{"title":"对安全关键系统的安全分析的正式方法","authors":"Inna Vistbakka, E. Troubitsyna","doi":"10.1109/EDCC.2018.00040","DOIUrl":null,"url":null,"abstract":"Since safety-critical control systems become increasingly interconnected, there is a clear need for the techniques that enable an integrated analysis of safety and security requirements. In this paper, we propose an integrated approach to systematically deriving and formalising safety and security requirements. To facilitate requirements elicitation, we propose to adapt and integrate traditional safety and security analysis techniques. To formally specify and verify the requirements, we rely on Event-B framework. By relying on refinement and proofs, the framework allows us to specify and verify system behaviour in presence of both accidental faults and security attacks and analyse mutual interdependencies between safety and security requirements.","PeriodicalId":129399,"journal":{"name":"2018 14th European Dependable Computing Conference (EDCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Towards a Formal Approach to Analysing Security of Safety-Critical Systems\",\"authors\":\"Inna Vistbakka, E. Troubitsyna\",\"doi\":\"10.1109/EDCC.2018.00040\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since safety-critical control systems become increasingly interconnected, there is a clear need for the techniques that enable an integrated analysis of safety and security requirements. In this paper, we propose an integrated approach to systematically deriving and formalising safety and security requirements. To facilitate requirements elicitation, we propose to adapt and integrate traditional safety and security analysis techniques. To formally specify and verify the requirements, we rely on Event-B framework. By relying on refinement and proofs, the framework allows us to specify and verify system behaviour in presence of both accidental faults and security attacks and analyse mutual interdependencies between safety and security requirements.\",\"PeriodicalId\":129399,\"journal\":{\"name\":\"2018 14th European Dependable Computing Conference (EDCC)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 14th European Dependable Computing Conference (EDCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDCC.2018.00040\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 14th European Dependable Computing Conference (EDCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDCC.2018.00040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards a Formal Approach to Analysing Security of Safety-Critical Systems
Since safety-critical control systems become increasingly interconnected, there is a clear need for the techniques that enable an integrated analysis of safety and security requirements. In this paper, we propose an integrated approach to systematically deriving and formalising safety and security requirements. To facilitate requirements elicitation, we propose to adapt and integrate traditional safety and security analysis techniques. To formally specify and verify the requirements, we rely on Event-B framework. By relying on refinement and proofs, the framework allows us to specify and verify system behaviour in presence of both accidental faults and security attacks and analyse mutual interdependencies between safety and security requirements.