2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2018
DOI: 10.1109/icstw.2018.00033
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Threat-Driven Cyber Security Verification of IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…However, the aforementioned general composition methods do not take into consideration the special intrinsic of security. Theoretical works for secure system composition are presented in [36][37][38][39]. In [36], the authors document a set of composition theorems which can prove protocols' security under standard stand-alone and compositional definitions of security.…”
Section: Security Validationmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the aforementioned general composition methods do not take into consideration the special intrinsic of security. Theoretical works for secure system composition are presented in [36][37][38][39]. In [36], the authors document a set of composition theorems which can prove protocols' security under standard stand-alone and compositional definitions of security.…”
Section: Security Validationmentioning
confidence: 99%
“…In [38], methods of concurrent general composition and universal composability are examined on public-key models and scenarios with no trust infrastructure. Newer studies [39] update the security composition theory with properties like mitigation of eavesdropping and identity faking. Therefore, a modeling framework is proposed [39] for security verification and is applied in distributed and industrial IoT infrastructures.…”
Section: Security Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we present security analysis about our system in Alloy [44], [45]. As a formal specification language, Alloy can be used to express a system based on first order logic.…”
Section: Security Analysismentioning
confidence: 99%
“…Our earlier work has primarily focused on verifying security aspects of the control network itself, which only forms a small part of the system as a whole [22]. As part of that work we were able to verify security properties of a control network consisting of up to 100 nodes using the Alloy Analyzer [19].…”
Section: Introductionmentioning
confidence: 99%