Pattern-Based Modeling of Cyber-Physical Systems For Analyzing Security

被引:8
|
作者
Maidl, Monika [1 ]
Wirtz, Roman [2 ]
Zhao, Tiange [1 ]
Heisel, Maritta [2 ]
Wagner, Marvin [2 ]
机构
[1] Siemens, Munich, Germany
[2] Univ Duisburg Essen, Duisburg, Germany
关键词
security analysis; cyber-physical system; system overview; model-based engineering;
D O I
10.1145/3361149.3361172
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyber-physical systems are a crucial part of many infrastructure or production systems, and are spreading into other domains as part of the IoT (Internet-of-Things) wave. As cyber-physical systems act on the physical world, attacks could have severe consequences. At the same time, cyber-physical systems can be attacked like other IT systems. So it is essential that developers consider security during the design phase of software, to design adequate security protection for the system. This fact requires a structured security analysis right from the beginning. The initial input of such a security analysis is a system overview, e.g. in form of an architecture. It is a challenging task to provide the appropriate abstraction level of the system that allows identifying security threats and weaknesses. In the present paper, we describe a pattern that assists software developers in creating an architecture which captures the relevant elements for a security analysis. The interfaces of components may not only be accessible for authorized entities, but also for attackers. Therefore, we specify different interface types which enables one to identify relevant attacks for a specific interface type. We first present the solution part of our pattern as a meta-model, for which we then provide guidelines for its instantiation. As an example, we instantiate the pattern for a typical automation and control system. Last, we evaluate the suitability of our pattern by discussing how typical threats could be mapped to the different interface types.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Security Synthesis for Cyber-Physical Systems
    Li, Jitao
    Wang, Zhenhua
    Shen, Yi
    Xie, Lihua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (02): : 1027 - 1037
  • [32] Security and networking for cyber-physical systems
    Wu, Shaoen
    Wang, Honggang
    Wu, Dalei
    Chatzimisios, Periklis
    Chen, Zhigang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (09) : 807 - 807
  • [33] Analysis of security in cyber-physical systems
    Jie Chen
    Fan Zhang
    Jian Sun
    Science China Technological Sciences, 2017, 60 : 1975 - 1977
  • [34] Security in the Era of Cyber-Physical Systems of Systems
    Karnouskos, Stamatis
    ERCIM NEWS, 2014, (97): : 44 - 45
  • [35] Understanding the impact of cyber-physical correlation on security analysis of Cyber-Physical Systems
    Jiang, Luanjuan
    Chen, Xin
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 529 - 534
  • [36] Pattern Detection in Cyber-Physical Systems
    Spezzano, Giandomenico
    Vinci, Andrea
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 1016 - 1021
  • [37] On the Security of Cyber-Physical Robotic Systems Using Dynamic Modeling and Simulation
    Hector, Joshua B.
    Katsiaris, Pantelis
    Carey, Nicole E.
    Cote, Nick
    Rawat, Danda B.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [38] Distortion-Based Lightweight Security for Cyber-Physical Systems
    Agarwal, Gaurav Kumar
    Karmoose, Mohammed
    Diggavi, Suhas
    Fragouli, Christina
    Tabuada, Paulo
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (04) : 1588 - 1601
  • [39] Network steganography based security framework for cyber-physical systems
    Zhang, Xiao-Guang
    Yang, Guang-Hong
    Ren, Xiu-Xiu
    INFORMATION SCIENCES, 2022, 609 : 963 - 983
  • [40] Threat modeling in cyber-physical systems
    Fernandez, Eduardo B.
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 448 - 453