Matches in SemOpenAlex for { <https://semopenalex.org/work/W132790106> ?p ?o ?g. }
- W132790106 endingPage "33" @default.
- W132790106 startingPage "19" @default.
- W132790106 abstract "Man-machine systems have several desirable properties, as to user friendliness, reliability, safety, security or other global system attributes. The potential for the lack, or breaches, of any such property constitutes a system vulnerability, which can lead to a situation that is undesirable from user’s point of view. This undesired situation could be triggered by special events in the form of intended, or unintended, attacks from the system’s environment. We view the undesirable system features as the sum of the situations, which are, mathematically speaking, complementary to the desirable ones that must be taken into account from the very beginning of the system development to achieve a stable system behavior and a robust operation. This work is about the modeling, analysis and testing of both desirable and undesirable system features which can be viewed as relations between the system and its operation. 1. Critical Features and Vulnerabilities of Embedded Systems In terms of behavioral patterns, the relationships between the system and its environment, i.e., the user, the natural environment, etc., can be described as proactive, reactive or interactive. In the case of proactivity, the system generates the stimuli, which evoke the activity of its environment. In the case of reactivity, the system behavior evolves through its responses to stimuli generated by its environment. Most computerhuman interfaces are nowadays interactive in the sense that the user and the system can be both proand reactive. In this particular kind of system, the user interface (UI) can have another environment, that is, the plant, the device or the equipment, which the UI is intended for and embedded in, controlling technical processes. When categorizing behavioral aspects of the human-computer systems, it is a good principle to start with the ergonomic aspects which concern the extent of comfort, or discomfort, experienced by the system and its environment at each other’s company. Any vulnerability is always accompanied by threats. In the case of safety, the threat originates from within the system due to potential failures and its spill-over effects causing potentially extensive damage to its environment. In the face of such failures, the environment could be a helpless, passive victim. The goal of the system design in this case is to prevent faults that could potentially lead to such failures or, in worst cases, to mitigate the consequences at run-time should such failures ever occur. In the case of security, the system is exposed to external threats originating from the environment, causing losses to the proprietor of the system. In this case, the environment, typically the user, maybe unauthorized, can be malicious or deliberately aggressive. The goal of the system design is then to ensure that it can protect itself against such malicious attacks. In contrast to safety and security, the lack of user friendliness of a UI is a milder form of system vulnerability. A failure to be user-friendly is still a failure to fulfill a system attribute, though it may typically cause an annoyance or an irritant to the user, possibly leading to confusion and complaints. However, disastrous consequences cannot be entirely ruled out under stressed conditions of the user if the UI is intended to mediate between a safety critical application and its operator. Since safety is being considered here as a system vulnerability in its own right, we limit ourselves here to the UIs of modest applications designed to guide and help the user to navigate through, and explore, the system functionality. Having identified several differences and distinctions between certain system vulnerabilities, let us abstract away from these peculiarities and threat them all in a generic manner in the following section. Further sections will illustrate our approach through a case study considering user interactions as a special case. An earlier version of the approach was introduced in [BE01]. The present study generalizes the approach and extends its scope of application. 2. Finite State Modeling of System Vulnerabilities 2.1 Modeling the System and Its Environment The functionality f of an application is described here as a deterministic finite-state automaton (FSA)" @default.
- W132790106 created "2016-06-24" @default.
- W132790106 creator A5032198822 @default.
- W132790106 creator A5038764694 @default.
- W132790106 creator A5077251668 @default.
- W132790106 date "2004-01-01" @default.
- W132790106 modified "2023-09-26" @default.
- W132790106 title "Finite-State Modeling, Analysis and Testing of System Vulnerabilities." @default.
- W132790106 cites W1522356291 @default.
- W132790106 cites W1539457702 @default.
- W132790106 cites W1567452806 @default.
- W132790106 cites W1577034617 @default.
- W132790106 cites W1577384748 @default.
- W132790106 cites W1809844233 @default.
- W132790106 cites W1821647582 @default.
- W132790106 cites W1964446022 @default.
- W132790106 cites W1967181601 @default.
- W132790106 cites W1968054699 @default.
- W132790106 cites W2005150099 @default.
- W132790106 cites W2011715836 @default.
- W132790106 cites W2011762419 @default.
- W132790106 cites W2025618033 @default.
- W132790106 cites W2034476614 @default.
- W132790106 cites W2049139227 @default.
- W132790106 cites W2055647675 @default.
- W132790106 cites W2056102643 @default.
- W132790106 cites W2071136304 @default.
- W132790106 cites W2074304694 @default.
- W132790106 cites W2105917883 @default.
- W132790106 cites W2113457891 @default.
- W132790106 cites W2114298495 @default.
- W132790106 cites W2117141328 @default.
- W132790106 cites W2122796178 @default.
- W132790106 cites W2129214591 @default.
- W132790106 cites W2129395888 @default.
- W132790106 cites W2132840411 @default.
- W132790106 cites W2148898704 @default.
- W132790106 cites W2149366752 @default.
- W132790106 cites W2150674674 @default.
- W132790106 cites W2152465173 @default.
- W132790106 cites W2156411624 @default.
- W132790106 cites W2167762898 @default.
- W132790106 cites W2169408654 @default.
- W132790106 cites W2615372411 @default.
- W132790106 cites W627463771 @default.
- W132790106 hasPublicationYear "2004" @default.
- W132790106 type Work @default.
- W132790106 sameAs 132790106 @default.
- W132790106 citedByCount "1" @default.
- W132790106 crossrefType "proceedings-article" @default.
- W132790106 hasAuthorship W132790106A5032198822 @default.
- W132790106 hasAuthorship W132790106A5038764694 @default.
- W132790106 hasAuthorship W132790106A5077251668 @default.
- W132790106 hasConcept C107457646 @default.
- W132790106 hasConcept C111472728 @default.
- W132790106 hasConcept C111919701 @default.
- W132790106 hasConcept C11413529 @default.
- W132790106 hasConcept C121332964 @default.
- W132790106 hasConcept C137176749 @default.
- W132790106 hasConcept C138885662 @default.
- W132790106 hasConcept C142944206 @default.
- W132790106 hasConcept C15744967 @default.
- W132790106 hasConcept C162324750 @default.
- W132790106 hasConcept C163258240 @default.
- W132790106 hasConcept C167063184 @default.
- W132790106 hasConcept C167822520 @default.
- W132790106 hasConcept C187736073 @default.
- W132790106 hasConcept C189950617 @default.
- W132790106 hasConcept C2777499013 @default.
- W132790106 hasConcept C38652104 @default.
- W132790106 hasConcept C41008148 @default.
- W132790106 hasConcept C43214815 @default.
- W132790106 hasConcept C542102704 @default.
- W132790106 hasConcept C62520636 @default.
- W132790106 hasConcept C76155785 @default.
- W132790106 hasConcept C89505385 @default.
- W132790106 hasConcept C95713431 @default.
- W132790106 hasConceptScore W132790106C107457646 @default.
- W132790106 hasConceptScore W132790106C111472728 @default.
- W132790106 hasConceptScore W132790106C111919701 @default.
- W132790106 hasConceptScore W132790106C11413529 @default.
- W132790106 hasConceptScore W132790106C121332964 @default.
- W132790106 hasConceptScore W132790106C137176749 @default.
- W132790106 hasConceptScore W132790106C138885662 @default.
- W132790106 hasConceptScore W132790106C142944206 @default.
- W132790106 hasConceptScore W132790106C15744967 @default.
- W132790106 hasConceptScore W132790106C162324750 @default.
- W132790106 hasConceptScore W132790106C163258240 @default.
- W132790106 hasConceptScore W132790106C167063184 @default.
- W132790106 hasConceptScore W132790106C167822520 @default.
- W132790106 hasConceptScore W132790106C187736073 @default.
- W132790106 hasConceptScore W132790106C189950617 @default.
- W132790106 hasConceptScore W132790106C2777499013 @default.
- W132790106 hasConceptScore W132790106C38652104 @default.
- W132790106 hasConceptScore W132790106C41008148 @default.
- W132790106 hasConceptScore W132790106C43214815 @default.
- W132790106 hasConceptScore W132790106C542102704 @default.
- W132790106 hasConceptScore W132790106C62520636 @default.