scholarly journals Compare of Formal Analysis and Testing for Verification of Safety-critical Systems: a Case Study

Author(s):  
Juan Zhang ◽  
Guoqi Li ◽  
Xiao Liu
2013 ◽  
Vol 765-767 ◽  
pp. 1227-1230
Author(s):  
Juan Zhang ◽  
Guo Qi Li ◽  
Xiao Liu

Safety-critical system attracts more attention in recent years. During the development of safety-critical systems, verification plays the most important role and includes many high cost activities. Testing and formal analysis are two mainstream ways for verification. This paper describes new tools and procedures for testing and formal analysis for verification of safety-critical systems. Compare them in detail in a case study. Conclusion and future works are given finally.


2021 ◽  
pp. 41-57
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.


Sign in / Sign up

Export Citation Format

Share Document