{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T09:05:28Z","timestamp":1743498328144,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,23]]},"DOI":"10.1109\/icsrs56243.2022.10067488","type":"proceedings-article","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T19:48:19Z","timestamp":1679428099000},"page":"418-423","source":"Crossref","is-referenced-by-count":2,"title":["Challenges in the Co-assurance of Functional Safety and Cybersecurity in Industry 4.0"],"prefix":"10.1109","author":[{"given":"Sanketh","family":"Ramachandra","sequence":"first","affiliation":[{"name":"KU Leuven,Department of Computer Science,Bruges,Belgium"}]},{"given":"Jens","family":"Vankeirsbilck","sequence":"additional","affiliation":[{"name":"KU Leuven,Department of Computer Science,Bruges,Belgium"}]},{"given":"Jeroen","family":"Boydens","sequence":"additional","affiliation":[{"name":"KU Leuven,Department of Computer Science,Bruges,Belgium"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-05624-1_1","article-title":"Towards the Next Generation of Industrial Cyber-Physical Systems","volume-title":"Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach","author":"Colombo","year":"2014"},{"key":"ref2","article-title":"The Safety Critical Systems Handbook: a Straightforward Guide to Functional Safety: IEC 61508 (2010 Edition)","volume-title":"IEC 61511 (2016 Edition) and Related Guidance Including Machinery and Other Industrial Sections","author":"Smith","year":"2020"},{"key":"ref3","article-title":"Claroty Biannual ICS Risk & Vulnerability Report: 1H 2021","volume-title":"Claroty Ltd., Tech. Rep","author":"Claroty","year":"2021"},{"key":"ref4","article-title":"OWASP Internet of Things Top 10 | OWASP Foundation"},{"journal-title":"International Society of Automation, Standard","article-title":"ISA-TR84.00.09-2017: Cybersecurity related to the functional safety lifecycle","year":"2017","key":"ref5"},{"article-title":"ENISA threat landscape for supply chain attacks","volume-title":"Publications Office, LU, Tech. Rep","year":"2021","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99229-7_26"},{"key":"ref8","article-title":"Assuring Safety and Security","volume-title":"Ph.D dissertation","author":"Johnson","year":"2020"},{"key":"ref9","first-page":"106773","article-title":"Combined automotive safety and security pattern engineering approach","volume-title":"Reliability Engineering & System Safety","volume":"198","author":"Martin","year":"2020"},{"volume-title":"ISO\/IEC\/IEEE 15026-1:2019: Systems and software engineering \u2014 Systems and software assurance \u2014 Part 1: Concepts and vocabulary","year":"2019","key":"ref10"},{"volume-title":"ISO\/TR 4804:2020: Road vehicles \u2014 safety and cybersecurity for automated driving systems \u2014 design, verification and validation","key":"ref11","first-page":"2020"},{"key":"ref12","article-title":"Code of Practice: Cyber Security and Safety","volume-title":"Institution of Engineering and Technology, Tech. Rep","author":"Williams","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2338"},{"key":"ref14","first-page":"211","article-title":"Model based system assurance using the structured assurance case metamodel","volume-title":"Journal of Systems and Software","volume":"154","author":"Wei","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-021-00537-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-020-00782-w"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-021-00934-w"},{"key":"ref18","article-title":"Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots","volume-title":"arXiv:2007.11099","volume":"81","author":"Gleirscher","year":"2022"},{"author":"Wood","key":"ref19","article-title":"Safety First for Automated Driving"},{"key":"ref20","article-title":"\u2018Lighthouse\u2019 manufacturers lead the way\u2014can the rest of the world keep up?","volume-title":"McKinsey&Company, Tech. Rep","author":"de Boer","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26601-1_21"},{"key":"ref22","article-title":"CWE - CWE-1358: Weaknesses in SEI ETF Categories of Security Vulnerabilities in ICS (4.7)"},{"issue":"1","key":"ref23","first-page":"34","article-title":"Building resilient medical technology supply chains with a software bill of materials","volume-title":"npj Digital Medicine","volume":"4","author":"Carmody","year":"2021"},{"volume-title":"Synopsys Inc., Tech. Rep","key":"ref24","article-title":"Open Source Security and Risk Analysis Report: 2022"},{"key":"ref25","article-title":"CVE List Downloads - 2021"},{"first-page":"10","article-title":"Using a Goal-Based Approach to Improve the IEC 61508-3 Software Safety Standard","author":"Myklebust","key":"ref26"},{"article-title":"Foresight challenges - A study to enable foresight on emerging and future cybersecurity challenges","volume-title":"European Union Agency for Cybersecurity, Tech. Rep","year":"2021","key":"ref27"},{"volume-title":"ISO\/IEC 5055:2021: Information technology \u2014 Software measurement \u2014 Software quality measurement \u2014 Automated source code quality measures","year":"2021","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8059-5_12"},{"key":"ref30","first-page":"181","article-title":"Challenges for the Self-Safety in Autonomous Vehicles","author":"Carre","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_1"},{"key":"ref32","first-page":"147","article-title":"Soteria: Automated {IoT} safety and security analysis","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Celik"},{"key":"ref33","first-page":"171","article-title":"Safety and Security Concept for Software Updates on Mixed-criticality Systems","volume-title":"2021 5th International Conference on System Reliability and Safety (ICSRS)","author":"Mugarza"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106868"}],"event":{"name":"2022 6th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2022,11,23]]},"location":"Venice, Italy","end":{"date-parts":[[2022,11,25]]}},"container-title":["2022 6th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10067250\/10067256\/10067488.pdf?arnumber=10067488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:08:19Z","timestamp":1707829699000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10067488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,23]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icsrs56243.2022.10067488","relation":{},"subject":[],"published":{"date-parts":[[2022,11,23]]}}}