Threat modeling for aviation computer security

被引:0
|
作者
Baquero, Abraham O. [1 ]
Kornecki, Andrew J. [2 ]
Zalewski, Janusz [3 ]
机构
[1] SMRT Software Corporation, 422 Wekiva Rapids Dr., Altamonte Springs,FL,32714, United States
[2] Electrical, Computer, Software, and System Engineering Department, Embry Riddle Aeronautical University, 600 S. Clyde Morris Blvd., Daytona Beach,FL,32114, United States
[3] Department of Software Engineering, Florida Gulf Coast University, 10501 FGCU Blvd, Ft. Myers,FL,33965, United States
来源
CrossTalk | 2015年 / 28卷 / 06期
关键词
Data flow analysis - Embedded systems - Network security - Data flow graphs - Application programs - Cybersecurity;
D O I
暂无
中图分类号
学科分类号
摘要
The safety of aircraft cannot be analyzed anymore based only on potential hazards and failures. Due to their increasing interconnectivity, modern computer systems are exposed to a variety of security threats. Additionally, complexity of the system may be a source of vulnerabilities opening the system to malicious actions with ultimate impact on safety. Threat Modeling is the technique that assists software engineers to identify and document potential security threats associated with a software product, providing development teams a systematic way of discovering strengths and weaknesses in their software applications. Microsoft's SDL Threat Modeling Tool offers automated analysis of security threats of systems that can be represented using data flow diagrams. The article discusses issues of security in aviation and presents a case study of a realistic cyber-physical system to introduce tool-supported threat modeling method which can be used for unmanned aerial systems security analyses.
引用
收藏
页码:21 / 27
相关论文
共 50 条
  • [1] Getting ahead of the threat: Aviation and cyber security
    Iasiello, Emilio
    AEROSPACE AMERICA, 2013, 51 (07) : 22 - 25
  • [2] Are Computer Chips the New Security Threat?
    Greengard, Samuel
    COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 18 - 20
  • [3] Threat image projection: applied signal detection for aviation security
    Catchpole, K
    Fletcher, J
    McClumpha, A
    Miles, A
    Zar, A
    ENGINEERING PSYCHOLOGY AND COGNITIVE ERGONOMICS VOLUME SIX: INDUSTRIAL ERGONOMICS, HCI, AND APPLIED COGNITIVE PSYCHOLOGY, 2001, : 231 - 237
  • [4] Computer information systems threat analysis on security
    Li, Y
    Wei, J
    INNOVATIONS THROUGH INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2004, : 951 - 953
  • [5] Aviation Security and Terrorism: An Analysis of the Potential Threat to Air Cargo Integrators
    Hoffman, Bruce
    TERRORISM AND POLITICAL VIOLENCE, 1998, 10 (03) : 54 - +
  • [6] THE SPECIFICATION AND MODELING OF COMPUTER SECURITY
    MCLEAN, J
    COMPUTER, 1990, 23 (01) : 9 - 16
  • [7] Cyber Security Threat Modeling of A Telesurgery System
    Al Asif, Md Rashid
    Khondoker, Rahamatullah
    2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
  • [8] Ransomware Security Threat Modeling for Photovoltaic Systems
    Su, Ying
    Ahn, Bohyun
    Alvee, Syed R. B.
    Kim, Taesic
    Choi, Jinchun
    Smith, Scott C.
    2021 6TH IEEE WORKSHOP ON THE ELECTRONIC GRID (EGRID), 2021,
  • [9] Threat Modeling and Security Issues for the Internet of Things
    Seeam, Amar
    Ogbeh, Ochanya S.
    Guness, Shivanand
    Bellekens, Xavier
    2019 SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING APPLICATIONS 2019 (NEXTCOMP 2019), 2019,
  • [10] Computational modeling and experimental validation of aviation security procedures
    Glasser, Uwe
    Rastkar, Sarah
    Vajihollahi, Mona
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 420 - 431