Threat modeling in cyber-physical systems

被引:17
|
作者
Fernandez, Eduardo B. [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
来源
2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC | 2016年
关键词
Cyber-physical systems; threat modeling; misuse patterns; secure systems design; security patterns; ELICITING SECURITY REQUIREMENTS;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2016.89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To design a secure system we need to understand its possible threats; more specifically we need to understand how the components of the architecture are compromised and used by an attacker in order to fulfill his objectives and how the attack proceeds through these units. We can do this using misuse patterns, an artifact we have introduced in earlier work. Threat modeling of IT systems has been widely explored but there is no much work on cyber-physical system (CPS) threats. CPSs are complex and heterogeneous systems and have many vulnerabilities. We discuss here how to extend misuse patterns to describe CPS threats and how to enumerate and unify CPS threats. This approach can be valuable to complement methodologies to build secure CPSs. We show our ideas through a metamodel and an example.
引用
收藏
页码:448 / 453
页数:6
相关论文
共 50 条
  • [41] Fundamental Challenges of Cyber-Physical Systems Security Modeling
    Bakirtzis, Georgios
    Ward, Garrett L.
    Deloglos, Christopher J.
    Elks, Carl R.
    Horowitz, Barry M.
    Fleming, Cody H.
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 33 - 36
  • [42] Computational Modeling of Age of Information for Cyber-physical Systems
    Prandel, Paulo Cesar
    Barreto, Priscila Solis
    2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021), 2021,
  • [43] Modeling and Simulating Cyber-Physical Systems using CyPhySim
    Lee, Edward A.
    Niknami, Mehrdad
    Nouidui, Thierry S.
    Wetter, Michael
    2015 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE (EMSOFT), 2015, : 115 - 124
  • [44] Modeling and Simulation of Cyberattacks for Resilient Cyber-Physical Systems
    Rashid, Nafiul
    Wan, Jiang
    Quiros, Gustavo
    Canedo, Arquimedes
    Al Faruque, Mohammad Abdullah
    2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 988 - 993
  • [45] Topological Structure Modeling and Analysis for Cyber-Physical Systems
    Qiu Hangping
    Yang Zhicai
    Quan Jichuan
    Lei Zhipeng
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 523 - 526
  • [46] Modeling and Verification of Cyber-Physical Systems under uncertainty
    Geng, Shengling
    Peng, Jiao
    Li, Ping
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017,
  • [47] Toward Modeling and Verification of Uncertainty in Cyber-Physical Systems
    Chatterjee, Amrita
    Reza, Hassan
    2020 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2020, : 568 - 576
  • [48] Design Considerations for Modeling Modes in Cyber-Physical Systems
    Murugesan, Anitha
    Rayadurgam, Sanjai
    Whalen, Michael W.
    Heimdahl, Mats P. E.
    IEEE DESIGN & TEST, 2015, 32 (05) : 66 - 73
  • [49] A Method for Modeling and Evaluation of the Security of Cyber-Physical Systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 131 - 136
  • [50] A Layered Formal Framework for Modeling of Cyber-Physical Systems
    Ungureanu, George
    Sander, Ingo
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1715 - 1720