2010
DOI: 10.2172/1000417
|View full text |Cite
|
Sign up to set email alerts
|

Diversity Strategies for Nuclear Power Plant Instrumentation and Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 35 publications
0
18
0
Order By: Relevance
“…For a nuclear power plant, one situation in which software diversity might be considered is that of a diverse digital system for reactor shutdown. A recent NRC-sponsored study on diversity strategies for digital instrumentation and control systems [Wood 2010] considers software diversity as a part of the overall digital system's diversity, that is, software diversity is considered jointly in hardware-related diversity strategies. It identifies a number of software diversities, such as usage of different algorithms, logic, program architectures, operating systems, and computer languages.…”
Section: Quantification Methods For Software Diversitiesmentioning
confidence: 99%
“…For a nuclear power plant, one situation in which software diversity might be considered is that of a diverse digital system for reactor shutdown. A recent NRC-sponsored study on diversity strategies for digital instrumentation and control systems [Wood 2010] considers software diversity as a part of the overall digital system's diversity, that is, software diversity is considered jointly in hardware-related diversity strategies. It identifies a number of software diversities, such as usage of different algorithms, logic, program architectures, operating systems, and computer languages.…”
Section: Quantification Methods For Software Diversitiesmentioning
confidence: 99%
“…the size of the keyspace subset to search), and we consider the probability of an attacker achieving a goal (discovery of one, or two, or three channel keys) as a function of the number of attempts t. Assuming that the keys are allocated to channels by choosing randomly and independently from the whole keyspace (as is reasonable) 2 , the event "the r-th key tried by the attacker is the right key for channel i" is independent of any event of the same form affecting other channels. This set of independence properties underlies the following results.…”
Section: Ivcryptanalysis Attacks Via Random Search and Defence By Kmentioning
confidence: 99%
“…If we believe our adversary to consider worthwhile an attack that gives a probability of success of -say -10%, then, using the fact that = = and the approximation Q2 ≈ (τ) 2 , we can observe that a probability of success that with one key is given by effort τ requires, with diverse keys, effort √2 : larger than for any search short of a complete search of both key spaces. To consider which conditions favour the defender over the attacker, we can rewrite this expression without the normalization: the level of Q1 achieved in t attempts with a onekey system requires, with two keys, 2 T .…”
Section: Ivcryptanalysis Attacks Via Random Search and Defence By Kmentioning
confidence: 99%
“…For example, given the values of pfd A , pfd B , d AB (0), we could see how many test cases need to be executed (and show no failures) to obtain a particular value of pfd AB (N): in many cases, such as reactor protection systems, the cost of generating test cases may be high so that a large N may be infeasible. Alternatively, given the values of pfd A , pfd B , N (where here N is regarded as the size of the largest practically feasible test set), we could calculate the required d AB (0) and ask whether such a belief could be trusted (for example, supported by evidence about the diversity-seeking decisions (Littlewood and Strigini 2000;Wood, Belles et al 2010) taken during system design and build). We believe that using our approach to challenge parts of safety cases in this way may be its most useful contribution.…”
Section: Practical Implications Of the Model: Examplesmentioning
confidence: 99%
“…Such design-diverse fault tolerant systems have been used successfully in some safety critical applications: see (Littlewood, Popov et al 2002;Wood, Belles et al 2010). …”
Section: Introductionmentioning
confidence: 99%