Skip to main content

Showing 1–15 of 15 results for author: Elks, C

.
  1. arXiv:2205.12080  [pdf

    cs.SE

    Application of Orthogonal Defect Classification for Software Reliability Analysis

    Authors: Edward Chen, Han Bao, Tate Shorthill, Carl Elks, Athira Varma Jayakumar, Nam Dinh

    Abstract: The modernization of existing and new nuclear power plants with digital instrumentation and control systems (DI&C) is a recent and highly trending topic. However, there lacks strong consensus on best-estimate reliability methodologies by both the United States (U.S.) Nuclear Regulatory Commission (NRC) and the industry. In this work, we develop an approach called Orthogonal-defect Classification f… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: 12 pages, 3 figures, 4 tables, conference transaction presented at Probabilistic Safety Assessment and Management 2022

    MSC Class: 68M15

  2. arXiv:2205.12075  [pdf

    cs.SE

    Failure Mechanism Traceability and Application in Human System Interface of Nuclear Power Plants using RESHA

    Authors: Edward Chen, Han Bao, Tate Shorthill, Carl Elks, Nam Dinh

    Abstract: In recent years, there has been considerable effort to modernize existing and new nuclear power plants with digital instrumentation and control systems. However, there has also been considerable concern both by industry and regulatory bodies for the risk and consequence analysis of these systems. Of concern are digital common cause failures specifically due to software defects. These failures by t… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: 13 pages, 7 figures, 4 tables, conference transaction presented at Probabilistic Safety Assessment and Management 2022

    MSC Class: 68M15

  3. arXiv:2204.08999  [pdf, other

    cs.SE eess.SY

    STPA-driven Multilevel Runtime Monitoring for In-time Hazard Detection

    Authors: Smitha Gautham, Georgios Bakirtzis, Alexander Will, Athira V. Jayakumar, Carl R. Elks

    Abstract: Runtime verification or runtime monitoring equips safety-critical cyber-physical systems to augment design assurance measures and ensure operational safety and security. Cyber-physical systems have interaction failures, attack surfaces, and attack vectors resulting in unanticipated hazards and loss scenarios. These interaction failures pose challenges to runtime verification regarding monitoring s… ▽ More

    Submitted 22 June, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

  4. Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems

    Authors: Alexander Weiss, Smitha Gautham, Athira Varma Jayakumar, Carl Elks, D. Richard Kuhn, Raghu N. Kacker, Thomas B. Preusser

    Abstract: Understanding fault types can lead to novel approaches to debugging and runtime verification. Dealing with complex faults, particularly in the challenging area of embedded systems, craves for more powerful tools, which are now becoming available to engineers.

    Submitted 5 February, 2021; originally announced February 2021.

  5. Cyberphysical Security Through Resiliency: A Systems-centric Approach

    Authors: Cody Fleming, Carl Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan Carter, Peter A. Beling, Barry Horowitz

    Abstract: Cyber-physical systems (CPS) are often defended in the same manner as information technology (IT) systems -- by using perimeter security. Multiple factors make such defenses insufficient for CPS. Resiliency shows potential in overcoming these shortfalls. Techniques for achieving resilience exist; however, methods and theory for evaluating resilience in CPS are lacking. We argue that such methods a… ▽ More

    Submitted 9 October, 2021; v1 submitted 29 November, 2020; originally announced November 2020.

  6. arXiv:2009.09533  [pdf

    cs.SE

    Heterogeneous Runtime Verification of Safety Critical Cyber Physical Systems

    Authors: Smitha Gautham, Abhilash Rajagopala, Athira Varma Jayakumar, Christopher Deloglos, Erwin Karincic, Carl Elks

    Abstract: Advanced embedded system technology is one of the key driving forces behind the rapid growth of Cyber-Physical System (CPS) applications. Cyber-Physical Systems are comprised of multiple coordinating and cooperating components, which are often software intensive and interacting with each other to achieve unprecedented tasks. Such complex CPSs have multiple attack surfaces and attack vectors that w… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

  7. An Attacker Modeling Framework for the Assessment of Cyber-Physical Systems Security

    Authors: Christopher Deloglos, Carl Elks, Ashraf Tantawy

    Abstract: Characterizing attacker behavior with respect to Cyber-Physical Systems is important to assuring the security posture and resilience of these systems. Classical cyber vulnerability assessment approaches rely on the knowledge and experience of cyber-security experts to conduct security analyses and can be inconsistent where the experts' knowledge and experience are lacking. This paper proposes a fl… ▽ More

    Submitted 16 March, 2021; v1 submitted 6 June, 2020; originally announced June 2020.

  8. Fundamental Challenges of Cyber-Physical Systems Security Modeling

    Authors: Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming

    Abstract: Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

  9. Self-Repairing Hardware Architecture for Safety-Critical Cyber-Physical-Systems

    Authors: Shawkat Khairullah, Carl Elks

    Abstract: Digital embedded systems in safety-critical cyber-physical-systems (CPSs) require high levels of resilience and robustness against different fault classes. In recent years, self-healing concepts based on biological physiology have received attention for the design and implementation of reliable systems. However, many of these approaches have not been architected from the outset with safety in mind… ▽ More

    Submitted 25 March, 2020; v1 submitted 30 October, 2019; originally announced October 2019.

    Comments: 10 pages. IET Cyber-Physical Systems: Theory & Applications 2020

    Journal ref: in IET Cyber-Physical Systems: Theory & Applications, vol. 5, no. 1, pp. 92-99, 3 2020

  10. Data Driven Vulnerability Exploration for Design Phase System Analysis

    Authors: Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody H. Fleming, Carl R. Elks

    Abstract: Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others there are two significant challenges in this area: (1) the need for models that can characterize a realistic system in the absence of an implementation and (2) an automated way to associate attack vector information; that is, historical data, to such syst… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

  11. arXiv:1812.03377  [pdf, other

    cs.CR

    A Multilevel Cybersecurity and Safety Monitor for Embedded Cyber-Physical Systems

    Authors: Smitha Gautham, Georgios Bakirtzis, Matthew T. Leccadito, Robert H. Klenke, Carl R. Elks

    Abstract: Cyber-physical systems (CPS) are composed of various embedded subsystems and require specialized software, firmware, and hardware to coordinate with the rest of the system. These multiple levels of integration expose attack surfaces which can be susceptible to attack vectors that require novel architectural methods to effectively secure against. We present a multilevel hierarchical monitor archite… ▽ More

    Submitted 8 December, 2018; originally announced December 2018.

  12. Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

    Authors: Georgios Bakirtzis, Brandon J. Simon, Cody H. Fleming, Carl R. Elks

    Abstract: Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking… ▽ More

    Submitted 23 October, 2018; v1 submitted 24 August, 2018; originally announced August 2018.

  13. arXiv:1712.01448  [pdf, other

    cs.CR

    MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis

    Authors: Georgios Bakirtzis, Bryan T. Carter, Cody H. Fleming, Carl R. Elks

    Abstract: Currently, perimeter-based approaches are the mainstay of cybersecurity. While this paradigm is necessary, there is mounting evidence of its insufficiency with respect to sophisticated and coordinated attacks. In contrast to perimeter-based security, mission-centric cybersecurity provides awareness of how attacks can influence mission success and therefore focuses resources for mitigating vulnerab… ▽ More

    Submitted 4 December, 2017; originally announced December 2017.

  14. arXiv:1711.00838  [pdf, other

    cs.CR

    A Systems Approach for Eliciting Mission-Centric Security Requirements

    Authors: Bryan Carter, Georgios Bakirtzis, Carl Elks, Cody Fleming

    Abstract: The security of cyber-physical systems is first and foremost a safety problem, yet it is typically handled as a traditional security problem, which means that solutions are based on defending against threats and are often implemented too late. This approach neglects to take into consideration the context in which the system is intended to operate, thus system safety may be compromised. This paper… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

  15. A Model-Based Approach to Security Analysis for Cyber-Physical Systems

    Authors: Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming

    Abstract: Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation. Most safety and security decisions that can have major effects on mitigation strategy options after deployment are made early in the system's life cycle. To allow for a vuln… ▽ More

    Submitted 10 June, 2018; v1 submitted 31 October, 2017; originally announced October 2017.

    Comments: 8 pages, 5 figures, conference