{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:18:48Z","timestamp":1767907128566,"version":"3.49.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319278681","type":"print"},{"value":"9783319278698","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27869-8_17","type":"book-chapter","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T09:44:07Z","timestamp":1451900647000},"page":"293-308","source":"Crossref","is-referenced-by-count":11,"title":["Designing Safe and Secure Embedded and Cyber-Physical Systems with SysML-Sec"],"prefix":"10.1007","author":[{"given":"Ludovic","family":"Apvrille","sequence":"first","affiliation":[]},{"given":"Yves","family":"Roudier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,5]]},"reference":[{"issue":"1\u20132","key":"17_CR1","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11416-012-0162-3","volume":"8","author":"A Apvrille","year":"2012","unstructured":"Apvrille, A., Strazzere, T.: Reducing the window of opportunity for android malware Gotta catch \u2019em all. J. Comput. Virol. 8(1\u20132), 61\u201371 (2012). \n                    http:\/\/dx.doi.org\/10.1007\/s11416-012-0162-3","journal-title":"J. Comput. Virol."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Apvrille, L., De Saqui-Sannes, P.: Requirements analysis. Embedded Systems: Analysis and Modeling with SysML, UML and AADL (2013)","DOI":"10.1002\/9781118569535.ch5"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Apvrille, L., Muhammad, W., Ameur-Boulifa, R., Coudert, S., Pacalet, R.: A UML-based environment for system design space exploration. In: 13th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2006, pp. 1272\u20131275, December 2006","DOI":"10.1109\/ICECS.2006.379694"},{"key":"17_CR4","unstructured":"Apvrille, L., Roudier, Y.: SysML-Sec: a SysML environment for the design and development of secure embedded systems. In: APCOSEC 2013, Yokohama, Japan, September 2013"},{"key":"17_CR5","unstructured":"Apvrille, L., De Saqui Sannes, P.: AVATAR\/TTool: un environnement en mode libre pour SysML temps r\u00e9el. G\u00e9nie Logiciel (98), 22\u201326, September 2011"},{"key":"17_CR6","unstructured":"Apvrille, L., Becoulet, A.: Prototyping an embedded automotive system from its UML\/SysML models. In: ERTSS 2012, Toulouse, France, February 2012"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281\u2013285. Springer, Heidelberg (2005)"},{"key":"17_CR8","unstructured":"Assolini, F.: The Tale of One Thousand and One DSL Modems, kaspersky lab, October 2012. \n                    http:\/\/www.securelist.com\/en\/blog\/208193852\/The_tale_of_one_thousand_and_one_DSL_modems"},{"issue":"4","key":"17_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MC.2003.1193228","volume":"36","author":"F Balarin","year":"2003","unstructured":"Balarin, F., Watanabe, Y., Hsieh, H., Lavagno, L., Passerone, C., Sangiovanni-Vincentelli, A.: Metropolis: an integrated electronic system design environment. Computer 36(4), 45\u201352 (2003)","journal-title":"Computer"},{"key":"17_CR10","volume-title":"Extreme Programming Explained: Embrace Change","author":"K Beck","year":"2004","unstructured":"Beck, K., Andres, C.: Extreme Programming Explained: Embrace Change, 2nd edn. Addison-Wesley Professional, New York (2004)","edition":"2"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-27755-2_3","volume-title":"Lectures on Concurrency and Petri Nets","author":"J Bengtsson","year":"2004","unstructured":"Bengtsson, J., Yi, W.: Timed automata: semantics, algorithms and tools. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) ACPN 2003. LNCS, vol. 3098, pp. 87\u2013124. Springer, Heidelberg (2004)"},{"issue":"4","key":"17_CR12","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","volume":"17","author":"B Blanchet","year":"2009","unstructured":"Blanchet, B.: Automatic verification of correspondences for security protocols. J. Comput. Secur. 17(4), 363\u2013434 (2009)","journal-title":"J. Comput. Secur."},{"key":"17_CR13","unstructured":"Dacier, M., Deswarte, Y., Ka\u00e2niche, M.: Information systems security. In: Models and Tools for Quantitative Assessment of Operational Security, pp. 177\u2013186. Chapman & Hall Ltd., London (1996). \n                    http:\/\/dl.acm.org\/citation.cfm?id=265514.265530"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/3-540-48249-0_40","volume-title":"Computer Safety, Reliability and Security","author":"DP Eames","year":"1999","unstructured":"Eames, D.P., Moffett, J.D.: The integration of safety and security requirements. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol. 1698, pp. 468\u2013480. Springer, Heidelberg (1999)"},{"key":"17_CR15","unstructured":"Esser, S.: Exploiting the iOS Kernel. In: BlackHat 2011 (2011)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-73368-3_18","volume-title":"Computer Aided Verification","author":"H Garavel","year":"2007","unstructured":"Garavel, H., Mateescu, R., Lang, F., Serwe, W.: CADP 2006: a toolbox for the construction and analysis of distributed processes. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 158\u2013163. Springer, Heidelberg (2007)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Huang, A.: Keeping Secrets in Hardware: the Microsoft XBox Case Study, AI Memo 2002\u2013008, Massachusetts Institute of Technology, Artificial Intelligence Laboratory. Technical report (2002)","DOI":"10.1007\/3-540-36400-5_17"},{"key":"17_CR18","unstructured":"Jaber, C.: High-Level SoC Modeling and Performance Estimation Applied to a Multi-CoreImplementation of LTE EnodeB Physical Layer. Ph.D. thesis, Telecom ParisTech (2011)"},{"key":"17_CR19","unstructured":"Kelling, E., Friedewald, M., Leimbach, T., Menzel, M., S\u00e4ger, P., Seudi\u00e9, H., Weyl, B.: Specification and Evaluation of e-Security Relevant Use cases. Technical report Deliverable D2.1, EVITA Project (2009)"},{"issue":"1","key":"17_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1921532.1921556","volume":"36","author":"D Knorreck","year":"2011","unstructured":"Knorreck, D., Apvrille, L., De Saqui-Sannes, P.: TEPE: a SysML language for time-constrained property modeling and formal verification. ACM SIGSOFT Softw. Eng. Notes 36(1), 1\u20138 (2011)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 447\u2013462. IEEE Computer Society, Washington, DC (2010). \n                    http:\/\/dx.doi.org\/10.1109\/SP.2010.34","DOI":"10.1109\/SP.2010.34"},{"key":"17_CR22","unstructured":"Maslennikov, D.: Russian cybercriminals on the move: profiting from mobile malware. In: The 20th Virus Bulletin International Conference, Vancouver, Canada, pp. 84\u201389, October 2010"},{"key":"17_CR23","unstructured":"Maynor, D.: Scada security and terrorism: We\u2019re not crying wolf! In: Invited presentation at BlackHat BH 2006, USA (2006). \n                    https:\/\/www.blackhat.com\/presentations\/bh-federal-06\/BH-Fed-06-Maynor-Graham-up.pdf"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Nhlabatsi, A., Nuseibeh, B., Yu, Y.: Security Requirements Engineering for Evolving Software Systems: a survey. Technical report 1, The Open University (2010)","DOI":"10.4018\/jsse.2010102004"},{"issue":"3","key":"17_CR25","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/2.910904","volume":"34","author":"B Nuseibeh","year":"2001","unstructured":"Nuseibeh, B.: Weaving together requirements and architectures. IEEE Comput. 34(3), 115\u2013117 (2001)","journal-title":"IEEE Comput."},{"key":"17_CR26","unstructured":"OMG: OMG Profile for Scheduling, Performance and Time (2005). \n                    http:\/\/www.omg.org\/spec\/SPTP\/"},{"key":"17_CR27","unstructured":"OMG: OMG Systems Modeling Language (2012). \n                    http:\/\/www.sysml.org\/specs\/"},{"key":"17_CR28","unstructured":"Pedroza, G.: Assisting the design of secured applications for mobile vehicles. In: Ph.D. of Ecole doctorale informatique, t\u00e9l\u00e9communications et \u00e9lectronique of Paris, January 2013"},{"key":"17_CR29","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.ress.2012.09.011","volume":"110","author":"L Pietre-Cambacedes","year":"2013","unstructured":"Pietre-Cambacedes, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110\u2013126 (2013)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"4","key":"17_CR30","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1016\/j.jss.2012.12.002","volume":"86","author":"C Raspotnig","year":"2013","unstructured":"Raspotnig, C., Opdahl, A.L.: Comparing risk identification techniques for safety and security requirements. J. Syst. Softw. 86(4), 1124\u20131151 (2013)","journal-title":"J. Syst. Softw."},{"key":"17_CR31","unstructured":"Schneier, B.: Attack Trees: Modeling Security Threats, December 1999"},{"key":"17_CR32","unstructured":"Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., Scheuermann, D.: C2x communication: securing the last meter. In: The 4th IEEE International Symposium on Wireless Vehicular Communications, WIVEC 2011, San Francisco, USA, September 2011"},{"key":"17_CR33","unstructured":"SCIP: VulDB: Hospira Lifecare PCA Infusion Pump 412 Telnet Service weak authentication, April 2015. \n                    http:\/\/www.scip.ch\/en\/?vuldb.75158"},{"key":"17_CR34","unstructured":"Teso, H.: Aircraft Hacking. In: HITB Security Conference, Amsterdam, The Netherlands (2013)"},{"key":"17_CR35","first-page":"196","volume":"9","author":"A Lamsweerde Van","year":"2007","unstructured":"Van Lamsweerde, A.: Engineering requirements for system reliability and security. Softw. Syst. Reliab. Secur. 9, 196\u2013238 (2007)","journal-title":"Softw. Syst. Reliab. Secur."},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Vidal, J., de Lamotte, F., Gogniat, G., Soulard, P., Diguet, J.P.: A co-design approach for embedded system modeling and code generation with UML and MARTE. In: Design, Automation and Test in Europe Conference and Exhibition, DATE 2009, pp. 226\u2013231, April 2009","DOI":"10.1109\/DATE.2009.5090662"},{"key":"17_CR37","doi-asserted-by":"crossref","unstructured":"Vigo, R., Nielson, F., Nielson, H.: Automated generation of attack trees. In: 2014 IEEE 27th Computer Security Foundations Symposium (CSF), pp. 337\u2013350, July 2014","DOI":"10.1109\/CSF.2014.31"},{"key":"17_CR38","volume-title":"All About Agile: Agile Management Made Easy!","author":"K Waters","year":"2012","unstructured":"Waters, K.: All About Agile: Agile Management Made Easy!. CreateSpace Independent Publishing Platform, Seattle (2012)"}],"container-title":["Communications in Computer and Information Science","Model-Driven Engineering and Software Development"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27869-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T04:18:00Z","timestamp":1559362680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27869-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319278681","9783319278698"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27869-8_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}