States of Attack Under Incomplete Information

被引:0
|
作者
Ali, Aliyu Tanko [1 ]
Gruska, Damas [1 ]
机构
[1] Comenius Univ, Dept Appl Informat, Bratislava 84248, Slovakia
关键词
autonomous systems; attack trees; threat modelling; information flow security; opacity; reachability; OPACITY; FOUNDATIONS; SYSTEMS;
D O I
10.1109/CCWC54503.2022.9720758
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Autonomous systems are special kinds of systems that are complex, consist of many modules, different producers, different technologies like programming, machine learning, and sometimes different manufacturers. As such, checking for their properties, or even determining which state they are at a given moment, is a difficult task. To study the latter problem we use two models, originally developed in security theory, namely we combine attack trees and the information flow security. Hence a question of whether we can decide that a system has reached a given state (i.e., whether the root node of the attack tree is reached) is translated to checking current state opacity.
引用
收藏
页码:801 / 807
页数:7
相关论文
共 50 条