Specification of Safety, Security and Performance Analysis and Assessment Techniques
Total Page:16
File Type:pdf, Size:1020Kb
Ref. Ares(2018)2282883 - 30/04/2018 Deliverable 3.1 Specification of Safety, Security and Performance Analysis and Assessment Techniques This project has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 737475. This Joint Undertaking receives support from the European Union’s Horizon 2020 research and innovation programme and Spain, France, United Kingdom, Austria, Italy, Czech Republic, Germany. The author is solely responsible for its content, it does not represent the opinion of the European Community and the Community is not responsible for any use that might be made of data appearing therein. AQUAS D3.1 Specification of Safety, Security and Performance Analysis and Assessment Techniques Version 1.0 DISSEMINATION LEVEL X PU Public CO Confidential, only for members of the consortium (including the Commission Services) COVER AND CONTROL PAGE OF DOCUMENT Project Acronym: AQUAS Project Full Name: Aggregated Quality Assurance in Systems Grant Agreement No.: 737475 Programme ICT-1: Cyber-Physical-Systems Instrument: Research & innovation action Start date of project: 01.05.2017 Duration: 36 months Deliverable No.: D3.1 Document name: Specification of Safety, Security and Performance Analysis and Assessment Techniques Work Package WP3 Associated Task Task 3.1 Nature 1 R Dissemination Level 2 PU Version: 1.0 Actual Submission Date: 30-04-2018 Contractual Submission Date 30-04-2018 Editor: Stefano Di Gennaro Institution: UNIVAQ E-mail: [email protected] 1 R=Report, DEC= Websites, patents filling, etc., O=Other 2 PU=Public, CO=Confidential, only for members of the consortium (including the Commission Services) © AQUAS Consortium 2 AQUAS D3.1 Specification of Safety, Security and Performance Analysis and Assessment Techniques Version 1.0 Change Control Document History Version Date Change History Author(s) Organisation(s) 0.9 17.4.2018 First submission Stefano Di Gennaro UNIVAQ 1.0 30.4.2018 Final version after quality Filip Veljković, Peter TASE, CITY review Popov and Lorenzo Strigini Distribution List Date Issue Group 17.2.2018 0.1 WP2, WP3, WP4 17.4.2018 0.9 Leaders 30.4.2018 1.0 AQUAS.ALL © AQUAS Consortium 3 AQUAS D3.1 Specification of Safety, Security and Performance Analysis and Assessment Techniques Version 1.0 Table of Contents Executive Summary ................................................................................................................................. 8 1 Introduction ............................................................................................................................. 9 2 Methods and techniques for the assessment of safety, security and performance .......... 10 2.1 Software/security co-engineering method based on models and static code analysis [CEA]10 2.1.1 Software development process ............................................................................................. 10 2.1.2 Security engineering process ................................................................................................. 11 2.1.3 Static code analysis ................................................................................................................ 12 2.2 Art2kitekt [ITI] ........................................................................................................................ 12 2.3 Experimental data collection and associated analyses for safety, security and performance assessment [City] ................................................................................................................................... 13 2.3.1 Examples of empirical studies for reliability/safety analysis – Diversity Seeking Decisions (DSDs) 14 2.3.2 Examples of empirical studies for security analysis – Diverse AntiVirus Software ................ 15 2.3.3 Examples of empirical studies for performance analysis – Diverse Database Replication (DivSQL) 16 2.4 Design and Development of Mixed–Criticality System Applications [UNIVAQ] .................... 17 2.5 Security Problems of Fault Detection and Isolation [UNIVAQ] .............................................. 18 2.6 SysML–Sec [MTTP] ................................................................................................................. 19 2.7 Support for Real Time Software Development using CHESS [INT] ........................................ 20 2.8 Support for Contract-based Design using CHESS [INT] .......................................................... 22 2.9 Support for Safety and Dependability using CHESS [INT] ...................................................... 23 2.10 Safety and Security co-engineering with Safety Architect and Cyber Architect [A4T] .......... 24 2.11 Security aspects of software development in a product life cycle [TrustPort] ...................... 26 2.12 System assurance analysis method [Tecnalia] ....................................................................... 28 2.12.1 Assurance cases specification ................................................................................................ 29 2.12.2 Structured Assurance Case Metamodel ................................................................................ 29 2.12.3 Evidence Management .......................................................................................................... 30 2.12.4 Compliance Management ...................................................................................................... 31 2.13 Tooled Approach for Performance Evaluation Before Implementation [TRT] ...................... 32 2.14 Performance Analysis Through Design Architecture [TRT] .................................................... 33 2.15 Tracking the interdependence of Safety, Security and Performance [Magillem] ................. 35 2.16 Dynamic Analysis of Multi-threaded Applications [BUT] ....................................................... 35 © AQUAS Consortium 4 AQUAS D3.1 Specification of Safety, Security and Performance Analysis and Assessment Techniques Version 1.0 2.17 Static Analysis of Pointer Manipulating Programs [BUT] ....................................................... 36 2.18 Static and Dynamic Performance Analysis of Programs [BUT] .............................................. 36 2.19 Efficient Methodologies for the Development of Formally Verified System Software [HSRM] 37 2.20 Probabilistic State–Based Models for Safety, Security and Performance Evaluation [City] .. 39 2.21 Analysis of Diversity and Defence–in–Depth in Reliability, Safety and Security [City] .......... 42 2.21.1 Background and kinds of analysis .......................................................................................... 42 2.21.2 Applications to security and trade-offs .................................................................................. 43 2.21.3 Summary for application in AQUAS ....................................................................................... 43 2.22 Astrée and RuleChecker [AbsInt] ........................................................................................... 44 3 Application of the Analysis Techniques to the AQUAS Demonstrators .............................. 47 3.1 Air Traffic Management ......................................................................................................... 47 3.1.1 Data Distribution Service [City] .............................................................................................. 47 3.1.2 Design Methodologies and Benchmarking for Hypervisor Technologies [UNIVAQ] ............. 49 UNIVAQ methodology takes into account application models using Concurrent Sequential Processes (CSP) Model of Computation (MoC) as input model, and considering also Model-to-Model transformation to directly manages and extract as-much-as-possible system functionalities and requirements from different AQUAS tools. .......................................................................................... 49 3.1.3 System design and analysis with CHESS [Intecs].................................................................... 50 3.1.4 Efficient Methodologies for the Development of Formally Verified System Software [HSRM] 50 3.1.5 Dynamic analysis of concurrency [BUT] ................................................................................. 51 3.1.6 Security analysis, standards compliance [TrustPort] ............................................................. 52 3.1.7 Static Astree Analysis of PikeOS Kernel [SYSGO] ................................................................... 52 3.1.8 Model Based Testing for Multiple Concerns [AIT] ................................................................. 53 3.1.9 Proving the Absence of Runtime Errors and Rule Violations [AbsInt] ................................... 55 3.2 Medical Devices ..................................................................................................................... 56 3.2.1 Security Analysis through Model-Based Formal Static Code Analysis [CEA] ......................... 56 3.2.2 Test and Quality Management [ITI] ....................................................................................... 57 3.2.3 Applying Medini Analyze to the Medical Domain [AMT]....................................................... 57 3.2.4 Support for Risk Management with Safety Architect and Cyber Architect [ALL4TEC] .......... 58 3.2.5 Modelling and simulation of a patient [BUT] ......................................................................... 59 3.2.6 Engineering