Skip to main content

A Comprehensive Safety, Security, and Serviceability Assessment Method

  • Conference paper
  • First Online:
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9337))

Included in the following conference series:

Abstract

Dependability is a superordinate concept regrouping different system attributes such as reliability, safety, security, or availability and non-functional requirements for modern embedded systems. These different attributes, however, might lead to different targets. Furthermore, the non-unified methods to manage these different attributes might lead to inconsistencies, which are identified in late development phases. The aim of the paper is to present a combined approach for system dependability analysis to be applied in early development phases. This approach regroups state-of-the-art methods for safety, security, and reliability analysis, thus enabling consistent dependability targets identification across the three attributes. This, in turn, is a pre-requisite for consistent dependability engineering along the development lifecycle. In the second part of the document the experiences of this combined dependability system analysis method are discussed based on an automotive application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Military Standard Procedures for Performing a Failure Mode, Effects and Criticality Analysis, November 1980

    Google Scholar 

  2. Military Standard Reliabilty Program for Systems and Equipment Development and Production, September 1980

    Google Scholar 

  3. Military Handbook Reliability Prediction of Electronic Equipment, December 1991

    Google Scholar 

  4. Department of Defense Handbook for Reliability Test Methods, Plans, and Environments for Engineering, Development Qualification, and Production, April 1996

    Google Scholar 

  5. Military Handbook Electronic Reliability Design Handbook, October 1998

    Google Scholar 

  6. Railway Applications: The specification and demonstration of reliability, availability, maintainability and safety (RAMS), March 2000

    Google Scholar 

  7. Avizienis, A., Laprie, J.-C., Randell, B.: Dependability and its threats - a taxonomy. In: Jacquart, R. (ed.) IFIP Congress Topical Sessions, pp. 91–120. Kluwer, Dordrecht (2004)

    Google Scholar 

  8. Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable and Secure Comput. 1(1), 11–33 (2004)

    Article  Google Scholar 

  9. European Organization for Civil Aviation Equipment (EUROCAE WG-72) and Radio Technical Commission for Aeronautics (RTCA SC-216): Airworthiness security process specification, ED-202 (2010)

    Google Scholar 

  10. Gashi, I., Povyakalo, A., Strigini, L., Matschnig, M., Hinterstoisser, T., Fischer, B.: Diversity for safety and security in embedded systems. In: International Conference on Dependable Systems and Networks, 26 June 2014

    Google Scholar 

  11. International Electrotechnical Commission: Reliability data handbook - universal model for reliability prediction of electronics components, PCBs and equipment. Technical report IEC TR 62380, International Electrotechnical Commission (2004)

    Google Scholar 

  12. International Organization for Standardization: ISO 13053 quantitative methods in process improvment - Six Sigma (2011)

    Google Scholar 

  13. ISO - International Organization for Standardization: IEC 61508 functional safety of electrical/electronic/programmable electronic safety-related systems

    Google Scholar 

  14. ISO - International Organization for Standardization: IEC 60812 analysis techniques for system reliability - procedure for failure mode and effects analysis (FMEA) (2006)

    Google Scholar 

  15. ISO - International Organization for Standardization: IEC 61025 fault tree analysis (FTA), December 2006

    Google Scholar 

  16. ISO - International Organization for Standardization: ISO 26262 road vehicles functional safety, Part 1–10 (2011)

    Google Scholar 

  17. van Tilborg, H.C.A., Jajodia, S. (eds.): Encyclopedia of Cryptography and Security. ISO/IEC 15408, 2nd edn. Springer, US (2011). doi:10.1007/978-1-4419-5906-5_1338

  18. Macher, G., Hoeller, A., Sporer, H., Armengaud, E., Kreiner, C.: Service deterioration analysis (SDA): an early development phase reliability analysis method. In: Review at 45th Annual International Conference on Dependable Systems and Networks (DSN) - RADIANCE Workshop (2015)

    Google Scholar 

  19. Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: SAHARA: a security-aware hazard and risk analysis method. In: Design, Automation Test in Europe Conference Exhibition (DATE 2015), pp. 621–624, March 2015

    Google Scholar 

  20. Microsoft Corporation: The stride threat model (2005)

    Google Scholar 

  21. Petrissans, A., Krawczyk, S., Veronesi, L., Cattaneo, G., Feeney, N., Meunier, C.: Design of future embedded systems toward system of systems - trends and challenges. European Commission, May 2012

    Google Scholar 

  22. Roth, M., Liggesmeyer, P.: Modeling and analysis of safety-critical cyber physical systems using state/event fault trees. In: SAFECOMP 2013 - Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)

    Google Scholar 

  23. SAE International: Guidelines and Methods for Conductiong the Safety Assessment Process on Civil Airborne Systems and Equipment (1996)

    Google Scholar 

  24. SAE International: Guidelines for Development of Civil Aircraft and Systems (2010)

    Google Scholar 

  25. Schmidt, K., Troeger, P., Kroll, H., Buenger, T.: Adapted development process for security in networked automotive systems. In: SAE 2014 World Congress and Exhibition Proceedings, (SAE 2014–01-0334), pp. 516–526 (2014)

    Google Scholar 

  26. Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode and effect analysis (FMEA). In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 310–325. Springer, Heidelberg (2014)

    Google Scholar 

  27. Scuro, G.: Automotive industry: Innovation driven by electronics (2012). http://embedded-computing.com/articles/automotive-industry-innovation-driven-electronics/

  28. Special Committee 205 of RTCA: DO-178C Software Considerations in Airborne Systems and Equipment Certification (2011)

    Google Scholar 

  29. Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: SAFECOMP 2013 - Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)

    Google Scholar 

  30. Tennant, G.: Six Sigma SPC and TQM in Manufacturing and Services. Gower Publishing Ltd, Aldershot (2001)

    Google Scholar 

  31. The Common Criteria Recognition Agreement Members: Common Criteria for Information Technology Security Evaluation (2014). http://www.commoncriteriaportal.org/

  32. Ward, D., Ibara, I., Ruddle, A.: Threat analysis and risk assessment in automotive cyber security. In: SAE 2013 World Congress and Exhibition Proceedings, pp. 507–513 (2013)

    Google Scholar 

Download references

Acknowledgments

This work is partially supported by the INCOBAT and the MEMCONS projects.

The research leading to these results has received funding from the European Unions Seventh Framework Programme (FP7/2007-2013) under grant agreement n 608988 and financial support of the “COMET K2 - Competence Centers for Excellent Technologies Programme” of the Austrian Federal Ministry for Transport, Innovation and Technology (BMVIT), the Austrian Federal Ministry of Economy, Family and Youth (BMWFJ), the Austrian Research Promotion Agency (FFG), the Province of Styria, and the Styrian Business Promotion Agency (SFG).

We are grateful for the contribution of the SOQRATES Safety AK experts and the expertise gained in SafEUr professional trainings.

Furthermore, we would like to express our thanks to our supporting project partners, AVL List GmbH, Virtual Vehicle Research Center, and Graz University of Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Georg Macher .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Macher, G., Höller, A., Sporer, H., Armengaud, E., Kreiner, C. (2015). A Comprehensive Safety, Security, and Serviceability Assessment Method. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9337. Springer, Cham. https://doi.org/10.1007/978-3-319-24255-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24255-2_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24254-5

  • Online ISBN: 978-3-319-24255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics