Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vikash Katta is active.

Publication


Featured researches published by Vikash Katta.


BMMDS/EMMSAD | 2012

A Combined Process for Elicitation and Analysis of Safety and Security Requirements

Christian Raspotnig; Peter Karpati; Vikash Katta

The aim of safety and security assessments are very similar since they both consider harm during system development. However, they apply different means for it and are performed in separated processes. As security and safety areas are merging in new systems that are critical, and more openly interconnected, there is a need to relate the different processes during the development. A combined assessment process could save resources compared to separated safety and security assessments, as well as support the understanding of mutual constraints and the resolution of conflicts between the two areas. We suggest a combined method covering the harm identification and analysis part of the assessment process using UML-based models. The process is applied on a case from the Air Traffic Management domain. Experts’ opinions about the results have also been collected for feedback.


the practice of enterprise modeling | 2010

Comparing Two Techniques for Intrusion Visualization

Vikash Katta; Peter Karpati; Andreas L. Opdahl; Christian Raspotnig; Guttorm Sindre

Various techniques have been proposed to model attacks on systems. In order to understand such attacks and thereby propose efficient mitigations, the sequence of steps in the attack should be analysed thoroughly. However, there is a lack of techniques to represent intrusion scenarios across a system architecture. This paper proposes a new technique called misuse sequence diagrams (MUSD). MUSD represents the sequence of attacker interactions with system components and how they were misused over time by exploiting their vulnerabilities. The paper investigates MUSD in a controlled experiment with 42 students, comparing it with a similar technique called misuse case maps (MUCM). The results suggest that the two mostly perform equally well and they are complementary regarding architectural issues and temporal sequences of actions though MUSD was perceived more favourably.


availability, reliability and security | 2013

Enhancing CHASSIS: A Method for Combining Safety and Security

Christian Raspotnig; Vikash Katta; Peter Karpati; Andreas L. Opdahl

Safety and security assessments aim to keep harm away from systems. Although they consider different causes of harm, the mitigations suggested by the assessments are often interrelated and affect each other, either by strengthening or weakening the other. Considering the relations and effects, a combined process for safety and security could save resources. It also improves the reliability of the system development when compared to having two independent processes whose results might contradict. This paper extends our previous research on a combined method for security and safety assessment, named CHASSIS, by detailing the process in a broader context of system development with the help of feedback from a safety expert. The enhanced CHASSIS method is discussed based on a case from the Air Traffic Management domain.


Journal of Systems and Software | 2010

Means-ends and whole-part traceability analysis of safety requirements

Jang-Soo Lee; Vikash Katta; Eunkyoung Jee; Christian Raspotnig

Safety is a system property, hence the high-level safety requirements are incorporated into the implementation of system components. In this paper, we propose an optimized traceability analysis method which is based on the means-ends and whole-part concept of the approach for cognitive systems engineering to trace these safety requirements. A system consists of hardware, software, and humans according to a whole-part decomposition. The safety requirements of a system and its components are enforced or implemented through a means-ends lifecycle. To provide evidence of the safety of a system, the means-ends and whole-part traceability analysis method will optimize the creation of safety evidence from the safety requirements, safety analysis results, and other system artifacts produced through a lifecycle. These sources of safety evidence have a causal (cause-consequence) relationship between each other. The failure mode and effect analysis (FMEA), the hazard and operability analysis (HAZOP), and the fault tree analysis (FTA) techniques are generally used for safety analysis of systems and their components. These techniques cover the causal relations in a safety analysis. The causal relationships in the proposed method make it possible to trace the safety requirements through the safety analysis results and system artifacts. We present the proposed approach with an example, and described the usage of TRACE and NuSRS tools to apply the approach.


availability, reliability and security | 2013

Requirements Management in a Combined Process for Safety and Security Assessments

Vikash Katta; Christian Raspotnig; Peter Karpati; Tor Stålhane

Combined Harm Assessment of Safety and Security for Information Systems (CHASSIS) method defines a unified process for safety and security assessments to address both the safety and security aspects during system development process. CHASSIS applies techniques from safety and security fields-e.g. misuse case and HAZOP-to identify and model hazards, threats and mitigations to a system. These mitigations, which are generally specified as safety and security requirements, are interrelated. Defining and maintaining the interdependencies between these requirements are vital to, among other things, estimate how a requirement impacts other requirements and artefacts. In this paper, we present our approach for providing trace ability to CHASSIS in order to capture the interdependencies between the safety and security requirements and to demonstrate the history and rational behind their elicitation. The approach, called Satrap, constitutes a process model defining what type of artefacts are generated during development and assessment activities, what type of relations between the artefacts should be captured, and how to extract traces. The trace ability approach together with its supporting prototype tool was applied on an Air Traffic Management remote tower example which was assessed for safety and security risks using CHASSIS.


IFAC Proceedings Volumes | 2013

Applying a Security Conceptual Model for Coverage Analysis

Christian Raspotnig; Vikash Katta

Abstract In areas important to security or safety, the development of computer-based systems follows more complex processes for developing the system and achieving the needed safety or security assurance. As security and safety aspects are merging in new systems that are critical, but more openly interconnected, there is a need to relate the three different processes: development, safety and security. This paper proposes a conceptual model for security, which consist of artefacts belonging to development and security assessment processes. The security conceptual model can be used as a stand alone model to understand and address how security aspects should be integrated during the development of computer-based systems, or can be combined with safety models to address both safety and security aspects in a more harmonised manner. The model is applied on a newly developed method for unifying the safety and security assessments. The security conceptual model is however only based on a particular standard, and further work is needed to evaluate the model.


International Journal of Critical Computer-based Systems | 2015

Investigating fulfilment of traceability requirements in a combined process for safety and security assessments

Vikash Katta; Christian Raspotnig; Peter Karpati; Tor Stålhane

Combined harm assessment of safety and security for information systems CHASSIS method defines a unified process for safety and security assessments. CHASSIS applies techniques from safety and security fields - e.g., misuse case and HAZOP - to identify and model hazards, threats, safety and security requirements to a system. Ensuring traceability between safety and security requirements as well as other artefacts is one of the important tasks required to provide safety and security assurance. In this paper, we present an approach for traceability, called SaTrAP, which was used to provide traceability support to CHASSIS. We discuss the application of SaTrAp and CHASSIS with the help of an ATM remote tower example. We evaluate whether CHASSIS together with SaTrAp fulfils the traceability requirements set by standards. In this regard, we have analysed regulations/standards from ATM domain for requirements on traceability. We also analysed how security has been addressed by these standards.


Archive | 2013

Presenting a traceability based approach for safety argumentation

Vikash Katta; Tor Stålhane; Christian Raspotnig


PATTERNS 2012, The Fourth International Conferences on Pervasive Patterns and Applications | 2012

Patterns in Safety Analysis

Tor Stålhane; Olawande Daramola; Vikash Katta


Archive | 2015

Safety demonstration challenges and recommendations in the nuclear field

Peter Karpati; A Hauge; Vikash Katta; Christian Raspotnig

Collaboration


Dive into the Vikash Katta's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peter Karpati

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Tor Stålhane

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rune Fredriksen

Organisation for Economic Co-operation and Development

View shared research outputs
Top Co-Authors

Avatar

Janne Valkonen

VTT Technical Research Centre of Finland

View shared research outputs
Top Co-Authors

Avatar

Guttorm Sindre

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge