대한매스웍스의정형검증툴소개 The MathWorks, Inc. 1

Simulink 모델과 C/C++ 코드에대한매스웍스의정형검증툴소개 The MathWorks, Inc. 1 Simulink 모델과 C/C++ 코드에대한매스웍스의정형검증툴소개 2012 The MathWorks, Inc. 1 Agenda Formal Verification Key concept Applications Verification of designs against (functional) requirements Design error detection Test

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

C07: Testing and JUnit

C07: Testing and JUnit CISC 3120 C07: Testing and JUnit Hui Chen Department of Computer & Information Science CUNY Brooklyn College 9/19/2017 CUNY Brooklyn College 1 Outline Recap and issues Grades and feedback Assignments &

More information

Cybersecurity and Commercial Aviation

Cybersecurity and Commercial Aviation Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers

More information

THE AUTOMATED TEST FRAMEWORK

THE AUTOMATED TEST FRAMEWORK 2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO

More information

Information Security Continuous Monitoring (ISCM) Program Evaluation

Information Security Continuous Monitoring (ISCM) Program Evaluation Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda

More information

How to reduce the integration time Issues and Potential Solutions. Christophe GINESTET

How to reduce the integration time Issues and Potential Solutions. Christophe GINESTET How to reduce the integration time Issues and Potential Solutions Christophe GINESTET August 29th, 2013 Summary SYSTeam Overview The benefits of virtual integration Gateway between virtual and real integration

More information

ICB Industry Consultation Body

ICB Industry Consultation Body ICB Industry Consultation Body POSITION PAPER Regulatory Response to ATM Cyber-Security Increasing reliance on inter-connected ATM systems, services and technologies increases the risk of cyber-attacks.

More information

2 ACCREDITED AUDITORS

2 ACCREDITED AUDITORS 2 ACCREDITED AUDITORS 2.1 Auditor Accreditation 2.1.1 IBAC will issue auditor accreditation and appropriate credentials to individuals that apply for such accreditation and who meet the requirements established

More information

Cybersecurity & Risks Analysis

Cybersecurity & Risks Analysis Working Together to Build Confidence Cybersecurity & Risks Analysis Djenana Campara Chief Executive Officer Member, Object Management Group Board of Directors Co-Chair, System Assurance Task Force Cyber

More information

Presented by Greg Pollari (Rockwell Collins) and Nigel Shaw (Eurostep)

Presented by Greg Pollari (Rockwell Collins) and Nigel Shaw (Eurostep) System Architecture Virtual Integration (SAVI) Project : Intermodel Error Checking and Consistency Review and Demonstration An Aerospace Vehicle Systems Institute Project (AVSI) Presented by Greg Pollari

More information

Using Code Coverage to Improve the Reliability of Embedded Software. Whitepaper V

Using Code Coverage to Improve the Reliability of Embedded Software. Whitepaper V Using Code Coverage to Improve the Reliability of Embedded Software Whitepaper V2.0 2017-12 Table of Contents 1 Introduction... 3 2 Levels of Code Coverage... 3 2.1 Statement Coverage... 3 2.2 Statement

More information

Columbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology

Columbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology COURSE: AMT 2109 Airframe Inspection Columbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology CREDITS: 6 CLASS HOURS PER WEEK: 27 PREREQUISITES: AMT

More information

FAA Order Simple And Complex Electronic Hardware Approval Guidance. Federal Aviation Administration

FAA Order Simple And Complex Electronic Hardware Approval Guidance. Federal Aviation Administration FAA Order 8110.105 Simple And Complex Electronic Hardware Presented to: FAA Software and Airborne Electronic Hardware Conference, Denver By: Gregg Bartley FAA, ANM-111/AIR-120 Date: Why is this Order necessary?

More information

Automated Requirements-Based Testing

Automated Requirements-Based Testing Automated Requirements-Based Testing Tuesday, October 7 th 2008 2008 The MathWorks, Inc. Dr. Marc Segelken Senior Application Engineer Overview Purposes of Testing Test Case Generation Structural Testing

More information

Introduction to ISO/IEC 27001:2005

Introduction to ISO/IEC 27001:2005 Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating

More information

IAEA Division of Nuclear Security

IAEA Division of Nuclear Security IAEA Division of Nuclear Security Computer Security Activities Overview Donald Dudenhoeffer 25 May 2017 Computer and Information Security The Division of Nuclear Security (NSNS) seeks to support Member

More information

Model-Based Safety Approach for Early Validation of Integrated and Modular Avionics Architectures

Model-Based Safety Approach for Early Validation of Integrated and Modular Avionics Architectures Model-Based Safety Approach for Early Validation of Integrated and Modular Avionics Architectures Marion Morel THALES AVIONICS S.A.S., 31036 Toulouse, France marion.morel@fr.thalesgroup.com Abstract. Increasing

More information

Implementation and Verification Daniel MARTINS Application Engineer MathWorks

Implementation and Verification Daniel MARTINS Application Engineer MathWorks Implementation and Verification Daniel MARTINS Application Engineer MathWorks Daniel.Martins@mathworks.fr 2014 The MathWorks, Inc. 1 Agenda Benefits of Model-Based Design Verification at Model level Code

More information

HITRUST CSF: One Framework

HITRUST CSF: One Framework HITRUST CSF: One Framework Leveraging the HITRUST CSF to Support ISO, HIPAA, & NIST Implementation and Compliance, and SSAE 16 SOC Reporting Dr. Bryan Cline, CISSP-ISSEP, CISM, CISA, CCSFP, HCISPP Senior

More information

BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS

BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS Alex Wilson Director, Market Development 2017 WIND RIVER. ALL RIGHTS RESERVED. For over 30 years, Wind River has helped the world's technology

More information

Jay Abraham 1 MathWorks, Natick, MA, 01760

Jay Abraham 1 MathWorks, Natick, MA, 01760 Jay Abraham 1 MathWorks, Natick, MA, 01760 Stringent performance requirements and shorter development cycles are driving the use of modeling and simulation. Model-Based Design core of this development

More information