Conference Overview:

The 9th annual conference will provide you with the opportunity to present and compare your own interpretations and concepts. In addition you will be able to present change requests to the 2nd edition of ISO 26262 and to have implicitly an impact on the next version of the standard.

  • Heading for the 2nd Edition ISO 26262.
  • Moving towards Automated Driving.
  • One Complete Day Cyber-security as it relates to Safety.

Paper title:

Vulnerability Tree Analysis versus Fault Tree Analysis – Combined Security\Safety Analysis Approach.

Paper overview:

  • Introduction to Vulnerability Tree Analysis (VTA) for critical security systems
  • A comprehensive and cost-effective approach to combine VTA with FTA
  • Use case: VTA/FTA analysis for Medium Range Radar system
  • Conclusion and future work


Esam Mamdouh
Functional Safety Department Manager, eJad

Esam_Safety_Conf.jpg (1)



Cyber security highly impacts the automotive industry especially when the autonomous driving has been adopted with an excess demand on the network usage such as V2X communication. In critical systems, such as in-vehicle information, security will be relevant to functional safety and cannot be disjointed. In fact, there are many possible attack scenarios that revealed a high impact of automotive cyber security on safety critical system where threats can lead to a violation to the safety goals. This arises the need for performing a systematic security analysis method on the system architecture. This paper introduces the Vulnerability Tree Analysis (VTA) as top down analysis approach for detecting the root causes of possible vulnerability in the system in a similar way to Fault Tree Analysis (FTA). Another goal of this paper is to find a possible method to combine the FTA with the VTA as a cost effective approach.