Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

被引:0
|
作者
Bakirtzis, Georgios [1 ]
Simon, Brandon J. [1 ]
Fleming, Cody H. [2 ]
Elks, Carl R. [1 ]
机构
[1] Virginia Commonwealth Univ, Elect & Comp Engn, Med Coll Virginia Campus, Richmond, VA 23284 USA
[2] Virginia Commonwealth Univ, Syst Engn & Mech & Aerosp Engn, Richmond, VA USA
关键词
Human-centered computing; Visualization; Visualization techniques; Graph drawings; Visualization systems and tools; Visualization toolkits; Security and privacy; Systems Security; Vulnerability management; Security in hardware; Embedded systems security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking tools that employ effective dashboards-to manage potential attack vectors, system components, and requirements. This problem is further exacerbated because model-based security analysis produces significantly larger result spaces than security analysis applied to realized systems-where platform specific information, software versions, and system element dependencies are known. Therefore, there is a need to manage the analysis complexity in model-based security through better visualization techniques. Towards that goal, we propose an interactive security analysis dashboard that provides different views largely centered around the system, its requirements, and its associated attack vector space. This tool makes it possible to start analysis earlier in the system lifecycle. We apply this tool in a significant area of engineering design-the design of cyber-physical systems-where security violations can lead to safety hazards.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Cyber-physical System Security for Networked Industrial Processes
    Shuang Huang
    Chun-Jie Zhou
    Shuang-Hua Yang
    Yuan-Qing Qin
    International Journal of Automation and Computing, 2015, 12 (06) : 567 - 578
  • [32] Toward Enhancing Cyber-Physical System Security with System Unidentifiability
    Mao, Xiangyu
    He, Jianping
    Fang, Chongrong
    Peng, Yunfeng
    IFAC PAPERSONLINE, 2023, 56 (02): : 1692 - 1697
  • [33] Event Correlation in the Integrated Cyber-Physical Security System
    Kotenko, Igor V.
    Levshun, Dmitry S.
    Chechulin, Andrey A.
    PROCEEDINGS OF THE XIX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM 2016), 2016, : 484 - 486
  • [34] Software Defined Cyber-Physical Testbed for Analysis of Automated Cyber Responses for Power System Security
    Ulrich, Jacob J.
    Vaagensmith, Bjorn C.
    Rieger, Craig G.
    Welch, Justin J.
    2019 RESILIENCE WEEK (RWS), 2019, : 47 - 54
  • [35] Cyber-physical System Security of Vehicle Charging Stations
    Gottumukkala, Raju
    Merchant, Rizwan
    Tauzin, Adam
    Leon, Kaleb
    Roche, Andrew
    Darby, Paul
    2019 IEEE GREEN TECHNOLOGIES CONFERENCE (GREENTECH), 2019,
  • [36] Power System Security With Cyber-Physical Power System Operation
    Oyewole, Peju Adesina
    Jayaweera, Dilan
    IEEE ACCESS, 2020, 8 (08): : 179970 - 179982
  • [37] Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications
    Yohanandhan, Rajaa Vikhram
    Elavarasan, Rajvikram Madurai
    Manoharan, Premkumar
    Mihet-Popa, Lucian
    IEEE ACCESS, 2020, 8 : 151019 - 151064
  • [38] Trustworthy Design Architecture: Cyber-Physical System
    Choi, Sung
    Chavez, Adrian
    Torres, Marcos
    Kwon, Cheolhyeon
    Hwang, Inseok
    2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [39] Analysis of information flow security in cyber-physical systems
    Akella, Ravi
    Tang, Han
    McMillin, Bruce M.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2010, 3 (3-4) : 157 - 173
  • [40] A Security Analysis of Cyber-Physical Systems Architecture for Healthcare
    Seifert, Darren
    Reza, Hassan
    COMPUTERS, 2016, 5 (04)