Safety Assurance in Software Systems From Airplanes to Atoms
|
|
- Angelina Oliver
- 5 years ago
- Views:
Transcription
1 Safety Assurance in Software Systems From Airplanes to Atoms MDEP Conference on New Reactor Design Activities Session Digital I&C: Current & Emerging Technical Challenges September 07 Dr. Darren Cofer
2 Rockwell Collins: Advanced Technology Center Trusted Systems Group Formal methods for verification Model-based development Practical and effective tools Certification (DO-78C) Domains Avionics systems Commercial and military Manned and unmanned Safety and security
3 Similar Concerns Safety-critical Regulated Redundancy for fault-tolerance Software intensive Fail-safe Fail-op 3
4 Similar Challenges Increased use of software in safetycritical functions Houston, we have a problem. Complexity of software Incorporation of COTS hardware/software New technologies that challenge the existing certification process Limitations of testing for safety assurance Cybersecurity What can the nuclear industry learn from civil aviation experience? 4
5 Assertion : The nuclear industry can benefit from aerospace software development and verification practices. 5
6 Certification Process for Civil Aviation Design Assurance CFR Title 4 Part 5 Airworthiness Standards: Transport Category Intended Aircraft Function Function, Failure, & Safety Information Safety Assessment Process Guidelines and Methods (ARP 476) System Design Operational Environment Means of Compliance System Development Processes (ARP 4754A) Functional Aircraft Requirements Implementation Hardware Requirements Guidelines for Integrated Modular Avionics (DO-97) Software Requirements Implementation Hardware Development Life-Cycle (DO-54) Software Development Life-Cycle (DO-78C) 6
7 DO-78 Principles Primarily a quality document, not safety Demonstrate that software implements requirements and nothing else (no surprises) Requirements-based testing Traceability among requirements, test cases, code Structural coverage metrics to determine adequacy of testing 7
8 Assertion : To cope with software complexity, the aerospace industry is moving toward use of formal methods. 8
9 Throttle Throttle V_cmd [m/s] V_s [m/s] V_cmd [m/s] V_s [m/s] h_cmd [m/s] psi_cmd [rad] psi [rad] h [m] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Throttle V_cmd [m/s] V_s [m/s] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Throttle Throttle V_cmd [m/s] V_s [m/s] V_cmd [m/s] V_s [m/s] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Throttle V_cmd [m/s] V_s [m/s] h_cmd [m/s] h [m] psi_cmd [rad] psi [rad] Formal Methods: Complete Exploration of Design = 5 Velocity Tracker Velocity Tracker - control_cmd control_cmd Velocity Tracker Velocity Tracker elevator [rad] theta [rad] q [rad/sec] theta_cmd [rad] elevator [rad] rudder [rad] r [rad/sec] theta [rad] q [rad/sec] rudder [rad] phi [rad] r [rad/sec] aileron [rad] p [rad/sec] baseline control phi [rad] - aileron [rad] p [rad/sec] 0 flaps baseline control 0 flaps - control_cmd 0 flaps Altitude Tracker Psi Tracker Altitude Tracker Psi Tracker elevator [rad] theta [rad] q [rad/sec] rudder [rad] r [rad/sec] phi [rad] aileron [rad] p [rad/sec] baseline control [theta_cmd] [phi_cmd] [theta_cmd] Altitude Tracker Psi Tracker feedback feedback ref_cmds ref_cmds [theta_cmd] [phi_cmd] feedback ref_cmds - control_cmd control_cmd Velocity Tracker Velocity Tracker elevator [rad] theta [rad] q [rad/sec] theta_cmd [rad] elevator [rad] rudder [rad] r [rad/sec] theta [rad] q [rad/sec] rudder [rad] phi [rad] r [rad/sec] aileron [rad] p [rad/sec] baseline control phi [rad] - aileron [rad] p [rad/sec] 0 flaps baseline control 0 flaps - control_cmd 0 flaps Altitude Tracker Psi Tracker Altitude Tracker Psi Tracker elevator [rad] theta [rad] q [rad/sec] rudder [rad] r [rad/sec] phi [rad] aileron [rad] p [rad/sec] baseline control [theta_cmd] [phi_cmd] [theta_cmd] [phi_cmd] Altitude Tracker Psi Tracker Proof [theta_cmd] [phi_cmd] feedback feedback ref_cmds ref_cmds feedback ref_cmds [phi_cmd] Testing can only show the presence of bugs (and only if you are lucky) Analysis can show the absence of bugs (with evidence of correctness) 9
10 Formal Methods and Aircraft Certification Mode Logic Flight Guidance System DO-78C/DO-333 Case Study Theorem Proving demonstrated on the FGS design model Model Checking demonstrated on the Mode Logic Simulink model Abstract Interpretation demonstrated on the Heading Control Law source code control_cmd - 0 flaps V_cmd [m/s] Throttle V_s [m/s] Velocity Tracker h_cmd [m/s] h [m] elevator [rad] theta [rad] Altitude Tracker q [rad/sec] rudder [rad] r [rad/sec] psi_cmd [rad] psi [rad] phi [rad] aileron [rad] Psi Tracker p [rad/sec] baseline control Heading Control [theta_cmd] [phi_cmd] feedback ref_cmds Formal methods reduce cost and increase confidence through early detection and elimination of errors 0
11 Assertion 3: Formal methods can also address cybersecurity concerns for high-assurance systems.
12 High-Assurance Cyber Military Systems
13 Boeing Unmanned Little Bird Helicopter 3
14 High-Assurance Cyber Military Systems Final Demonstrations Boeing Unmanned Little Bird (ULB): Mesa AZ, Feb 07 Quadcopter: Sterling VA, Apr 07 Demonstrated cyber-resiliency of both vehicles Before and after flight demonstrations Attacked in-flight Comprehensive evaluation by white hat cyber-attackers Cyber-resiliency achieved through application of formal methods Model checking of architecture properties Synthesis/verification of software components Comprehensive proof of correctness of operating system Formal methods are practical and effective for achieving cybersecurity in real aerospace systems 4
15 For More Information HACMS final demo video DARPA Blocks Cyberattacks on Unmanned Little Bird In Flight (Aviation Week) Cybersecurity Skeptics Now Embracing Formal Methods (ACM Ubiquity) DO-78C/333 Certification Case Studies Using Formal Methods 5
Test and Evaluation of Autonomous Systems in a Model Based Engineering Context
Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.
More informationHigh-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity
Distribution A: SSC17-V-01 High-Assurance Cyber Space Systems (HACSS) for Small Satellite Mission Integrity Daria C. Lane, Enrique S. Leon, Francisco C. Tacliad, Dexter H. Solio, Ian L. Rodney, Dmitriy
More informationVerification and Validation of Models for Embedded Software Development Prashant Hegde MathWorks India Pvt. Ltd.
Verification and Validation of Models for Embedded Software Development Prashant Hegde MathWorks India Pvt. Ltd. 2015 The MathWorks, Inc. 1 Designing complex systems Is there something I don t know about
More informationCertification Management Application Tool for Aircraft Certification Management
Certification Management Application Tool for Aircraft Certification Management Ministerie van Defensie NLR - Dedicated to innovation in aerospace www.nlr.nl projectarea versioning area lookup tables 2
More information2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat
2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation
More informationBoeing Certification Techniques for Advanced Flight Critical Systems Challenge Problem Integration (CerTA FCS CPI) Briefing at the
Boeing Certification Techniques for Advanced Flight Critical Systems Challenge Problem Integration (CerTA FCS CPI) Briefing at the AFRL Safe & Secure Systems & Software Symposium (S5) BOEING is a trademark
More informationWHITE PAPER. 10 Reasons to Use Static Analysis for Embedded Software Development
WHITE PAPER 10 Reasons to Use Static Analysis for Embedded Software Development Overview Software is in everything. And in many embedded systems like flight control, medical devices, and powertrains, quality
More informationFrom Design to Production
From Design to Production An integrated approach Paolo Fabbri Senior Engineer 2014 The MathWorks, Inc. 1 Do you know what it is? Requirements System Test Functional Spec Integration Test Detailed Design
More informationModel-Based Design for High Integrity Software Development Mike Anthony Senior Application Engineer The MathWorks, Inc.
Model-Based Design for High Integrity Software Development Mike Anthony Senior Application Engineer The MathWorks, Inc. Tucson, AZ USA 2009 The MathWorks, Inc. Model-Based Design for High Integrity Software
More informationDevelopment Guidance and Certification Considerations
Integrated Modular Avionics Development Guidance and Certification Considerations René L.C. Eveleens National Aerospace Laboratory NLR P.O. Box 90502 1006BM Amsterdam RTO SCI LS-176: Mission System Engineering
More informationIntegrated Modular Avionics Development Guidance and Certification Considerations
René L.C. Eveleens National Aerospace Laboratory NLR P.O. Box 90502 1006BM Amsterdam Netherlands eveleens@nlr.nl ABSTRACT From 2001 to 2005 a working group within the European Organisation for Civil Aviation
More informationChanging the way the world does software
Changing the way the world does software Automated Certification from Soup to Nuts Nick Tudor njt@drisq.com Introducing D-RisQ D-RisQ is a SME based in Malvern, UK. All personnel have a background in mathematics,
More information정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석
정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석 Develop high quality embedded software 이영준 Principal Application Engineer 2015 The MathWorks, Inc. 1 Agendas Unit-proving of AUTOSAR Component and Runtime error Secure Coding
More informationUsing Formal Methods Tools to Improve Security in an Autonomous Military Truck
U.S. ARMY TANK AUTOMOTIVE RESEARCH, DEVELOPMENT AND ENGINEERING CENTER Using Formal Methods Tools to Improve Security in an Autonomous Military Truck Dariusz Mikulski, Ph.D. SANS Automotive Cybersecurity
More informationS1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation
S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING Competitiveness of Industry by means of Cross Fertilisation STORYLINE: FOCUS ON KEY ENABLERS FOR DISTRIBUTED INDUSTRIALS SYSTEMS HOW
More informationHigh-assurance software for autonomous ground systems
High-assurance software for autonomous ground systems Aleksey Nogin HRL Laboratories, LLC December 15, 2016 Acknowledgment: This material is based upon work supported by the United States Air Force and
More informationDefence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology
Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making
More informationCertification Requirements for High Assurance Systems
for High Assurance Systems Gordon M. Uchenick Senior Mentor/Principal Engineer Objective Interface Systems, Inc. and W. Mark Vanfleet Senior Cryptologic Mathematician/ Senior INFOSEC Analyst National Security
More informationFACE Technology Demonstration
FACE Technology Demonstration August 17, 2017 FACE Vehicle Control, Navigation, and Guidance Architecture Experiments FACE is a Trademark of The Open Group BLUF PEO Aviation funded a FACE reference implementation
More informationMCGILL UNIVERSITY/PEOPIL CONFERENCE DUBLIN OCTOBER 2018
Cyber Security: Airport risk and liability Jean-Michel Fobe Adrian Cioranu MCGILL UNIVERSITY/PEOPIL Conference on International Aviation & Liability DUBLIN 19-20 Airport cybersecurity concerns Airport
More informationHigh Assurance Cyber Military Systems (HACMS)
High Assurance Cyber Military Systems (HACMS) Ray Richards, I2O Program Manager November 19, 2018 11/19/2018 Distribution Statement A - Approved for Public Release, Distribution Unlimited 1 Many Remote
More informationAddressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1
Addressing Future Challenges in the Development of Safe and Secure Software Components 2016 The MathWorks, Inc. 1 Cybersecurity Emerging Topic in the Auto Industry Vehicle-to-Infrastructure Wifi Hotspot
More informationWhy testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties
Why testing and analysis Software Testing Adapted from FSE 98 Tutorial by Michal Young and Mauro Pezze Software is never correct no matter what developing testing technique is used All software must be
More information! Use of formal notations. ! in software system descriptions. ! for a broad range of effects. ! and varying levels of use. !
What Are Formal Methods? David S. Rosenblum ICS 221 Winter 2001! Use of formal notations! first-order logic, state machines, etc.! in software system descriptions! system models, constraints, specifications,
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationUAS Operation in National Air Space (NAS) Secure UAS Command and Control
UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,
More informationVerification by Static Analysis
Verification by Static Analysis Intelligent Testing Conference Bristol, 17 th March 2014 Verification overview Software Verification is The process of evaluating software during or at the end of the development
More informationSoftware Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics
Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of
More informationAQMS AUDITOR APPLICATION GUIDE
AQMS OR AUTHENTICATION BODY AQMS OR APPLICATION GUIDE PROBITAS AUTHENTICATION 10 27 2015 RA 002 AAA UG AQMS Auditor Application User Guide pg. 1 of 22 TABLE OF CONTENTS 1 Introduction... 2 2 Certification
More informationVerification and Test with Model-Based Design
Verification and Test with Model-Based Design Flight Software Workshop 2015 Jay Abraham 2015 The MathWorks, Inc. 1 The software development process Develop, iterate and specify requirements Create high
More informationAircraft Stability and Performance 2nd Year, Aerospace Engineering. Dr. M. Turner
Aircraft Stability and Performance 2nd Year, Aerospace Engineering Dr. M. Turner Basic Info Timetable 15.00-16.00 Monday ENG LT1 16.00-17.00 Monday ENG LT1 Typical structure of lectures Part 1 Theory Part
More informationAutomating Best Practices to Improve Design Quality
Automating Best Practices to Improve Design Quality 임베디드 SW 개발에서의품질확보방안 이제훈차장 2015 The MathWorks, Inc. 1 Key Takeaways Author, manage requirements in Simulink Early verification to find defects sooner
More information1. INTRODUCTION. Constrained Control Allocation for Systems with Redundant Control Effectors
1. INTRODUCTION Control allocation algorithms determine how the controls of a system should be positioned so that they produce some desired effect. Constrained controls have limits on their maximum positions
More informationIntroducing Cyber Resiliency Concerns Into Engineering Education
Introducing Cyber Resiliency Concerns Into Engineering Education Mr. Tom McDermott Georgia Tech Research Institute Mr. Barry Horowitz University of Virginia NDIA 20 th Annual Systems Engineering Conference
More informationSAE IVHM Initiative. PHM Standards Panel PHM Society Conference Minneapolis September 26th David Alexander SAE Aerospace Standards Europe
SAE IVHM Initiative PHM Standards Panel PHM Society Conference Minneapolis September 26th 2012 David Alexander SAE Aerospace Standards Europe SAE IVHM History and Future 1905 SAE formed in 1905 to promote
More informationVerification and Validation of High-Integrity Systems
Verification and Validation of High-Integrity Systems Chethan CU, MathWorks Vaishnavi HR, MathWorks 2015 The MathWorks, Inc. 1 Growing Complexity of Embedded Systems Emergency Braking Body Control Module
More informationSoftware Engineering 2 A practical course in software engineering. Ekkart Kindler
Software Engineering 2 A practical course in software engineering Quality Management Main Message Planning phase Definition phase Design phase Implem. phase Acceptance phase Mainten. phase 3 1. Overview
More informationAerospace Software Engineering
16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated
More informationStatic Analysis of Embedded Systems
Static Analysis of Embedded Systems Xavier RIVAL rival@di.ens.fr Outline Case study Certification of embedded softwares Demo Static Analysisof Embedded Systems p.2/12 Ariane 5 Flight 501 Ariane 5: sattelite
More informationACARE WG 4 Security Overview
ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/
More informationTroubleshooting and Cyber Protection Josh Wheeler
May 4, 2016 Troubleshooting and Cyber Protection Josh Wheeler Network Security Network Security Risks Video Network Security Risks Article Network Security Risks Data stealing or disruption of network
More informationDatabase Integrity Policy for Aeronautical Data
Database Integrity Policy for Aeronautical Data Presented to: By: Date: 2008 Software and Airborne Electronic Hardware Standardization Conference Denver, Colorado Brad Miller, AIR-130 Background Prior
More informationRockwell Collins Evolving FM Methodology
Rockwell Collins Evolving FM Methodology Konrad Slind Trusted Systems Group Rockwell Collins January 25, 2014 Collaborators Rockwell Collins: Andrew Gacek, David Hardin, Darren Cofer, John Backes, Luas
More informationAutomotive Functional Safety
Automotive Functional Safety Complexity, Confidence, Compliance, Certification Farmington, 2018-03-22 23.03.2018 150 years TÜV SÜD 150 years of inspiring trust Inspiring trust since 1866 The year 2016
More informationList of proposed requirements for Avionics domain Annex D1.1.b to deliverable D1.1
Collaborative Large-scale Integrating Project Open Platform for EvolutioNary Certification Of Safety-critical Systems List of proposed requirements for domain to deliverable D1.1 Work Package: WP1: Use
More informationUsing Formal Methods to Enable More Secure Vehicles: DARPA's HACMS Program
Using Formal Methods to Enable More Secure Vehicles: DARPA's HACMS Program Kathleen Fisher Tufts University 16 April 2015 (Slides based on original DARPA HACMS slides) Pervasive Vulnerability to Cyber
More informationRequest for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A)
Washington, DC August 28, 2018 Request for Proposal To develop and teach a Training Course on RTCA Airworthiness Security Documents (DO-326A, DO-355, and DO-356A) 1. RTCA Background RTCA is a private,
More informationA Model-Based Reference Workflow for the Development of Safety-Related Software
A Model-Based Reference Workflow for the Development of Safety-Related Software 2010-01-2338 Published 10/19/2010 Michael Beine dspace GmbH Dirk Fleischer dspace Inc. Copyright 2010 SAE International ABSTRACT
More informationECE 587 Hardware/Software Co-Design Lecture 11 Verification I
ECE 587 Hardware/Software Co-Design Spring 2018 1/23 ECE 587 Hardware/Software Co-Design Lecture 11 Verification I Professor Jia Wang Department of Electrical and Computer Engineering Illinois Institute
More informationExecutive summary. by Michel Bonnet, Maximilien Laforge, and Jean-Baptiste Samuel
998-2095-02-21-14AR0 by Michel Bonnet, Maximilien Laforge, and Jean-Baptiste Samuel Executive summary Improper integration of Intelligent Electronic Devices (IED) into medium / high voltage electrical
More informationFault Propagation and Transformation: A Safety Analysis. Malcolm Wallace
Fault Propagation and Transformation: A Safety Analysis Malcolm Wallace Software Safety Safety is not the same as correctness. Correctness = theorem-proving, model-checking, abstract interpretation, etc.
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationCertification Authorities Software Team (CAST) Position Paper CAST-25
Certification Authorities Software Team (CAST) Position Paper CAST-25 CONSIDERATIONS WHEN USING A QUALIFIABLE DEVELOPMENT ENVIRONMENT (QDE) IN CERTIFICATION PROJECTS COMPLETED SEPTEMBER 2005 (Rev 0) NOTE:
More informationDual Redundant Flight Control System Design for Microminiature UAV Xiao-Lin ZHANG 1,a, Hai-Sheng Li 2,b, Dan-Dan YUAN 2,c
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) Dual Redundant Flight Control System Design for Microminiature UAV Xiao-Lin ZHANG 1,a, Hai-Sheng Li 2,b, Dan-Dan
More informationDEVELOP YOUR TAILORED CYBERSECURITY ROADMAP
ARINC cybersecurity solutions DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP Getting started is as simple as assessing your baseline THE RIGHT CYBERSECURITY SOLUTIONS FOR YOUR UNIQUE NEEDS Comprehensive threat
More informationWhat are Embedded Systems? Lecture 1 Introduction to Embedded Systems & Software
What are Embedded Systems? 1 Lecture 1 Introduction to Embedded Systems & Software Roopa Rangaswami October 9, 2002 Embedded systems are computer systems that monitor, respond to, or control an external
More informationA Path Planning Algorithm to Enable Well-Clear Low Altitude UAS Operation Beyond Visual Line of Sight
A Path Planning Algorithm to Enable Well-Clear Low Altitude UAS Operation Beyond Visual Line of Sight Swee Balachandran National Institute of Aerospace, Hampton, VA Anthony Narkawicz, César Muñoz, María
More informationSimulation of sensor failure accommodation in flight control system of transport aircraft: a modular approach
ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 11 (2015) No. 1, pp. 55-68 Simulation of sensor failure accommodation in flight control system of transport aircraft: a modular
More informationSafety & Cybersecurity of embedded softwares in product and process
Safety & Cybersecurity of embedded softwares in product and process PROCESS SAFETY congress May 30, 2018 Franck SADMI- Project Manager Safety & Cybersecurity Technical Centre Europe No Safety without CYBERSECURITY
More informationReaching for the sky with certified and safe solutions for the aerospace market
www.tttech.com/aerospace Reaching for the sky with certified and safe solutions for the aerospace market More about our certified and safe products inside Advancing safe technologies, improving human lives
More informationIndustrial Verification Using the KIND Model Checker Lucas Wagner Jedidiah McClurg
Industrial Verification Using the KIND Model Checker Lucas Wagner Jedidiah McClurg {lgwagner,jrmcclur}@rockwellcollins.com Software Complexity is Becoming Overwhelming Advancements in computing technology
More informationEmbedded Fault Detection for Low-Cost, Safety-Critical Systems (NSF CPS )
Embedded Fault Detection for Low-Cost, Safety-Critical Systems (NSF CPS-0931931) Gary Balas Peter Seiler Mats Per Erik Heimdahl Jaideep Srivastava Antonia Zhai Aerospace Engineering and Mechanics/ Computer
More informationComplexity-Reducing Design Patterns for Cyber-Physical Systems. DARPA META Project. AADL Standards Meeting January 2011 Steven P.
Complexity-Reducing Design Patterns for Cyber-Physical Systems DARPA META Project AADL Standards Meeting 24-27 January 2011 Steven P. Miller Delivered to the Government in Accordance with Contract FA8650-10-C-7081
More informationEfficient Development of Airborne Software with SCADE Suite
Efficient Development of Airborne Software with SCADE Suite Esterel Technologies 2003 Abstract This white paper addresses the issue of cost and productivity improvement in the development of safety-critical
More informationMedical Device Cybersecurity: FDA Perspective
Medical Device Cybersecurity: FDA Perspective Suzanne B. Schwartz MD, MBA Associate Director for Science and Strategic Partnerships Office of the Center Director (OCD) Center for Devices and Radiological
More informationTSW Reliability and Fault Tolerance
TSW Reliability and Fault Tolerance Alexandre David 1.2.05 Credits: some slides by Alan Burns & Andy Wellings. Aims Understand the factors which affect the reliability of a system. Introduce how software
More informationCyber Security Requirements for Supply Chain. June 17, 2015
Cyber Security Requirements for Supply Chain June 17, 2015 Topics Cyber Threat Legislation and Regulation Nuts and Bolts of NEI 08-09 Nuclear Procurement EPRI Methodology for Procurement Something to think
More informationPSEG Nuclear Cyber Security Supply Chain Guidance
PSEG Nuclear Cyber Security Supply Chain Guidance Developed by: Jim Shank PSEG Site IT Manager & Cyber Security Program Manager Presented at Rapid 2018 by: Bob Tilton- Director Procurement PSEG Power Goals
More informationAQMS AUDITOR AUTHENTICATION BODY AQMS AUDITOR APPLICATION GUIDE
AQMS OR AUTHENTICATION BODY AQMS OR APPLICATION GUIDE AQMS OR APPLICATION GUIDE PROBITAS AUTHENTICATION 6 1 2014 TABLE OF CONTENTS 1 Introduction... 2 2 Certification Schemes... 3 3 Certification Grades...
More informationAutomatización de Métodos y Procesos para Mejorar la Calidad del Diseño
Automatización de Métodos y Procesos para Mejorar la Calidad del Diseño Luis López 2015 The MathWorks, Inc. 1 Growing Complexity of Embedded Systems Emergency Braking Body Control Module Voice Recognition
More informationStandardkonforme Absicherung mit Model-Based Design
Standardkonforme Absicherung mit Model-Based Design MATLAB EXPO 2014 Dr. Marc Segelken Principal Application Engineer 2014 The MathWorks, Inc. 1 Safety Standards for Embedded Systems IEC 61508 ISO 26262
More informationMONIKA HEINER.
LESSON 1 testing, intro 1 / 25 SOFTWARE TESTING - STATE OF THE ART, METHODS, AND LIMITATIONS MONIKA HEINER monika.heiner@b-tu.de http://www.informatik.tu-cottbus.de PRELIMINARIES testing, intro 2 / 25
More informationModel-Based Design for Safety Critical Automotive Applications
Model-Based Design for Safety Critical Automotive Applications Mirko Conrad Senior Team Lead Simulink Certification and Standards 2008 The MathWorks, Inc. Model-Based Design for Safety-Critical Applications
More informationIn this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs.
In this Lecture you will Learn: Testing in Software Development Process Examine the verification and validation activities in software development process stage by stage Introduce some basic concepts of
More informationNetwork and Information Security Directive
Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationSimulink 모델과 C/C++ 코드에대한매스웍스의정형검증툴소개 The MathWorks, Inc. 1
Simulink 모델과 C/C++ 코드에대한매스웍스의정형검증툴소개 2012 The MathWorks, Inc. 1 Agenda Formal Verification Key concept Applications Verification of designs against (functional) requirements Design error detection Test
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationC07: Testing and JUnit
CISC 3120 C07: Testing and JUnit Hui Chen Department of Computer & Information Science CUNY Brooklyn College 9/19/2017 CUNY Brooklyn College 1 Outline Recap and issues Grades and feedback Assignments &
More informationCybersecurity and Commercial Aviation
Cybersecurity and Commercial Aviation Pascal ANDREI Chief Security Officer Airbus Group Jim Vasatka Director, Aviation Security Boeing Commercial Airplanes Agenda Aviation Cybersecurity External Drivers
More informationTHE AUTOMATED TEST FRAMEWORK
2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More informationHow to reduce the integration time Issues and Potential Solutions. Christophe GINESTET
How to reduce the integration time Issues and Potential Solutions Christophe GINESTET August 29th, 2013 Summary SYSTeam Overview The benefits of virtual integration Gateway between virtual and real integration
More informationICB Industry Consultation Body
ICB Industry Consultation Body POSITION PAPER Regulatory Response to ATM Cyber-Security Increasing reliance on inter-connected ATM systems, services and technologies increases the risk of cyber-attacks.
More information2 ACCREDITED AUDITORS
2 ACCREDITED AUDITORS 2.1 Auditor Accreditation 2.1.1 IBAC will issue auditor accreditation and appropriate credentials to individuals that apply for such accreditation and who meet the requirements established
More informationCybersecurity & Risks Analysis
Working Together to Build Confidence Cybersecurity & Risks Analysis Djenana Campara Chief Executive Officer Member, Object Management Group Board of Directors Co-Chair, System Assurance Task Force Cyber
More informationPresented by Greg Pollari (Rockwell Collins) and Nigel Shaw (Eurostep)
System Architecture Virtual Integration (SAVI) Project : Intermodel Error Checking and Consistency Review and Demonstration An Aerospace Vehicle Systems Institute Project (AVSI) Presented by Greg Pollari
More informationUsing Code Coverage to Improve the Reliability of Embedded Software. Whitepaper V
Using Code Coverage to Improve the Reliability of Embedded Software Whitepaper V2.0 2017-12 Table of Contents 1 Introduction... 3 2 Levels of Code Coverage... 3 2.1 Statement Coverage... 3 2.2 Statement
More informationColumbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology
COURSE: AMT 2109 Airframe Inspection Columbus State Community College Engineering and Transportation Technologies Aviation Maintenance Technology CREDITS: 6 CLASS HOURS PER WEEK: 27 PREREQUISITES: AMT
More informationFAA Order Simple And Complex Electronic Hardware Approval Guidance. Federal Aviation Administration
FAA Order 8110.105 Simple And Complex Electronic Hardware Presented to: FAA Software and Airborne Electronic Hardware Conference, Denver By: Gregg Bartley FAA, ANM-111/AIR-120 Date: Why is this Order necessary?
More informationAutomated Requirements-Based Testing
Automated Requirements-Based Testing Tuesday, October 7 th 2008 2008 The MathWorks, Inc. Dr. Marc Segelken Senior Application Engineer Overview Purposes of Testing Test Case Generation Structural Testing
More informationIntroduction to ISO/IEC 27001:2005
Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating
More informationIAEA Division of Nuclear Security
IAEA Division of Nuclear Security Computer Security Activities Overview Donald Dudenhoeffer 25 May 2017 Computer and Information Security The Division of Nuclear Security (NSNS) seeks to support Member
More informationModel-Based Safety Approach for Early Validation of Integrated and Modular Avionics Architectures
Model-Based Safety Approach for Early Validation of Integrated and Modular Avionics Architectures Marion Morel THALES AVIONICS S.A.S., 31036 Toulouse, France marion.morel@fr.thalesgroup.com Abstract. Increasing
More informationImplementation and Verification Daniel MARTINS Application Engineer MathWorks
Implementation and Verification Daniel MARTINS Application Engineer MathWorks Daniel.Martins@mathworks.fr 2014 The MathWorks, Inc. 1 Agenda Benefits of Model-Based Design Verification at Model level Code
More informationHITRUST CSF: One Framework
HITRUST CSF: One Framework Leveraging the HITRUST CSF to Support ISO, HIPAA, & NIST Implementation and Compliance, and SSAE 16 SOC Reporting Dr. Bryan Cline, CISSP-ISSEP, CISM, CISA, CCSFP, HCISPP Senior
More informationBUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS
BUILDING FUNCTIONAL SAFETY PRODUCTS WITH WIND RIVER VXWORKS RTOS Alex Wilson Director, Market Development 2017 WIND RIVER. ALL RIGHTS RESERVED. For over 30 years, Wind River has helped the world's technology
More informationJay Abraham 1 MathWorks, Natick, MA, 01760
Jay Abraham 1 MathWorks, Natick, MA, 01760 Stringent performance requirements and shorter development cycles are driving the use of modeling and simulation. Model-Based Design core of this development
More information