{"id":"https://openalex.org/W3214233940","doi":"https://doi.org/10.1109/models50736.2021.00029","title":"Synthesizing Verified Components for Cyber Assured Systems Engineering","display_name":"Synthesizing Verified Components for Cyber Assured Systems Engineering","publication_year":2021,"publication_date":"2021-10-01","ids":{"openalex":"https://openalex.org/W3214233940","doi":"https://doi.org/10.1109/models50736.2021.00029","mag":"3214233940"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/models50736.2021.00029","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005072374","display_name":"Eric Mercer","orcid":"https://orcid.org/0000-0002-2264-2958"},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"funder","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Mercer","raw_affiliation_strings":["Department of Computer Science, Brigham Young University, Provo, Utah"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Brigham Young University, Provo, Utah","institution_ids":["https://openalex.org/I100005738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041337242","display_name":"Konrad Slind","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Konrad Slind","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033458131","display_name":"Isaac Amundson","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Isaac Amundson","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091588309","display_name":"Darren Cofer","orcid":"https://orcid.org/0000-0003-4928-908X"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Darren Cofer","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079444988","display_name":"Junaid Babar","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junaid Babar","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067020197","display_name":"David Hardin","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Hardin","raw_affiliation_strings":["Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota"],"affiliations":[{"raw_affiliation_string":"Applied Research and Technology, Collins Aerospace, Minneapolis, Minnesota","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.92,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.787623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"205","last_page":"215"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.997,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.996,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.7041101},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.62887293},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.474318},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.47071},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.4256353}],"concepts":[{"id":"https://openalex.org/C15792166","wikidata":"https://www.wikidata.org/wiki/Q221329","display_name":"Avionics","level":2,"score":0.7333683},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.7041101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.669057},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.62887293},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.47788015},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.474318},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.47071},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.4256353},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3871863},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3849618},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33913028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.295761},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22041065},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19757006},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14740047},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.14311191},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/models50736.2021.00029","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4,"display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":33,"referenced_works":["https://openalex.org/W115133185","https://openalex.org/W1548666647","https://openalex.org/W1590567996","https://openalex.org/W1594193927","https://openalex.org/W1995969393","https://openalex.org/W2039310738","https://openalex.org/W2069075127","https://openalex.org/W2069431083","https://openalex.org/W2107605224","https://openalex.org/W2125415493","https://openalex.org/W2128303158","https://openalex.org/W2136310957","https://openalex.org/W2140047472","https://openalex.org/W2218092420","https://openalex.org/W2529444955","https://openalex.org/W2534259254","https://openalex.org/W258090305","https://openalex.org/W2609686781","https://openalex.org/W2908480168","https://openalex.org/W2963790177","https://openalex.org/W3009630147","https://openalex.org/W3011728381","https://openalex.org/W3081331738","https://openalex.org/W3110167032","https://openalex.org/W3121734556","https://openalex.org/W3161332769","https://openalex.org/W3164325269","https://openalex.org/W3175461016","https://openalex.org/W3178426876","https://openalex.org/W3180770126","https://openalex.org/W4233281287","https://openalex.org/W4253591485","https://openalex.org/W4293651035"],"related_works":["https://openalex.org/W4398196867","https://openalex.org/W4389401673","https://openalex.org/W347335328","https://openalex.org/W2903497870","https://openalex.org/W2368944417","https://openalex.org/W2351307308","https://openalex.org/W2330706584","https://openalex.org/W2164976164","https://openalex.org/W1987259072","https://openalex.org/W1589297475"],"abstract_inverted_index":{"Cyber-physical":[0],"systems,":[1],"such":[2],"as":[3,28,195,197],"avionics,":[4],"must":[5],"be":[6],"tolerant":[7,16],"to":[8,17,50,98,123,135,165,190,199],"cyber-attacks":[9],"in":[10,53,73],"the":[11,101,125,129,132,136,146,171,182,185],"same":[12],"way":[13,133],"they":[14,20],"are":[15,113,120,143],"random":[18],"faults:":[19],"either":[21],"gracefully":[22],"recover":[23],"or":[24],"safely":[25],"shut":[26],"down":[27,134],"requirements":[29],"dictate.":[30],"The":[31,140,153],"DARPA":[32],"Cyber":[33],"Assured":[34],"Systems":[35,56],"Engineering":[36,57],"program":[37],"is":[38,96],"developing":[39],"tools":[40],"for":[41,109,178],"design,":[42],"analysis,":[43],"and":[44,76,82,95,119,205],"verification":[45],"that":[46,65,78,100,169],"enable":[47],"systems":[48],"engineers":[49],"design-in":[51],"cyber-resiliency":[52,68],"a":[54,71,158,166],"Model-Based":[55],"environment.":[58],"This":[59],"paper":[60,154],"describes":[61],"automated":[62],"model":[63,141,163,186],"transformations":[64,142,164,187],"introduce":[66],"high-assurance":[67,93,111],"components":[69,112],"into":[70,145],"system,":[72],"particular":[74],"filters":[75,189],"monitors":[77,198],"prevent":[79],"malicious":[80,206],"input":[81],"detect":[83],"supply":[84],"chain":[85],"attacks,":[86],"respectively.":[87],"A":[88],"formal":[89],"specification":[90],"defines":[91],"each":[92],"component,":[94],"used":[97],"verify":[99],"component":[102],"addresses":[103],"system":[104,168],"level":[105],"cyber":[106],"requirements.":[107],"Implementations":[108],"these":[110],"directly":[114],"synthesized":[115],"from":[116,209],"their":[117],"specifications,":[118],"automatically":[121],"proven":[122],"preserve":[124],"exact":[126],"meaning":[127],"of":[128],"specifications":[130],"all":[131],"binary":[137],"code":[138],"level.":[139],"integrated":[144],"Open":[147],"Source":[148],"AADL":[149],"Tool":[150],"Environment":[151],"(OSATE).":[152],"further":[155],"reports":[156],"on":[157],"case":[159,183],"study":[160],"applying":[161],"security-enhancing":[162],"UAV":[167],"uses":[170],"Air":[172],"Force":[173],"Research":[174],"Laboratory's":[175],"OpenUxAS":[176],"services":[177],"route":[179],"planning.":[180],"In":[181],"study,":[184],"add":[188],"guard":[191,200],"against":[192,201],"malformed":[193],"input,":[194],"well":[196],"ground":[202],"station":[203],"spoofing":[204],"flight":[207],"plans":[208],"OpenUxAS.":[210]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3214233940","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-04-18T00:31:07.884381","created_date":"2021-11-22"}