2017
DOI: 10.1109/tr.2017.2665164
|View full text |Cite
|
Sign up to set email alerts
|

An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 54 publications
0
14
0
Order By: Relevance
“…Given the specification of the port terminal coordination system, we can identify the implicit interactions that are present in the system using the approaches presented in [1], [2]. After performing a full system analysis, it can be shown that there are 3902 implicit interactions out of the 4596 total possible system interactions.…”
Section: Implicit Interactions Present In the Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…Given the specification of the port terminal coordination system, we can identify the implicit interactions that are present in the system using the approaches presented in [1], [2]. After performing a full system analysis, it can be shown that there are 3902 implicit interactions out of the 4596 total possible system interactions.…”
Section: Implicit Interactions Present In the Systemmentioning
confidence: 99%
“…As another example, consider the implicit interaction represented as p 13 def = SV 1 → E TM → E SV 2 . In this case, the set of possible attack scenarios is given by attack p 13 = {berth [1], berth [2], numCranes [1], numCranes [2]}. This shows that a compromised SV 1 can exploit the given implicit interaction by modifying any, or all, of the variables berth [1], berth [2], numCranes [1], and/or numCranes [2], which are used by TM to determine the crane allocations.…”
Section: Definition 5 (Attack Scenario Determination) Given An Implic...mentioning
confidence: 99%
See 2 more Smart Citations
“…Large systems tend to be complex in their architecture and may obscure potential vulnerabilities from the system architects. Implicit interactions which refer to such unintended or unforeseen interactions between system elements are an example of how potential vulnerabilities may go undetected in such systems [JV17].…”
Section: Motivationmentioning
confidence: 99%