Now showing 1 - 10 of 61
  • Publication
    Bridging Trust in Runtime Open Evaluation Scenarios
    ( 2021) ;
    Buhnova, Barbora
    ;
    Marchetti, Eda
    ;
    ;
    Solutions to specific challenges within software engineering activities can greatly benefit from human creativity. For example, evidence of trust derived from creative virtual evaluation scenarios can support the trust assurance of fast-paced runtime adaptation of intelligent behavior. Following this vision, in this paper, we introduce a methodological and architectural concept that interplays creative and social aspects of gaming into software engineering activities, more precisely into a virtual evaluation of system behavior. A particular trait of the introduced concept is that it reinforces cooperation between technological and social intelligence.
  • Publication
    The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World
    ( 2021)
    Anton, Simon Daniel Duque
    ;
    Fraunholz, Daniel
    ;
    ;
    Reti, Daniel
    ;
    ;
    Schotten, Hans Dieter
    Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and organisation of the industrial environments. However, it also increases the attack surface, providing possible points of entry for an attacker. Originally, breaking into production networks meant to break an Information Technology (IT)-perimeter first, such as a public website, and then to move laterally to Industrial Control Systems (ICSs) to influence the production environment. However, many OT-devices are connected directly to the Internet, which drastically increases the threat of compromise, especially since OT-devices contain several vulnerabilities. In this work, the presence of OT-devices in the Internet is analysed from an attacker's perspective. Publicly available tools, such as the search engine Shodan and vulnerability databases, are employed to find commonly used OT-devices and map vulnerabilities to them. These findings are grouped according to country of origin, manufacturer, and number as well as severity of vulnerability. More than 13000 devices were found, almost all contained at least one vulnerability. European and Northern American countries are by far the most affected ones.
  • Publication
    Safety4Ventilators - Public Project Report
    (Fraunhofer IESE, 2021) ; ;
    Naveed, Akram Mohammed
    ;
    Maier, Oliver
    ;
    Since December 2019, the world population has experienced one of the worst widespread lung disease pandemics of this century. Due to its high human-to-human transmission rate and lack of known medication and vaccination, COVID-19 caught most medical and pharmaceutical experts by surprise. The nature and the known effects of the novel SARS-CoV-19 virus led to a significant rise in demand for ICU ventilators. Together with the Kaiserslautern University of Applied Sciences (German: Hochschule Kaiserslautern, abbrev. HS KL), we present and provide a walkthrough across the safety engineering lifecycle for a proprietary ventilator, the latter being developed courtesy of our HS KL colleagues. The IEC 61508 Safety Engineering Lifecycle is applied as a case study, using our proprietary tool safeTbox.
  • Publication
    Optical wireless communication in industrial areas: Potential performance and actual demand
    ( 2021) ;
    Shrotri, Abhijeet
    ;
    Stübbe, Oliver
    ;
    Lachmayer, Roland
    ;
    Bunge, Christian-Alexander
    In industrial scenarios wireless communication becomes more and more widespread. Radio-frequency technologies are still predominant, but optical wireless communication (OWC) provides many advantages to fulfill the requirements of communication in industrial applications. A survey with industrial users consolidate a list with the most important demands for wireless communication within the field: The results reveal that the current heterogeneous requirements for wireless communication are valid, but highlight the need for license-free, robust and energy efficient wireless communication at rather moderate data rates. These requirements can be met by OWC, but its direct application in industrial environments is often hindered by the harsh conditions, with measurements inter alia indicating specific cross talk by light-emitting processes. In this article, these aspects are discussed one by one in order to obtain a clear perspective about the applicability, the main limitati ons and potential technologies for OWC and competing approaches in industrial areas. In summary, the application requirements of industrial communication are substantiated, whereas specific limitations and needs for advancement of current OWC systems are derived.
  • Publication
    Goals within Trust-based Digital Ecosystems
    ( 2021) ;
    Purohit, Akanksha
    ;
    Buhnova, Barbora
    ;
    Within a digital ecosystem, systems and actors form coalitions for achieving common and individual goals. In a constant motion of collaborative and competitive forces and faced with the risk of malicious attacks, ecosystem participants require strong guarantees of their collaborators' trustworthiness. Evidence of trustworthy behavior derived from runtime executions can provide these trust guarantees, given that clear definition and delimitation of trust concerns exist. Without them, a base for negotiating expectations, quantifying achievements and identifying strategical attacks cannot be established and attainment of strategic benefits relies solely on vulnerable collaborations. In this paper we examine the relationship between goals and trust and we introduce a formalism for goal representation. We delimit the trust concerns with anti-goals. The anti-goals set the boundaries within which we structure the trust analysis and build up evidence for motivated attacks.
  • Publication
    A Framework for Automated Quality Assurance and Documentation for Pharma 4.0
    The production sector is experiencing significant transformations driven by comprehensive digitalization, interconnection, and further automation advances. One sub-sector that can benefit significantly from these trends is the production of Advanced Therapy Medicinal Products (ATMPs). ATMPs show promise for treating different serious conditions, but they are very expensive-being patient tailored products whose production is a highly manual, minimally automated process. In a recent research project with an ATMP producer, we investigated how the degree of automation can be increased. It became apparent that in parallel to increasing automation across the actual production steps, quality assurance needs to be addressed in a similar way. This paper introduces a framework for automating (parts of) the quality assurance of ATMPs using two concepts: (a) digital shadows or twins and (b) assurance cases. We demonstrate its conceptual implementation along a case study for Car-T cell products used to treat certain forms of cancer.
  • Publication
    Towards Creation of Automated Prediction Systems for Trust and Dependability Evaluation
    ( 2020) ;
    Chren, Stanislav
    ;
    Aktouf, Oum-El-Kheir
    ;
    Larsson, Alf
    ;
    Chillarege, Ram
    ;
    ; ;
    We advance the ability to design reliable Cyber-Physical Systems of Systems (CPSoSs) by integrating artificial intelligence to the engineering methods of these systems. The current practice relies heavily on independent validation of software and hardware components, with only limited evaluation during engineering integration activities. Furthermore, our changing landscape of real-time adaptive systems allows software components to be dynamically included or re-distributed within a Cyber-Physical System (CPS), with mostly unknown implications on the overall systems integrity, reliability and security. This paper introduces an approach consisting of scientific and engineering processes that enable development of concepts for automated prediction systems for evaluating the dependability and trust of CPSoS. This significantly moves the security and reliability design process ahead by opening the doors for far more relevant design strategies and the opportunity to develop protocols, methods, and tools aimed at dealing with a wide variety of platforms with poorly calibrated reliability characteristics.
  • Publication
    Engineering of Runtime Safety Monitors for Cyber-Physical Systems with Digital Dependability Identities
    ( 2020) ; ;
    Sorokos, Ioannis
    ;
    Papadopoulos, Yiannis
    ;
    Kelly, Tim
    ;
    Wei, Ran
    ;
    Armengaud, Eric
    ;
    Kaypmaz, Cem
    Cyber-Physical Systems (CPS) harbor the enormous potential for societal improvement in terms of safety, comfort and economic efficiency. However, these benefits will only be unlocked if the safety of these systems can be assured with a sufficient level of confidence. Traditional safety engineering and assurance approaches alone cannot address the CPS-inherent uncertainties and unknowns induced by openness and adaptivity. Runtime safety assurance approaches such as Conditional Safety Certificates (ConSerts) represent novel means to cope with CPS assurance challenges by introducing modular and formalized safety arguments with variant support, thereby shifting the final safety certification step to runtime. However, the systematic engineering of ConSerts at design-time is a complex task which, up to now, has not been sufficiently addressed. Without systematic safety assurance at both design-time and runtime, CPS will hardly be assurable with acceptable confidence given the uncertainties and unknowns. In this paper, we present an engineering method for synthesizing ConSerts based on Digital Dependability Identities (DDI). The approach is demonstrated for a cooperative vehicle platooning function (CACC) from an industrial case study.
  • Patent
    Fehleridentifikation in einem Fertigungs- oder Bearbeitungsprozess für ein Bauteil, insbesondere für eine Steuerplatine, mit einem Sensor-Trägerteil
    Die Erfindung betrifft die Fehleridentifikation in einem Fertigungs- oder Bearbeitungsprozess für ein Bauteil (1), insbesondere zum Überprüfen eines Fertigungs- oder Bearbeitungsprozesses für eine mit einer Steuerelektronik versehene oder zu versehende Leiterplatte, mit einem a) Erfassen zumindest einer geometrischen Eigenschaft (b, d, I) des Bauteils (1); b) Erzeugen eines Sensor-Trägerteils (2) mit einer geometrischen Eigenschaft (b', d', I'), welche der geometrischen Eigenschaft (b, d, I) des Bauteils (1) gleicht, wobei das Sensor-Trägerteil (2) zumindest ein Sensorelement (3a-3e) zum Messen einer Messgröße und ein mit dem Sensorelement (3a-3e) verbundenes Ausleseelement (4) zum Auslesen von zumindest einem von dem Sensorelement (3a-3e) gemessenen Messwert der Messgröße aufweist; c) Einbringen des Sensor-Trägerteils (2) in den Fertigungs- oder Bearbeitungsprozesses anstelle des Bauteils (1); d) Durchlaufen des Fertigungs- oder Bearbeitungsprozesses mit dem eingebrachten Sensor-Trägerbauteil (2), wobei das Sensorelement (3a-3e) die Messgröße misst; und e) Auslesen des zumindest einen gemessenen Messwerts, um die Fehlersuche in und die Optimierung von Fertigungs- und/oder Bearbeitungsprozessen in einer Fertigungs- und/oder Bearbeitungsanlage zu verbessern. Die Erfindung betrifft auch ein entsprechendes Sensor-Trägerteil.