2017
DOI: 10.1007/978-3-319-66284-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Combining Safety and Security Analysis for Industrial Collaborative Automation Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…The analysis proposed by [18] is based on FMEA that considers only single causes of an effect, which excludes multi-stage attacks consideration. The method presented by Popov (2015) [28] may require a more complex [24], [32], [40], [45], [46] [11], [33] Unified [6], [13], [15], [17], [23], [25], [34], [36], [39], [41], [42], [43], [35], [49] [10], [12], [18], [21], [26], [28], [29], [31], [37], [38], [44], [47] failure model to address failure dependencies and trade-offs between safety and security. The approach proposed by Wei et al (2015) [31] has a limitation in terms of failures connections.…”
Section: B Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The analysis proposed by [18] is based on FMEA that considers only single causes of an effect, which excludes multi-stage attacks consideration. The method presented by Popov (2015) [28] may require a more complex [24], [32], [40], [45], [46] [11], [33] Unified [6], [13], [15], [17], [23], [25], [34], [36], [39], [41], [42], [43], [35], [49] [10], [12], [18], [21], [26], [28], [29], [31], [37], [38], [44], [47] failure model to address failure dependencies and trade-offs between safety and security. The approach proposed by Wei et al (2015) [31] has a limitation in terms of failures connections.…”
Section: B Resultsmentioning
confidence: 99%
“…The authors demonstrate how to align safety and security workflows and where they need to overlap. 28) Plósz et al (2017) [43] propose a method combining parts of existing methodologies, STRIDE [20] and FMEA [19]. These safety and security analyses are divided in two parts with an integration stage after the first parallel activities that provides a combined safety and security threat catalogue.…”
Section: ) Raspotning Et Al (2012) [10] Present Combined Harmmentioning
confidence: 99%
“…The analysis proposed by [18] is based on FMEA that considers only single causes of an effect, which excludes multi-stage attacks consideration. The method presented by Popov (2015) [28] may require a more complex [24], [32], [40], [45], [46] [11], [33] Unified [6], [13], [15], [17], [23], [25], [34], [36], [39], [41], [42], [43], [35], [49] [10], [12], [18], [21], [26], [28], [29], [31], [37], [38], [44], [47] failure model to address failure dependencies and trade-offs between safety and security. The approach proposed by Wei et al (2015) [31] has a limitation in terms of failures connections.…”
Section: B Resultsmentioning
confidence: 99%
“…We want to start with approaches explicitly recommended for the automotive sector and listed by SAE in its Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (SAE J3061 [14]). The guidebook suggests to apply the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) approach, the HEAling Vulnerabilities to ENhance Software Security and Safety (HEAVENS) [15] methodology, and the E-Safety Vehicle Intrusion Protected Applications (EVITA) [16] [17] approach. OCTAVE was developed for enterprise security risk assessment.…”
Section: Securitymentioning
confidence: 99%