Runtime assurance for safety-critical systems: An introduction to safety filtering approaches for complex control systems

KL Hobbs, ML Mote, MCL Abate… - IEEE Control …, 2023 - ieeexplore.ieee.org
More than three miles above the Arizona desert, an F-16 student pilot experienced a gravity-
induced loss of consciousness, passing out while turning at nearly 9Gs (nine times the force …

The HACMS program: using formal methods to eliminate exploitable bugs

K Fisher, J Launchbury… - … Transactions of the …, 2017 - royalsocietypublishing.org
For decades, formal methods have offered the promise of verified software that does not
have exploitable bugs. Until recently, however, it has not been possible to verify software of …

An ontological metamodel for cyber-physical system safety, security, and resilience coengineering

G Bakirtzis, T Sherburne, S Adams… - Software and Systems …, 2022 - Springer
Cyber-physical systems are complex systems that require the integration of diverse software,
firmware, and hardware to be practical and useful. This increased complexity is impacting …

Early validation of system requirements and design through correctness-by-construction

E Stachtiari, A Mavridou, P Katsaros, S Bliudze… - Journal of Systems and …, 2018 - Elsevier
Early validation of requirements aims to reduce the need for the high-cost validation testing
and corrective measures at late development stages. This work introduces a systematic …

Run-time assurance for learning-based aircraft taxiing

D Cofer, I Amundson, R Sattigeri… - 2020 AIAA/IEEE 39th …, 2020 - ieeexplore.ieee.org
Aircraft systems that include learning-enabled components (LECs) and their software
implementations are not amenable to verification and certification using current methods …

[HTML][HTML] A model-based methodology to support systems security design and assessment

A Shaked - Journal of Industrial Information Integration, 2023 - Elsevier
Addressing cybersecurity aspects while designing systems is challenging. As our systems
increasingly rely on digital technology to perform, security and resilience aspects need to be …

Compositional verification of a medical device system

A Murugesan, MW Whalen, S Rayadurgam… - Proceedings of the …, 2013 - dl.acm.org
Complex systems are by necessity hierarchically organized. Decomposition into subsystems
allows for intellectual control, as well as enabling different subsystems to be created by …

A formal approach to constructing secure air vehicle software

D Cofer, A Gacek, J Backes, MW Whalen, L Pike… - Computer, 2018 - ieeexplore.ieee.org
Current approaches to cyberresiliency rely on patching systems after a vulnerability is
discovered. What is needed is a clean-slate, mathematically based approach for building …

Synthesizing verified components for cyber assured systems engineering

E Mercer, K Slind, I Amundson, D Cofer, J Babar… - Software and Systems …, 2023 - Springer
Safety-critical systems such as avionics need to be engineered to be cyber resilient meaning
that systems are able to detect and recover from attacks or safely shutdown. As there are few …

Towards realizability checking of contracts using theories

A Gacek, A Katis, MW Whalen, J Backes… - NASA Formal Methods …, 2015 - Springer
Virtual integration techniques focus on building architectural models of systems that can be
analyzed early in the design cycle to try to lower cost, reduce risk, and improve quality of …