Now showing 1 - 10 of 21
  • Publication
    Bridging Trust in Runtime Open Evaluation Scenarios
    ( 2021) ;
    Buhnova, Barbora
    ;
    Marchetti, Eda
    ;
    ;
    Solutions to specific challenges within software engineering activities can greatly benefit from human creativity. For example, evidence of trust derived from creative virtual evaluation scenarios can support the trust assurance of fast-paced runtime adaptation of intelligent behavior. Following this vision, in this paper, we introduce a methodological and architectural concept that interplays creative and social aspects of gaming into software engineering activities, more precisely into a virtual evaluation of system behavior. A particular trait of the introduced concept is that it reinforces cooperation between technological and social intelligence.
  • Publication
    The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World
    ( 2021)
    Anton, Simon Daniel Duque
    ;
    Fraunholz, Daniel
    ;
    ;
    Reti, Daniel
    ;
    ;
    Schotten, Hans Dieter
    Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and organisation of the industrial environments. However, it also increases the attack surface, providing possible points of entry for an attacker. Originally, breaking into production networks meant to break an Information Technology (IT)-perimeter first, such as a public website, and then to move laterally to Industrial Control Systems (ICSs) to influence the production environment. However, many OT-devices are connected directly to the Internet, which drastically increases the threat of compromise, especially since OT-devices contain several vulnerabilities. In this work, the presence of OT-devices in the Internet is analysed from an attacker's perspective. Publicly available tools, such as the search engine Shodan and vulnerability databases, are employed to find commonly used OT-devices and map vulnerabilities to them. These findings are grouped according to country of origin, manufacturer, and number as well as severity of vulnerability. More than 13000 devices were found, almost all contained at least one vulnerability. European and Northern American countries are by far the most affected ones.
  • Publication
    Safety4Ventilators - Public Project Report
    (Fraunhofer IESE, 2021) ; ;
    Naveed, Akram Mohammed
    ;
    Maier, Oliver
    ;
    Since December 2019, the world population has experienced one of the worst widespread lung disease pandemics of this century. Due to its high human-to-human transmission rate and lack of known medication and vaccination, COVID-19 caught most medical and pharmaceutical experts by surprise. The nature and the known effects of the novel SARS-CoV-19 virus led to a significant rise in demand for ICU ventilators. Together with the Kaiserslautern University of Applied Sciences (German: Hochschule Kaiserslautern, abbrev. HS KL), we present and provide a walkthrough across the safety engineering lifecycle for a proprietary ventilator, the latter being developed courtesy of our HS KL colleagues. The IEC 61508 Safety Engineering Lifecycle is applied as a case study, using our proprietary tool safeTbox.
  • Publication
    Goals within Trust-based Digital Ecosystems
    ( 2021) ;
    Purohit, Akanksha
    ;
    Buhnova, Barbora
    ;
    Within a digital ecosystem, systems and actors form coalitions for achieving common and individual goals. In a constant motion of collaborative and competitive forces and faced with the risk of malicious attacks, ecosystem participants require strong guarantees of their collaborators' trustworthiness. Evidence of trustworthy behavior derived from runtime executions can provide these trust guarantees, given that clear definition and delimitation of trust concerns exist. Without them, a base for negotiating expectations, quantifying achievements and identifying strategical attacks cannot be established and attainment of strategic benefits relies solely on vulnerable collaborations. In this paper we examine the relationship between goals and trust and we introduce a formalism for goal representation. We delimit the trust concerns with anti-goals. The anti-goals set the boundaries within which we structure the trust analysis and build up evidence for motivated attacks.
  • Publication
    A Framework for Automated Quality Assurance and Documentation for Pharma 4.0
    The production sector is experiencing significant transformations driven by comprehensive digitalization, interconnection, and further automation advances. One sub-sector that can benefit significantly from these trends is the production of Advanced Therapy Medicinal Products (ATMPs). ATMPs show promise for treating different serious conditions, but they are very expensive-being patient tailored products whose production is a highly manual, minimally automated process. In a recent research project with an ATMP producer, we investigated how the degree of automation can be increased. It became apparent that in parallel to increasing automation across the actual production steps, quality assurance needs to be addressed in a similar way. This paper introduces a framework for automating (parts of) the quality assurance of ATMPs using two concepts: (a) digital shadows or twins and (b) assurance cases. We demonstrate its conceptual implementation along a case study for Car-T cell products used to treat certain forms of cancer.
  • Publication
    Towards Creation of Automated Prediction Systems for Trust and Dependability Evaluation
    ( 2020) ;
    Chren, Stanislav
    ;
    Aktouf, Oum-El-Kheir
    ;
    Larsson, Alf
    ;
    Chillarege, Ram
    ;
    ; ;
    We advance the ability to design reliable Cyber-Physical Systems of Systems (CPSoSs) by integrating artificial intelligence to the engineering methods of these systems. The current practice relies heavily on independent validation of software and hardware components, with only limited evaluation during engineering integration activities. Furthermore, our changing landscape of real-time adaptive systems allows software components to be dynamically included or re-distributed within a Cyber-Physical System (CPS), with mostly unknown implications on the overall systems integrity, reliability and security. This paper introduces an approach consisting of scientific and engineering processes that enable development of concepts for automated prediction systems for evaluating the dependability and trust of CPSoS. This significantly moves the security and reliability design process ahead by opening the doors for far more relevant design strategies and the opportunity to develop protocols, methods, and tools aimed at dealing with a wide variety of platforms with poorly calibrated reliability characteristics.
  • Publication
    Engineering of Runtime Safety Monitors for Cyber-Physical Systems with Digital Dependability Identities
    ( 2020) ; ;
    Sorokos, Ioannis
    ;
    Papadopoulos, Yiannis
    ;
    Kelly, Tim
    ;
    Wei, Ran
    ;
    Armengaud, Eric
    ;
    Kaypmaz, Cem
    Cyber-Physical Systems (CPS) harbor the enormous potential for societal improvement in terms of safety, comfort and economic efficiency. However, these benefits will only be unlocked if the safety of these systems can be assured with a sufficient level of confidence. Traditional safety engineering and assurance approaches alone cannot address the CPS-inherent uncertainties and unknowns induced by openness and adaptivity. Runtime safety assurance approaches such as Conditional Safety Certificates (ConSerts) represent novel means to cope with CPS assurance challenges by introducing modular and formalized safety arguments with variant support, thereby shifting the final safety certification step to runtime. However, the systematic engineering of ConSerts at design-time is a complex task which, up to now, has not been sufficiently addressed. Without systematic safety assurance at both design-time and runtime, CPS will hardly be assurable with acceptable confidence given the uncertainties and unknowns. In this paper, we present an engineering method for synthesizing ConSerts based on Digital Dependability Identities (DDI). The approach is demonstrated for a cooperative vehicle platooning function (CACC) from an industrial case study.
  • Publication
    Building trust in the untrustable
    Trust is a major aspect in the relationship between humans and autonomous safety-critical systems, such as autonomous vehicles. Although human errors may cause higher risks, failures of autonomous systems are more strongly perceived by the general population, which hinders the adoption of autonomous safety-critical systems. It is therefore necessary to devise approaches for systematically building trust in autonomous functions and thereby facilitate the adoption process. In this paper, we introduce a method and a framework for incrementally building trust in the context of autonomous driving. Within the envisioned solution, we employ the psychological narrative behind trust building through the formation of new habits and introduce a method where trust is established gradually for both the human and the autonomous safety-critical system via reputation building and step-by-step integration of smart software agents replacing human actions.
  • Publication
    Predictive Runtime Simulation for Building Trust in Cooperative Autonomous Systems
    Future autonomous systems will also be cooperative systems. They will interact with each other, with traffic infrastructure, with cloud services and with other systems. In such an open ecosystem trust is of fundamental importance, because cooperation between systems is key for many innovation applications and services. Without an adequate notion of trust, as well as means to maintain and use it, the full potential of autonomous systems thus cannot be unlocked. In this paper, we discuss what constitutes trust in autonomous cooperative systems and sketch out a corresponding multifaceted notion of trust. We then go on to discuss a predictive runtime simulation approach as a building block for trust and elaborate on means to secure this approach.