Skip to main content

Compositionality of Component Fault Trees

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11842))

Abstract

In order to deal with the rising complexity of safety-critical systems, model-based systems engineering (MBSE) approaches are becoming popular due to their promise to improve consistency between different views of the system model. Component Fault Trees (CFTs) are one particular technique to integrate the well-known Fault Tree Analysis (FTA) with a model of the system. CFTs decompose the specification of fault propagation on component level, which results in smaller, easier to manage models and leads to a safety analysis view that is consistent with the system model. However, although CFTs gain more and more popularity, their semantics is not well defined and the compositionality of CFTs is not formally proven to the best of our knowledge.

In this paper, we provide a formal basis for CFTs, formalize semantics of CFTs and formally prove compositionality of CFTs by mapping them to information flow semantics, which is well-researched in the security analysis domain. Our results allow insights in the compositionality of CFTs, showing a high potential for validation techniques of CFTs and discuss these consequences in detail. We claim that this proof is crucial for the use of CFTs in assurance cases for safety-critical systems and one fundamental approach to integrate safety and security engineering.

This work was partially funded within the project SecForCARs by the German Federal Ministry for Education and Research with the funding ID 16KIS0792. The responsibility for the content remains with the authors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Greiner, S., Munk, P., and Nordmann, A.: Compositionality of Component Fault Trees - Definitions and Proofs. (2019). http://arxiv.org/pdf/1907.09920.

References

  1. Aizpurua, J.I., Muxika, E.: Model-based design of dependable systems: limitations and evolution of analysis and verification approaches. Int. J. Adv. Secur. 6(1 & 2), 12–31 (2013)

    Google Scholar 

  2. Amarnath, R., et al.: Dependability challenges in the model-driven engineering of automotive systems. In: Proceedings of ISSRE Workshops (2016). https://doi.org/10.1109/ISSREW.2016.15

  3. Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: Proceedings of PLDI, pp. 259–269 (2014). https://doi.org/10.1145/2594291.2594299

  4. Bauereiß, T., et al.: CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. In: Proceedings of Symposium on Security and Privacy, pp. 729–748 (2017). https://doi.org/10.1109/SP.2017.24

  5. Bozzano, M., Cimatti, A., Mattarei, C., Tonetta, S.: Formal safety assessment via contract-based design. In: Cassez, F., Raskin, J.-F. (eds.) ATVA 2014. LNCS, vol. 8837, pp. 81–97. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11936-6_7

    Chapter  Google Scholar 

  6. Fovino, I.N., Masera, M., Cian, A.D.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 94(9), 1394–1402 (2009). https://doi.org/10.1016/j.ress.2009.02.020

    Article  Google Scholar 

  7. Greiner, S., Birnstill, P., Krempel, E., Beckert, B., Beyerer, J.: Privacy preserving surveillance and the tracking-paradox. In: Proceedings of the Future Security - Security Research Conference, pp. 296–302 (2013)

    Google Scholar 

  8. Greiner, S., Grahl, D.: Non-interference with what-declassification in component-based systems. In: Proceedings of CSF, pp. 253–267 (2016). https://doi.org/10.1109/CSF.2016.25

  9. Greiner, S.: A framework for non-interference in component-based systems. Ph.D. thesis. Karlsruher Institut für Technologie (KIT) (2018). https://doi.org/10.5445/IR/1000082042

  10. Greiner, S., Mohr, M., Beckert, B.: Modular verification of information flow security in component-based systems. In: Cimatti, A., Sirjani, M. (eds.) SEFM 2017. LNCS, vol. 10469, pp. 300–315. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66197-1_19

    Chapter  Google Scholar 

  11. Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Secur. 8(6), 399–422 (2009). https://doi.org/10.1007/s10207-009-0086-1

    Article  Google Scholar 

  12. Hedin, D., Sabelfeld, A.: A perspective on information-flow control. Softw. Saf. Secur. 33, 319–347 (2012). NATO Science for Peace and Security Series - D: Information and Communication Security

    Google Scholar 

  13. Höfig, K., et al.: Model-based reliability and safety: reducing the complexity of safety analyses using component fault trees. In: Proceedings of RAMS (2018). https://doi.org/10.1109/RAM.2018.8463058

  14. International Electrotechnical Commission (IEC): IEC 61025: Fault tree analysis (FTA) (2006)

    Google Scholar 

  15. International Standard Organization (ISO): ISO 26262-4: Road vehicles - functional safety - Part 6: Product development at the system level (2018)

    Google Scholar 

  16. Society of Automotive Engineers (SAE): SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (2016)

    Google Scholar 

  17. Kaiser, B., Liggesmeyer, P., Mäckel, O.: A new component concept for fault trees. In: Proceedings of SCS, pp. 37–46 (2003)

    Google Scholar 

  18. Kaiser, B., et al.: Advances in component fault trees. In: Proceedings of ESREL (2018)

    Chapter  Google Scholar 

  19. Lisagor, O., Kelly, T., Niu, R.: Model-based safety assessment: review of the discipline and its challenges. In: The Proceedings of ICRMS, pp. 625–632 (2011). https://doi.org/10.1109/ICRMS.2011.5979344

  20. Mahmud, N., Walker, M., Papadopoulos, Y.: Compositional synthesis of temporal fault trees from state machines. Perform. Eval. Rev. 39(4), 79–88 (2012). https://doi.org/10.1145/2185395.2185444

    Article  Google Scholar 

  21. Möhrle, F., Zeller, M., Höfig, K., Rothfelder, M.: Automating compositional safety analysis using a failure type taxonomy for component fault trees. In: Risk, Reliability and Safety: Innovating Theory and Practice (2016)

    Google Scholar 

  22. Munk, P., et al.: INVITED: semi-automatic safety analysis and optimization. In: Proceedings of DAC (2018)

    Google Scholar 

  23. Nagaraju, V., Fiondella, L., Wandji, T.: A survey of fault and attack tree modeling and analysis for cyber risk management. In: Proceedings of THS (2017). https://doi.org/10.1109/THS.2017.7943455

  24. Nordmann, A., Munk, P.: Lessons learned from model-based safety assessment with SysML and component fault trees. In: Proceedings of MODELS (2018). https://doi.org/10.1145/3239372.3239373

  25. Piètre-Cambacédàs, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110–126 (2013). https://doi.org/10.1016/j.ress.2012.09.011

    Article  Google Scholar 

  26. Rafnsson, W., Hedin, D., Sabelfeld, A.: Securing interactive programs. In: Proceedings of CSF, pp. 293–307 (2012)

    Google Scholar 

  27. Scheben, C., Greiner, S.: Information flow analysis. In: Ahrendt, W., Beckert, B., Bubel, R., Hähnle, R., Schmitt, P., Ulbrich, M. (eds.) Deductive Software Verification – The KeY Book. LNCS, vol. 10001, pp. 453–471. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49812-6_13

    Chapter  Google Scholar 

  28. Sharvia, S., Kabir, S., Walker, M., Papadopoulos, Y.: Model-based dependability analysis: state-of-the-art, challenges, and future outlook. In: Software Quality Assurance, pp. 251–278 (2016). https://doi.org/10.1016/B978-0-12-802301-3.00012-0

    Chapter  Google Scholar 

  29. Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: Proceedings of DECSSAFECOMP (2013)

    Google Scholar 

  30. Thums, A.: Formale Fehlerbaumanalyse. Ph.D. thesis. University of Augsburg, Germany (2004)

    Google Scholar 

  31. Thums, A., Schellhorn, G.: Model checking FTA. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 739–757. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45236-2_40

    Chapter  Google Scholar 

  32. Wittbold, J.T., Johnson, D.M.: Information flow in nondeterministic systems. In: Proceedings of RISP, pp. 144–161 (1990). https://doi.org/10.1109/RISP.1990.63846

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simon Greiner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Greiner, S., Munk, P., Nordmann, A. (2019). Compositionality of Component Fault Trees. In: Papadopoulos, Y., Aslansefat, K., Katsaros, P., Bozzano, M. (eds) Model-Based Safety and Assessment. IMBSA 2019. Lecture Notes in Computer Science(), vol 11842. Springer, Cham. https://doi.org/10.1007/978-3-030-32872-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32872-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32871-9

  • Online ISBN: 978-3-030-32872-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics