Skip to main content

Finding Threats with Hazards in the Concept Phase of Product Development

  • Conference paper
Systems, Software and Services Process Improvement (EuroSPI 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 425))

Included in the following conference series:

Abstract

In this paper, we present an approach to find threats together with hazards. We’ve already presented the hazard identification approach in [1]. In this paper, it is elaborated and extended to identify threats too. The basic approach is the same as the previous paper and has four steps. First of all, we roughly describe the static structure and dynamic behaviour. Then using the goal-oriented approach, we depict the goal tree of a system. The top goal of the tree is the most abstract representation of a system and we will divide it repeatedly. If S is a sentence as a description of each goal, we can make the new sentence S-* by applying the guideword of HAZOP [2] (when we adopt the NO guideword, we name the new sentence S-NO, asterisk means the meta-character here). S is a desirable goal; S-* is an undesirable goal (i.e. anti-goal [3]). Using the previous static structure and dynamic behaviour, we then consider whether it is possible to create this negative situation caused by the malfunction of each node or attack to a relation between nodes. The exhaustiveness is important for finding hazards and threats. In our methods, we check them in two ways. One is the checking of the sentence of the goal description using the guideword; the other covers every structural and dynamic elements of a target system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ito, M.: An approach to manage the concept phase of ISO 26262. In: Euro SPI 2013. DELTA, Dundalk (2013)

    Google Scholar 

  2. CEI/IEC, Hazard and operability studies (HAZOP studies) - Application guide, CEI/IEC 61882:2001, IEC (2001)

    Google Scholar 

  3. van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th International Conference on Software Engineering. IEEE Computer Society (2004)

    Google Scholar 

  4. Shi, J., et al.: A survey of cyber-physical systems. In: 2011 International Conference on Wireless Communications and Signal Processing (WCSP). IEEE (2011)

    Google Scholar 

  5. Kleidermacher, D., Kleidermacher, M.: Embedded systems security: practical methods for safe and secure software and systems development, 1st edn., xx, 396 p. Elsevier, Amsterdam (2012)

    Google Scholar 

  6. Lund, M.S., Solhaug, B., Stølen, K.: Model-driven risk analysis: the CORAS approach. Springer (2010)

    Google Scholar 

  7. Brændeland, G., Dahl, H.E.I., Engan, I., Stølen, K.: Using dependent CORAS diagrams to analyse mutual dependency. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 135–148. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Henniger, O., et al.: Securing vehicular on-board it systems: The evita project. In: VDI/VW Automotive Security Conference (2009)

    Google Scholar 

  9. OMG, OMG Systems Modeling Language (OMG SysML) V1.1, formal/2008-11-01, OMG (2008)

    Google Scholar 

  10. D’Souza, D.F., Wills, A.C.: Objects, Components, and Frameworks with UML: The Catalysis Approach. Addison-Wesley Professional (1998)

    Google Scholar 

  11. van Lamsweerde, A.: Requirements engineering: from system goals to UML models to software specifications. John Wiley & Sons Ltd. (2009)

    Google Scholar 

  12. Kletz, T.A.: Hazop and hazan: identifying and assessing process industry hazards, 3rd edn., viii, p. 150. Institute of Chemical Engineers. Rugby (1992)

    Google Scholar 

  13. Winther, R., Johnsen, O.-A., Gran, B.A.: Security assessments of safety critical systems using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol. 2187, pp. 14–24. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Van Arem, B., van Driel, C.J., Visser, R.: The impact of cooperative adaptive cruise control on traffic-flow characteristics. IEEE Transactions on Intelligent Transportation Systems 7(4), 429–436 (2006)

    Article  Google Scholar 

  15. Leveson, N.: Engineering a safer world: Systems thinking applied to safety. MIT Press (2011)

    Google Scholar 

  16. Young, W., Leveson, N.G.: An integrated approach to safety and security based on systems theory. Commun. ACM 57(2), 31–35 (2014)

    Article  Google Scholar 

  17. Kelling, E., et al.: Specification and evaluation of e-security relevant use cases. EVITA Deliverable D2.1, EVITA project (2009)

    Google Scholar 

  18. Ruddle, A., et al.: Security requirements for automotive on-board networks based on dark-side scenarios. EVITA Deliverable D2.3, EVITA project (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ito, M. (2014). Finding Threats with Hazards in the Concept Phase of Product Development. In: Barafort, B., O’Connor, R.V., Poth, A., Messnarz, R. (eds) Systems, Software and Services Process Improvement. EuroSPI 2014. Communications in Computer and Information Science, vol 425. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43896-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43896-1_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43895-4

  • Online ISBN: 978-3-662-43896-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics