Paper
8 April 2024 Integrating security factors into fault tree analysis: a safety and security co-analysis approach for AADL models
Weiwei Zhou, Qinjiang Sun, Qingsheng Meng, Zhaoming Miao, Wenhai Wang
Author Affiliations +
Proceedings Volume 13090, International Conference on Computer Application and Information Security (ICCAIS 2023); 130900X (2024) https://doi.org/10.1117/12.3025564
Event: International Conference on Computer Application and Information Security (ICCAIS 2023), 2023, Wuhan, China
Abstract
Safety and security analyses are crucial for developing safety-critical cyber-physical systems as they can identify potential design defects and vulnerabilities. The Architecture Analysis and Design Language (AADL) is a widely used modeling language for model-based systems engineering, which has well-defined semantics that facilitate safety and security analysis. However, most existing AADL-based analysis methods focus on the safety or security aspect, ignoring the impact of security factors on safety and vice versa. This paper presents a safety and security co-analysis approach for AADL models, namely, fault-attack tree analysis. The proposed method incorporates common security factors that threaten the integrity and availability of the system into fault tree analysis, allowing for comprehensive identification of system risks. The applicability and effectiveness of the proposed method are evaluated through two case studies.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Weiwei Zhou, Qinjiang Sun, Qingsheng Meng, Zhaoming Miao, and Wenhai Wang "Integrating security factors into fault tree analysis: a safety and security co-analysis approach for AADL models", Proc. SPIE 13090, International Conference on Computer Application and Information Security (ICCAIS 2023), 130900X (8 April 2024); https://doi.org/10.1117/12.3025564
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Safety

Information security

Sensors

Error analysis

Computer security

Control systems

Systems modeling

Back to Top