Skip to main content
  • Conference proceedings
  • © 2016

Computer Safety, Reliability, and Security

35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9922)

Part of the book sub series: Programming and Software Engineering (LNPSE)

Conference series link(s): SAFECOMP: International Conference on Computer Safety, Reliability, and Security

Conference proceedings info: SAFECOMP 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

    Pages I-XV
  2. Fault Injection

    1. Front Matter

      Pages 1-1
    2. FISSC: A Fault Injection and Simulation Secure Collection

      • Louis Dureuil, Guillaume Petiot, Marie-Laure Potet, Thanh-Ha Le, Aude Crohen, Philippe de Choudens
      Pages 3-11
    3. FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools

      • Maryam Raiyat Aliabadi, Karthik Pattabiraman
      Pages 12-23
  3. Safety Assurance

    1. Front Matter

      Pages 25-25
    2. Using Process Models in System Assurance

      • Richard Hawkins, Thomas Richardson, Tim Kelly
      Pages 27-38
    3. The Indispensable Role of Rationale in Safety Standards

      • John C. Knight, Jonathan Rowanhill
      Pages 39-50
    4. Composition of Safety Argument Patterns

      • Ewen Denney, Ganesh Pai
      Pages 51-63
  4. Formal Verification

    1. Front Matter

      Pages 65-65
    2. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol

      • Maxime Puys, Marie-Laure Potet, Pascal Lafourcade
      Pages 67-75
    3. A Dedicated Algorithm for Verification of Interlocking Systems

      • Quentin Cappart, Pierre Schaus
      Pages 76-87
    4. Catalogue of System and Software Properties

      • Victor Bos, Harold Bruintjes, Stefano Tonetta
      Pages 88-101
    5. A High-Assurance, High-Performance Hardware-Based Cross-Domain System

      • David Hardin, Konrad Slind, Mark Bortz, James Potts, Scott Owens
      Pages 102-113
  5. Automotive

    1. Front Matter

      Pages 115-115
    2. Using STPA in an ISO 26262 Compliant Process

      • Archana Mallya, Vera Pantelic, Morayo Adedjouma, Mark Lawford, Alan Wassyng
      Pages 117-129
    3. A Review of Threat Analysis and Risk Assessment Methods in the Automotive Context

      • Georg Macher, Eric Armengaud, Eugen Brenner, Christian Kreiner
      Pages 130-141
  6. Anomaly Detection and Resilience

    1. Front Matter

      Pages 143-143
    2. Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures

      • Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
      Pages 145-158
    3. Towards Modelling Adaptive Fault Tolerance for Resilient Computing Analysis

      • William Excoffon, Jean-Charles Fabre, Michael Lauer
      Pages 159-171
    4. Automatic Invariant Selection for Online Anomaly Detection

      • Leonardo Aniello, Claudio Ciccotelli, Marcello Cinque, Flavio Frattini, Leonardo Querzoni, Stefano Russo
      Pages 172-183

Other Volumes

  1. Computer Safety, Reliability, and Security

About this book

This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis.

Keywords

  • cloud computing
  • cybersecurity
  • formal verification
  • human-robot collaboration
  • safety analysis
  • anomaly detection
  • application data
  • automotive software
  • context aware
  • dependability
  • fraud detection
  • malware
  • patterns
  • quality
  • risk asessment
  • security analysis
  • service oriented architecture
  • SVM
  • system safety
  • verification

Editors and Affiliations

  • Norwegian University of Science and Technology , Trondheim, Norway

    Amund Skavhaug

  • University of Toulouse , Toulouse, France

    Jérémie Guiochet

  • Thales Transportation Systems GmbH , Ditzingen, Germany

    Friedemann Bitsch

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access