2023
DOI: 10.1109/tdsc.2022.3213577
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Threat Model for Smart Systems

Abstract: Cyber-physical systems and their smart components have a pervasive presence in all our daily activities. Unfortunately, identifying the potential threats and issues in these systems and selecting enough protection is challenging given that such environments combine human, physical and cyber aspects to the system design and implementation. Current threat models and analysis do not take into consideration all three aspects of the analyzed system, how they can introduce new vulnerabilities or protection measures … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 28 publications
(49 reference statements)
0
8
0
Order By: Relevance
“…This approach aims to bridge the gap between industry and academia, enhancing the development and effectiveness of Ethical Hacking tools. [56], DFBC [69], ESASCF [73], ESRFuzzer [74], Firmaster [76], IoTFuzzer [83], LTESniffer [88], Lore [87], MaliceScript [92], Owfuzz [108], Pyciuti [118], RT-RCT [124], SVED [133], Scanner++ [125], ShoVAT [128], SuperEye [132], TOR-PEDO [136], UE Security Reloaded [137], Vulcan [142], Vulnsloit [146] Threat Modelling Cairis [60], ESSecA [75], HARMer [81], MAL [91], PenQuest [112], TAMELESS [134] Vulnerability Analysis AIBugHunter [52], ARMONY [53], AVAIN [55], Autosploit [54], Bbuzz [56], Black…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…This approach aims to bridge the gap between industry and academia, enhancing the development and effectiveness of Ethical Hacking tools. [56], DFBC [69], ESASCF [73], ESRFuzzer [74], Firmaster [76], IoTFuzzer [83], LTESniffer [88], Lore [87], MaliceScript [92], Owfuzz [108], Pyciuti [118], RT-RCT [124], SVED [133], Scanner++ [125], ShoVAT [128], SuperEye [132], TOR-PEDO [136], UE Security Reloaded [137], Vulcan [142], Vulnsloit [146] Threat Modelling Cairis [60], ESSecA [75], HARMer [81], MAL [91], PenQuest [112], TAMELESS [134] Vulnerability Analysis AIBugHunter [52], ARMONY [53], AVAIN [55], Autosploit [54], Bbuzz [56], Black…”
Section: Discussionmentioning
confidence: 99%
“…No Name (TTCN-3) [102], NodeXP [104], OSV [107], ObjectMap [105], Owfuzz [108], PURITY [117], PenQuest [112], PentestGPT [113], PhpSAFE [114], Pyciuti [118], Pyciuti [118], RAT [119], ROSploit [123], RT-RCT [124], RT-RCT [124], Revealer [120], RiscyROP [121], Robin [122], SOA-Scanner [130], SVED [133], Scan-ner++ [125], SerialDetector [127], ShoVAT [128], ShoVAT [128], Snout [129], Snout [129], Spicy [131], Spicy [131], SuperEye [132], TAMELESS [134], TChecker [135], TORPEDO [136], UE Security Reloaded [137], VAPE-BRIDGE [139], VERA [140], VUDDY [141], VulCNN [143], VulDeePecker [144], VulPecker [147], Vulcan [142], Vulnet [145], Vulnsloit [146], WAPTT [148], WebFuzz [149], WebVIM [150] Resource Development ...…”
Section: Reconnaissancementioning
confidence: 99%
See 2 more Smart Citations
“…al. [14], the focus is to include human and physical elements in the Threat modeling process. Typical Threat Analysis activities include the cyber security aspects.…”
Section: Threat Modeling Articlesmentioning
confidence: 99%