Abstract is missing.
- A Simulated Fault Injection Framework for Time-Triggered Safety-Critical Embedded SystemsIban Ayestaran, Carlos Fernando Nicolas, Jon Perez, Asier Larrucea, Peter P. Puschner. 1-16 [doi]
- Rapid Fault-Space Exploration by Evolutionary PruningHorst Schirmeier, Christoph Borchert, Olaf Spinczyk. 17-32 [doi]
- Safety Validation of Sense and Avoid Algorithms Using Simulation and Evolutionary SearchXueyi Zou, Rob Alexander, John McDermid. 33-48 [doi]
- Debugging with Timed Automata MutationsBernhard K. Aichernig, Klaus Hörmaier, Florian Lorber. 49-64 [doi]
- Systematic Derivation of Functional Safety Requirements for Automotive SystemsKristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel. 65-80 [doi]
- Making Implicit Safety Requirements Explicit - An AUTOSAR Safety CaseThomas Arts, Michele Dorigatti, Stefano Tonetta. 81-92 [doi]
- Securing Vehicle Diagnostics in Repair ShopsPierre Kleberger, Tomas Olovsson. 93-108 [doi]
- Analysis of Persistence of Relevance in Systems with Imperfect Fault CoverageJianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno. 109-124 [doi]
- Exploiting Narrow Data-Width to Mask Soft Errors in Register FilesJianjun Xu, Qingping Tan, Zeming Shao, Hong-ning. 125-138 [doi]
- Towards a Clearer Understanding of Context and Its Role in Assurance Argument ConfidencePatrick John Graydon. 139-154 [doi]
- Assurance Cases for Block-Configurable SoftwareRichard Hawkins, Alvaro Miyazawa, Ana Cavalcanti, Tim Kelly, John Rowlands. 155-169 [doi]
- Generation of Safety Case Argument-Fragments from Safety ContractsIrfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson. 170-185 [doi]
- Estimating Worst Case Failure Dependency with Partial Knowledge of the Difficulty FunctionPeter G. Bishop, Lorenzo Strigini. 186-201 [doi]
- Proving the Absence of Stack OverflowsDaniel Kästner, Christian Ferdinand. 202-213 [doi]
- Trust-Based Intrusion Tolerant Routing in Wireless Sensor NetworksFrancesco Buccafurri, Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Gianluca Lax, Antonino Nocera, Luigi Romano. 214-229 [doi]
- A Petri Net Pattern-Oriented Approach for the Design of Physical Protection SystemsFrancesco Flammini, Ugo Gentile, Stefano Marrone, Roberto Nardone, Valeria Vittorini. 230-245 [doi]
- On Two Models of Noninterference: Rushby and Greve, Wilding, and VanfleetAdrian Garcia Ramirez, Julien Schmaltz, Freek Verbeek, Bruno Langenstein, Holger Blasum. 246-261 [doi]
- Specifying Safety Monitors for Autonomous Systems Using Model-CheckingMathilde Machin, Fanny Dufossé, Jean-Paul Blanquart, Jérémie Guiochet, David Powell, Hélène Waeselynck. 262-277 [doi]
- Automatically Generated Safety Mechanisms from Semi-Formal Software Safety RequirementsRaphael Fonte Boa Trindade, Lukas Bulwahn, Christoph Ainhauser. 278-293 [doi]
- Querying Safety CasesEwen Denney, Dwight Naylor, Ganesh Pai. 294-309 [doi]
- Security Application of Failure Mode and Effect Analysis (FMEA)Christoph Schmittner, Thomas Gruber, Peter P. Puschner, Erwin Schoitsch. 310-325 [doi]
- Safety and Security Interactions Modeling Using the BDMP Formalism: Case Study of a PipelineSiwar Kriaa, Marc Bouissou, Frederic Colin, Yoran Halgand, Ludovic Pietre-Cambacedes. 326-341 [doi]
- A Pragmatic Approach towards Safe and Secure Medical Device IntegrationChristoph Woskowski. 342-353 [doi]