Computer safety, reliability, and security : 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings /: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings. (2016)
- Record Type:
- Book
- Title:
- Computer safety, reliability, and security : 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings /: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings. (2016)
- Main Title:
- Computer safety, reliability, and security : 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings
- Further Information:
- Note: Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.).
- Editors:
- Skavhaug, Amund
Guiochet, Jérémie
Bitsch, Friedemann - Other Names:
- SAFECOMP (Conference), 35th
- Contents:
- Intro; Preface; Organization; Contents; Fault Injection; FISSC: A Fault Injection and Simulation Secure Collection; 1 Introduction; 1.1 Security Assessment Against Fault Injection Attacks; 1.2 The Need for a Code Collection; 2 The VerifyPIN Example; 3 The FISSC Framework; 3.1 Contents and File Organization; 3.2 The VerifyPIN Suite; 4 Comparing Tools; 4.1 Case Study; 4.2 Interpretation; 5 Conclusion; References; FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools; 1 Introduction; 2 Background; 2.1 LLFI; 2.2 Aspect-Oriented Programming (AOP); 3 Related Work 4 System Overview4.1 FIDL Structure; 4.2 Aspect Design; 5 Evaluation Metrics; 6 Evaluation; 6.1 Experimental Setup; 6.2 Experimental Results; 7 Summary; References; Safety Assurance; Using Process Models in System Assurance; 1 Introduction and Motivation; 2 Process Models; 3 Confidence Argument Patterns; 4 Instantiating Argument Patterns; 5 Conclusions; References; The Indispensable Role of Rationale in Safety Standards; Abstract; 1 Introduction; 2 Current Standards; 2.1 Development of Standards; 2.2 Using Standards; 2.3 Maintenance of Standards; 3 Rationalized Standards; 3.1 The Concept 3.2 Defining Reasoning3.3 Defining Guidance; 4 Analysis of a Safety Standard; 4.1 Example Element; 4.2 Analysis of Example Element; 4.3 Rationalized Standard Fragment; 5 Conclusion; Acknowledgment; References; Composition of Safety Argument Patterns; 1 Introduction; 2 Illustrative Example; 3 Pattern Composition; 3.1Intro; Preface; Organization; Contents; Fault Injection; FISSC: A Fault Injection and Simulation Secure Collection; 1 Introduction; 1.1 Security Assessment Against Fault Injection Attacks; 1.2 The Need for a Code Collection; 2 The VerifyPIN Example; 3 The FISSC Framework; 3.1 Contents and File Organization; 3.2 The VerifyPIN Suite; 4 Comparing Tools; 4.1 Case Study; 4.2 Interpretation; 5 Conclusion; References; FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools; 1 Introduction; 2 Background; 2.1 LLFI; 2.2 Aspect-Oriented Programming (AOP); 3 Related Work 4 System Overview4.1 FIDL Structure; 4.2 Aspect Design; 5 Evaluation Metrics; 6 Evaluation; 6.1 Experimental Setup; 6.2 Experimental Results; 7 Summary; References; Safety Assurance; Using Process Models in System Assurance; 1 Introduction and Motivation; 2 Process Models; 3 Confidence Argument Patterns; 4 Instantiating Argument Patterns; 5 Conclusions; References; The Indispensable Role of Rationale in Safety Standards; Abstract; 1 Introduction; 2 Current Standards; 2.1 Development of Standards; 2.2 Using Standards; 2.3 Maintenance of Standards; 3 Rationalized Standards; 3.1 The Concept 3.2 Defining Reasoning3.3 Defining Guidance; 4 Analysis of a Safety Standard; 4.1 Example Element; 4.2 Analysis of Example Element; 4.3 Rationalized Standard Fragment; 5 Conclusion; Acknowledgment; References; Composition of Safety Argument Patterns; 1 Introduction; 2 Illustrative Example; 3 Pattern Composition; 3.1 Composition; 3.2 Correctness; 3.3 General Composition; 4 Application; 5 Related Work and Conclusions; References; Formal Verification; Formal Analysis of Security Properties on the OPC-UA SCADA Protocol; 1 Introduction; 2 OPC-UA OpenSecureChannel; 2.1 Modeling; 2.2 Results 2.3 Fixed Version3 OPC-UA CreateSession; 3.1 Modeling; 3.2 Results; 4 Conclusion; References; A Dedicated Algorithm for Verification of Interlocking Systems; 1 Introduction; 2 Interlocking Principles; 3 Verification Algorithm; 4 Experiments; 5 Conclusion; References; Catalogue of System and Software Properties; 1 Introduction; 2 Scope and Known Limitations; 3 Requirements Taxonomy and Design Attributes; 4 The CSSP; 4.1 Formalization of the CSSP; 4.2 Coverage of the Design Attributes; 4.3 COMPASS Tool Support; 4.4 Example; 5 Conclusions and Future Work; References A High-Assurance, High-Performance Hardware-Based Cross-Domain System1 Introduction; 1.1 Guardol for Cross-Domain Systems; 1.2 Guardol and Hardware-Based Guards; 2 The Guardol Toolchain; 2.1 Guardol IDE; 2.2 Verification; 3 Adding Regular Expressions to Guardol; 3.1 Proof Translation; 3.2 Code Translation; 4 Guardol VHDL Code Generation; 5 FPGA-Based Guard Architecture and Implementation; 6 Results; 7 Related Work; 8 Conclusion; References; Automotive; Using STPA in an ISO 26262 Compliant Process; 1 Introduction; 2 Preliminaries; 2.1 Systems Theoretic Process Analysis (STPA) … (more)
- Publisher Details:
- Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer systems -- Reliability -- Congresses
Computer security
Computer systems -- Reliability
Computers -- Programming Languages -- General
Computers -- Software Development & Engineering -- General
Computers -- Security -- General
Computers -- Data Processing
Computers -- Hardware -- General
Programming & scripting languages: general
Software Engineering
Computer security
Information technology: general issues
Computer networking & communications
Logic design
Software engineering
Computer security
Computer network architectures
Computers -- Programming -- General
Computer programming / software development
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319454771
3319454773 - Related ISBNs:
- 9783319454764
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed September 15, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.356732
- Ingest File:
- 01_317.xml