IMA security verification and analysis method based on requirement
An analysis method and safety verification technology, applied in the direction of platform integrity maintenance, etc., can solve the problem of less analysis and verification of IMA system safety, and achieve the effect of improving accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The present invention will be further described in detail below in conjunction with the accompanying drawings and examples. The following examples are explanations of the present invention and the present invention is not limited to the following examples.
[0044] Such as figure 1 Shown, a kind of demand-based IMA security verification analysis method of the present invention comprises the following steps:
[0045] Step 1: Determine system-level hazards and security constraints; analyze system-level hazards, and obtain system-level security constraints of partition communication modules. In order to find the system-level hazards that can lead to partition communication modules, starting from the services provided by the IMA system, find the services related to partition communication provided by IMA, and then find the hazards that will cause the failure of related services, thus determining the system-level of partition communication Danger. If the inter-partition co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


