Abstract
Dependability is a superordinate concept regrouping different system attributes such as reliability, safety, security, or availability and non-functional requirements for modern embedded systems. These different attributes, however, might lead to different targets. Furthermore, the non-unified methods to manage these different attributes might lead to inconsistencies, which are identified in late development phases. The aim of the paper is to present a combined approach for system dependability analysis to be applied in early development phases. This approach regroups state-of-the-art methods for safety, security, and reliability analysis, thus enabling consistent dependability targets identification across the three attributes. This, in turn, is a pre-requisite for consistent dependability engineering along the development lifecycle. In the second part of the document the experiences of this combined dependability system analysis method are discussed based on an automotive application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Military Standard Procedures for Performing a Failure Mode, Effects and Criticality Analysis, November 1980
Military Standard Reliabilty Program for Systems and Equipment Development and Production, September 1980
Military Handbook Reliability Prediction of Electronic Equipment, December 1991
Department of Defense Handbook for Reliability Test Methods, Plans, and Environments for Engineering, Development Qualification, and Production, April 1996
Military Handbook Electronic Reliability Design Handbook, October 1998
Railway Applications: The specification and demonstration of reliability, availability, maintainability and safety (RAMS), March 2000
Avizienis, A., Laprie, J.-C., Randell, B.: Dependability and its threats - a taxonomy. In: Jacquart, R. (ed.) IFIP Congress Topical Sessions, pp. 91–120. Kluwer, Dordrecht (2004)
Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable and Secure Comput. 1(1), 11–33 (2004)
European Organization for Civil Aviation Equipment (EUROCAE WG-72) and Radio Technical Commission for Aeronautics (RTCA SC-216): Airworthiness security process specification, ED-202 (2010)
Gashi, I., Povyakalo, A., Strigini, L., Matschnig, M., Hinterstoisser, T., Fischer, B.: Diversity for safety and security in embedded systems. In: International Conference on Dependable Systems and Networks, 26 June 2014
International Electrotechnical Commission: Reliability data handbook - universal model for reliability prediction of electronics components, PCBs and equipment. Technical report IEC TR 62380, International Electrotechnical Commission (2004)
International Organization for Standardization: ISO 13053 quantitative methods in process improvment - Six Sigma (2011)
ISO - International Organization for Standardization: IEC 61508 functional safety of electrical/electronic/programmable electronic safety-related systems
ISO - International Organization for Standardization: IEC 60812 analysis techniques for system reliability - procedure for failure mode and effects analysis (FMEA) (2006)
ISO - International Organization for Standardization: IEC 61025 fault tree analysis (FTA), December 2006
ISO - International Organization for Standardization: ISO 26262 road vehicles functional safety, Part 1–10 (2011)
van Tilborg, H.C.A., Jajodia, S. (eds.): Encyclopedia of Cryptography and Security. ISO/IEC 15408, 2nd edn. Springer, US (2011). doi:10.1007/978-1-4419-5906-5_1338
Macher, G., Hoeller, A., Sporer, H., Armengaud, E., Kreiner, C.: Service deterioration analysis (SDA): an early development phase reliability analysis method. In: Review at 45th Annual International Conference on Dependable Systems and Networks (DSN) - RADIANCE Workshop (2015)
Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: SAHARA: a security-aware hazard and risk analysis method. In: Design, Automation Test in Europe Conference Exhibition (DATE 2015), pp. 621–624, March 2015
Microsoft Corporation: The stride threat model (2005)
Petrissans, A., Krawczyk, S., Veronesi, L., Cattaneo, G., Feeney, N., Meunier, C.: Design of future embedded systems toward system of systems - trends and challenges. European Commission, May 2012
Roth, M., Liggesmeyer, P.: Modeling and analysis of safety-critical cyber physical systems using state/event fault trees. In: SAFECOMP 2013 - Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)
SAE International: Guidelines and Methods for Conductiong the Safety Assessment Process on Civil Airborne Systems and Equipment (1996)
SAE International: Guidelines for Development of Civil Aircraft and Systems (2010)
Schmidt, K., Troeger, P., Kroll, H., Buenger, T.: Adapted development process for security in networked automotive systems. In: SAE 2014 World Congress and Exhibition Proceedings, (SAE 2014–01-0334), pp. 516–526 (2014)
Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode and effect analysis (FMEA). In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 310–325. Springer, Heidelberg (2014)
Scuro, G.: Automotive industry: Innovation driven by electronics (2012). http://embedded-computing.com/articles/automotive-industry-innovation-driven-electronics/
Special Committee 205 of RTCA: DO-178C Software Considerations in Airborne Systems and Equipment Certification (2011)
Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: SAFECOMP 2013 - Workshop DECS (ERCIM/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)
Tennant, G.: Six Sigma SPC and TQM in Manufacturing and Services. Gower Publishing Ltd, Aldershot (2001)
The Common Criteria Recognition Agreement Members: Common Criteria for Information Technology Security Evaluation (2014). http://www.commoncriteriaportal.org/
Ward, D., Ibara, I., Ruddle, A.: Threat analysis and risk assessment in automotive cyber security. In: SAE 2013 World Congress and Exhibition Proceedings, pp. 507–513 (2013)
Acknowledgments
This work is partially supported by the INCOBAT and the MEMCONS projects.
The research leading to these results has received funding from the European Unions Seventh Framework Programme (FP7/2007-2013) under grant agreement n 608988 and financial support of the “COMET K2 - Competence Centers for Excellent Technologies Programme” of the Austrian Federal Ministry for Transport, Innovation and Technology (BMVIT), the Austrian Federal Ministry of Economy, Family and Youth (BMWFJ), the Austrian Research Promotion Agency (FFG), the Province of Styria, and the Styrian Business Promotion Agency (SFG).
We are grateful for the contribution of the SOQRATES Safety AK experts and the expertise gained in SafEUr professional trainings.
Furthermore, we would like to express our thanks to our supporting project partners, AVL List GmbH, Virtual Vehicle Research Center, and Graz University of Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Macher, G., Höller, A., Sporer, H., Armengaud, E., Kreiner, C. (2015). A Comprehensive Safety, Security, and Serviceability Assessment Method. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9337. Springer, Cham. https://doi.org/10.1007/978-3-319-24255-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-24255-2_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24254-5
Online ISBN: 978-3-319-24255-2
eBook Packages: Computer ScienceComputer Science (R0)