Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 173 tok/s
Gemini 2.5 Pro 49 tok/s Pro
GPT-5 Medium 37 tok/s Pro
GPT-5 High 38 tok/s Pro
GPT-4o 124 tok/s Pro
Kimi K2 207 tok/s Pro
GPT OSS 120B 442 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber Physical Systems (2006.00165v4)

Published 30 May 2020 in cs.CR, cs.SY, and eess.SY

Abstract: Safety risk assessment is an essential process to ensure a dependable Cyber-Physical System (CPS) design. Traditional risk assessment considers only physical failures. For modern CPS, failures caused by cyber attacks are on the rise. The focus of latest research effort is on safety-security lifecycle integration and the expansion of modeling formalisms for risk assessment to incorporate security failures. The interaction between safety and security lifecycles and its impact on the overall system design, as well as the reliability loss resulting from ignoring security failures are some of the overlooked research questions. This paper addresses these research questions by presenting a new safety design method named Cyber Layer Of Protection Analysis (CLOPA) that extends existing LOPA framework to include failures caused by cyber attacks. The proposed method provides a rigorous mathematical formulation that expresses quantitatively the trade-off between designing a highly-reliable versus a highly-secure CPS. We further propose a co-design lifecycle process that integrates the safety and security risk assessment processes. We evaluate the proposed CLOPA approach and the integrated lifecycle on a practical case study of a process reactor controlled by an industrial control testbed, and provide a comparison between the proposed CLOPA and current LOPA risk assessment practice.

Citations (9)

Summary

  • The paper presents a novel CLOPA methodology that integrates cyber risks into traditional LOPA for improved safety assessment in CPS.
  • It introduces mathematical formulations linking protection layer reliability with cyber attack probabilities, enabling quantitative trade-off analysis.
  • A process reactor case study demonstrates that ignoring cyber-induced failures can lead to significant under-design of safety systems.

Cyber LOPA: Integrating Safety and Security in Cyber-Physical System Design

Introduction

The paper "Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber Physical Systems" (2006.00165) presents a rigorous methodology for the co-design of safety and security in Cyber-Physical Systems (CPS). The authors extend the classical Layer of Protection Analysis (LOPA) framework, widely used in industrial risk assessment, to incorporate failures induced by cyber attacks, resulting in the Cyber Layer Of Protection Analysis (CLOPA) formulation. The work addresses the quantitative interplay between reliability and security, providing a mathematical basis for integrated lifecycle engineering and demonstrating the approach on a process reactor case paper.

Safety and Security Lifecycle Coupling

The IEC 61511 standard defines the safety lifecycle for Safety Instrumented Systems (SIS), emphasizing hazard identification, risk assessment, and allocation of safety functions to independent protection layers. Traditionally, risk assessment focuses on physical failures, assuming independence between layers. However, modern CPS architectures introduce cyber dependencies, particularly through networked communication between Basic Process Control Systems (BPCS) and SIS, violating the independence assumption. Figure 1

Figure 1: IEC 61511 SIS design lifecycle, illustrating the stages from hazard identification to decommissioning.

Figure 2

Figure 2: Industrial control system architecture showing BPCS-SIS connectivity and attack vectors, highlighting cyber dependencies.

The paper formalizes the joint failure probabilities arising from cyber attacks, distinguishing between direct attacks on SIS, pivot attacks via BPCS, and their impact on process hazards. The authors derive expressions for the probability of simultaneous BPCS and SIS security failures, accounting for attack vectors and their conditional dependencies.

Mathematical Formulation of CLOPA

CLOPA generalizes the LOPA calculation by introducing cyber-induced initiating events and their associated likelihoods. The expected number of hazardous events per unit time is expressed as:

E[H]=pλE[H] = p \lambda

where pp is the probability of simultaneous failure of all relevant protection layers, and λ\lambda is the expected rate of initiating events, now including cyber attacks. The formulation aggregates semantically-relevant attack events using weighted probabilities, enabling tractable risk assessment even with large attack trees.

The core CLOPA constraint is:

P[Sp]≤β−(α1P[Sc]+α2P[Sc,Bc])α1−α1P[Sc]+α2P[Bc]−α2P[Sc,Bc]P[S_p] \leq \frac{\beta - (\alpha_1 P[S_c] + \alpha_2 P[S_c,B_c])}{\alpha_1 - \alpha_1 P[S_c] + \alpha_2 P[B_c] - \alpha_2 P[S_c,B_c]}

where P[Sp]P[S_p] is the SIS physical failure probability, P[Sc]P[S_c] and P[Bc]P[B_c] are SIS and BPCS security failure probabilities, and β\beta, α1\alpha_1, α2\alpha_2 are functions of event likelihoods and protection layer reliabilities. This constraint quantifies the trade-off between reliability and security, directly linking SIS design requirements to cyber risk metrics. Figure 3

Figure 3: CLOPA Design Region (shaded). Feasible SIS designs lie within the region; boundary points require impractically high RRF values.

Integrated Safety-Security Lifecycle and Iterative Design

The authors propose an integrated lifecycle that couples safety and security risk assessment processes. The design proceeds iteratively: initial reliability and security targets are set, SIS architecture is developed, and both reliability (Risk Reduction Factor, RRF) and security failure probabilities are verified. If the CLOPA constraint is not satisfied, the design is refined, balancing fault tolerance and security hardening. Figure 4

Figure 4: CLOPA Iterative Design Process, showing feedback between SIS design, verification, and risk assessment.

This approach is operationalized via an algorithmic workflow, enabling practical implementation in industrial settings. The lifecycle ensures that safety and security requirements are not treated in isolation, but as interdependent constraints.

Case Study: Process Reactor System

A detailed case paper on a Continuous Stirred Tank Reactor (CSTR) demonstrates the CLOPA methodology. The system comprises a BPCS and SIS, with networked communication following NIST 800-82 guidelines. Figure 5

Figure 5: Reactor Piping and Instrumentation Diagram (P&ID) for the CSTR process.

Figure 6

Figure 6: CPS architecture for the industrial control system testbed, enforcing network segmentation and DMZ access controls.

The authors conduct HAZOP analysis to identify hazards, enumerate initiating events (including cyber attacks), and construct attack trees for BPCS and SIS compromise. Probabilities for attack success are estimated via penetration testing and vulnerability analysis. The CLOPA constraint is instantiated with real system parameters, and the design region is visualized, guiding selection of feasible SIS architectures.

Strong numerical results are reported: for the case paper, classical LOPA yields RRF = 113, while CLOPA (accounting for cyber risk) requires RRF ≥ 117 for a perfectly secured SIS, and RRF ≥ 500 for realistic attack probabilities. The error induced by ignoring cyber failures is quantified, reaching eRRF=378e_{RRF} = 378 for typical design points—demonstrating that classical LOPA can significantly under-design protective systems.

Sensitivity and Practical Implications

The sensitivity analysis reveals that CLOPA is more responsive to direct SIS attack probabilities than to pivot attacks via BPCS. The model is robust for small probability variations, but becomes highly sensitive near the design boundary, where small changes in cyber risk can necessitate large increases in RRF. This underscores the importance of conservative design and accurate cyber risk quantification.

The integrated lifecycle and CLOPA formulation have direct implications for industrial practice. They enable systematic co-design of safety and security, support quantitative trade-off analysis, and can be embedded in model-based engineering toolchains. The approach is compatible with existing standards (IEC 61511, NIST SP 800-30) and can be extended to joint optimization of BPCS and SIS architectures.

Theoretical and Future Directions

The work advances the theoretical understanding of safety-security interactions in CPS, providing a formal basis for lifecycle integration and risk assessment. It highlights the necessity of treating cyber failures as first-class hazards in safety engineering. Future research directions include:

  • Joint optimization of control and safety system architectures under combined safety-security constraints.
  • Development of automated toolchains for CLOPA-based design and verification.
  • Extension of the framework to other domains (e.g., medical devices, transportation, energy systems).
  • Investigation of the reverse interaction: how safety failures can induce or amplify security risks.

Conclusion

The CLOPA methodology rigorously integrates cyber risk into safety assessment for CPS, quantitatively demonstrating that neglecting security failures can result in substantial under-design of protective systems. The iterative, integrated lifecycle enables practical co-design of reliability and security, with strong numerical evidence supporting the necessity of this approach. The framework is extensible, compatible with industrial standards, and provides a foundation for future research in dependable and secure CPS engineering.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.