The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018 Annual IEEE International Systems Conference (SysCon) 2018
DOI: 10.1109/syscon.2018.8369518
|View full text |Cite
|
Sign up to set email alerts
|

A model-based approach to security analysis for cyber-physical systems

Abstract: Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation. Most safety and security decisions that can have major effects on mitigation strategy options after deployment are made early in the system's life cycle. To allow for a vulnerability analysis before deployment, a sufficient well-formed model has to be constructed. To construct such a mod… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(27 citation statements)
references
References 10 publications
(10 reference statements)
0
20
0
Order By: Relevance
“…However, each element of the system model is described by a standardized schema as presented by Bakirtzis et al [11]. It is, therefore, not necessary to capture this model in SysML.…”
Section: System Modelmentioning
confidence: 99%
“…However, each element of the system model is described by a standardized schema as presented by Bakirtzis et al [11]. It is, therefore, not necessary to capture this model in SysML.…”
Section: System Modelmentioning
confidence: 99%
“…Furthermore, since this model is intended for security analysis, a component should be characterized by a set of attributes relevant to its security. These component attributes include: its operating system, hardware, firmware, software, communication protocols, and entry points . We use SysML part properties to define these attributes for a particular component.…”
Section: Mission‐aware Modeling In Sysmlmentioning
confidence: 99%
“…In our previous work, we describe how to generate the mission context information and how the model can be applied to vulnerability analysis . This paper instead focuses on applying the modeling methodology to use a case, assuming that all the information in the model is known ahead of time.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The red team effort in particular allows for the use of tool-based support for providing historical evidence of cyber attacks that take advantage of similar system components or architectures. As described in [24][25][26], natural language processing (NLP) techniques can be used to search attack databases and support the red team in making their judgments on the system.…”
mentioning
confidence: 99%