Skip to main content

Formal Analysis of Interactions Between Safety and Security Requirements

  • Chapter
  • First Online:
The Practice of Formal Methods

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14781))

  • 175 Accesses

Abstract

Modern safety-critical control systems rely on networking to provide safety-critical functions. Network technologies not only offers a variety of benefits but also introduces cybersecurity threats. Exploiting security vulnerabilities might result in a loss of control and situation awareness as well as directly threaten safety. Therefore, the development of safety-critical systems should encompass a systematic analysis of the impact of potential cyberattacks on safety and explicit identification of security requirements early in the system development life cycle. In this paper, we propose a formal approach to modelling networked safety-critical systems within Event-B framework. We demonstrate how modelling and refinement in Event-B can systematically identify mutual interdependencies between safety and security and facilitate deriving explicit security requirements necessary for achieving system safety.

The author would like to thank Inna Vistbakka for long-standing cooperation that contributed to this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abrial, J.R.: Modeling in Event-B. Cambridge University Press (2010)

    Google Scholar 

  2. Butler, M., Jones, C., Romanovsky, A., Troubitsyna, E.: Rigorous Development of Complex Fault-Tolerant Systems. LNCS, Springer, Heidelberg (2007). https://doi.org/10.1007/11916246

    Book  Google Scholar 

  3. Cimatti, A., DeLong, R., Marcantonio, D., Tonetta, S.: Combining MILS with contract-based design for safety and security requirements. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015 Workshops. LNCS, vol. 9338, pp. 264–276. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24249-1_23

  4. Parnas, D.L., Madey, J.: Functional documents for computer systems. Sci. Comput. Program. 25, 41–61 (1995)

    Google Scholar 

  5. Fovino, I.N., Masera, M., Cian, A.D.: Integrating cyber attacks within fault trees. Rel. Eng. Sys. Saf. 94(9), 1394–1402 (2009)

    Article  Google Scholar 

  6. Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., Ghadimi, N.: A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electr. Power Syst. Res. 215, 108975 (2023). https://www.sciencedirect.com/science/article/pii/S0378779622010240

  7. Hayes, I.J., Jackson, M.A., Jones, C.B.: Determining the specification of a control system from that of its environment. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45236-2_10. https://api.semanticscholar.org/CorpusID:1077875

  8. Iliasov, A., et al.: Supporting reuse in event-B development: modularisation approach. In: Frappier, M., Glässer, U., Khurshid, S., Laleau, R., Reeves, S. (eds.) ABZ 2010. LNCS, vol. 5977, pp. 174–188. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11811-1_14

  9. Iliasov, A., et al.: Developing mode-rich satellite software by refinement in event-B. Sci. Comput. Program. 78(7), 884–905 (2013)

    Article  Google Scholar 

  10. Jones, C.B.: Software Development: A Rigorous Approach. Prentice Hall PTR, USA (1980)

    Google Scholar 

  11. Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security - supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC) (2011-06-07 2011) (2013)

    Google Scholar 

  12. Kriaa, S., Bouissou, M., Colin, F., Halgand, Y., Piètre-Cambacédès, L.: Safety and security interactions modeling using the BDMP formalism: case study of a PipeliLeve. In: Bondavalli, A., Di Giandomenico, F. (eds). SAFECOMP 2014. LNCS, vol. 8666, pp. 326–341. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10506-2_22

  13. Laibinis, L., Troubitsyna, E.: Refinement of fault tolerant control systems in B. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol. 3219, pp. 254–268. Springer, Cham (2004). https://doi.org/10.1007/978-3-540-30138-7_22

  14. Leveson, N.G.: Safeware: System Safety and Computers. Addison-Wesley (1995)

    Google Scholar 

  15. Paul, S., Rioux, L.: Over 20 years of research into cybersecurity and safety engineering: a short bibliography. Saf. Secur. Eng. VI(335) (2015)

    Google Scholar 

  16. Ponsard, C., Dallons, G., Massone, P.: Goal-oriented co-engineering of security and safety requirements in cyber-physical systems. In: Skavhaug, A., Guiochet, J., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9923, pp. 334–345. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45480-1_27

  17. Rocchetto, M., Tippenhauer, N.O.: CPDY: extending the Dolev-Yao attacker with physical-layer interactions. In: Ogata, K., Lawford, M., Liu, S. (eds.) ICFEM 2016. LNCS, vol. 10009, pp. 175–192. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47846-3_12

    Chapter  Google Scholar 

  18. Rodin: Event-B platform. http://www.event-b.org/

  19. Romanovsky, A., Thomas, M.: Industrial Deployment of System Engineering Methods. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-33170-1

    Book  Google Scholar 

  20. Schmittner, C., Ma, Z., Smith, P.: FMVEA for safety and security analysis of intelligent and cooperative vehicles. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 282–288. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10557-4_31

    Chapter  Google Scholar 

  21. Troubitsyna, E., Laibinis, L., Pereverzeva, I., Kuismin, T., Ilic, D., Latvala, T.: Towards security-explicit formal modelling of safety-critical systems. In: Skavhaug, A., Guiochet, J., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9922, pp. 213–225. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45477-1_17

  22. Vistbakka, I., Troubitsyna, E.: Towards a formal approach to analysing security of safety-critical systems. In: EDCC 2018, pp. 182–189. IEEE Computer Society (2018)

    Google Scholar 

  23. Vistbakka, I., Troubitsyna, E., Kuismin, T., Latvala, T.: Co-engineering safety and security in industrial control systems: a formal outlook. In: Romanovsky, A., Troubitsyna, E. (eds.) SERENE 2017. LNCS, vol. 10479, pp. 96–114. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65948-0_7

  24. Vreman, N., Pazzaglia, P., Magron, V., Wang, J., Maggio, M.: Stability of linear systems under extended weakly-hard constraints. IEEE Control Syst. Lett. 6, 2900–2905 (2021)

    Article  MathSciNet  Google Scholar 

  25. Yadav, G., Paul, K.: Architecture and security of SCADA systems: a review. Int. J. Crit. Infrastruct. Prot. 34, 100433 (2021)

    Article  Google Scholar 

  26. Young, W., Leveson, N.G.: An integrated approach to safety and security based on systems theory. Commun. ACM 57(2), 31–35 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Troubitsyna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Troubitsyna, E. (2024). Formal Analysis of Interactions Between Safety and Security Requirements. In: Cavalcanti, A., Baxter, J. (eds) The Practice of Formal Methods. Lecture Notes in Computer Science, vol 14781. Springer, Cham. https://doi.org/10.1007/978-3-031-66673-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-66673-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-66672-8

  • Online ISBN: 978-3-031-66673-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics