-
Solutions
-
Researching, developing, and transitioning advances in separation architectures, model-based system engineering, and mathematical analysis.
- Safety & Security AnalysisAnalyze system models for gaps in safety and security compliance, and generate documentation to support certification requirements.
- Real-time Operating System SchedulingProvide end-to-end, system-wide schedulabilty analysis, and generate real-time operating system (RTOS) schedules and configuration information
- Embedded System Tradespace AnalysisSupport least-commitment design strategies by continuously evaluating embedded system design alternatives against diverse requirements.
- Isolation TechnologyEnable virtual security enclaves within a single physical server
-
-
Initiatives
-
What’s next: Innovative research examining hard problems of national importance.
- Weird MachinesAnticipating vulnerabilities related to computer systems that employ artificial intelligence
- Education InnovationDelivering game-based education to adolescents and young adults
- Automated Behavior AnalysisDetecting vulnerabilities in embedded systems using timed automata (VOLTA)
- Code GenerationAutomating the integration of cyber-resilient components in complex systems
-
- About Us
Composition of Fault Forests
Composition of Fault Forests
Abstract
Safety analysis is used to ensure that critical systems operate within some level of safety when failures are present. As critical systems become more dependent on software components, it becomes more challenging for safety analysts to comprehensively enumerate all possible failure causation paths. Any automated analyses should be sound to sufficiently prove that the system operates within the designated level of safety. This paper presents a compositional approach to the generation of fault forests (sets of fault trees) and minimal cut sets. We use a behavioral fault model to explore how errors may lead to a failure condition. The analysis is performed per layer of the architecture and the results are automatically composed. A complete formalization is given. We implement this by leveraging minimal inductive validity cores produced by an infinite state model checker. This research provides a sound alternative to a monolithic framework. This enables safety analysts to get a comprehensive enumeration of all applicable fault combinations using a compositional approach while generating artifacts required for certification.
Year of Publication
2021
Source
40th International Conference on Computer Safety, Reliability, and Security