Security informed safety assessment of industrial FPGA-based systems
Access Status
Authors
Date
2014Type
Metadata
Show full item recordCitation
Source Title
Additional URLs
School
Collection
Abstract
The strong interconnection and interrelation of safety and security properties of industrial system which are based on programmable logic (field programmable gate arrays, FPGA) is reviewed. Information security, i.e. system's ability to protect the information and data from unauthorized access and modification, is a subordinate property with respect to safety of many instrumentation and control systems (I&Cs), primarily to the NPP reactor trip systems. Such subordination may be taken into account by implementation of security informed safety (SIS) approach. The methodology for safety assessment of FPGA-based systems which are widely used in industrial critical systems is described. It is based on joint using of security analysis techniques (GAP-analysis and intrusion modes, effects and criticality IMECA analysis) and also their reflection on the final safety assessment picture of the system with two channels. This methodology forms so called security informed safety approach. Additional aspects of safety assessment of diverse instrumentation and control FPGA-based systems for safety-critical application are described.
Related items
Showing items related by title, author, creator and subject.
-
Nugraheni, Fitri (2008)This thesis sets out research carried out to investigate the usefulness of a descriptive database of construction methods for safety assessment. In addition, it investigates the possibility of utilising construction images ...
-
Abdullah, Nor Azimah Chew Binti (2010)All industries in Malaysia, including government organizations, have had to comply with the Occupational Safety and Health Act 1994 to fulfill their responsibilities as an employer to ensure that workers have a safe ...
-
Szefer, J.; Zhang, W.; Chen, Y.; Champagne, D.; Chan, King-Sun; Li, W.; Cheung, R.; Lee, R. (2011)Secure processors have become increasingly important for trustworthy computing as security breaches escalate. By providing hardware-level protection, a secure processor ensures a safe computing environment where confidential ...