2020
DOI: 10.48550/arxiv.2006.06045
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Evaluating the Exploitability of Implicit Interactions in Distributed Systems

Jason Jaskolka

Abstract: Implicit interactions refer to those interactions among the components of a system that may be unintended and/or unforeseen by the system designers. As such, they represent cybersecurity vulnerabilities that can be exploited to mount cyber-attacks causing serious and destabilizing system effects. In this paper, we study implicit interactions in distributed systems specified using the algebraic modeling framework known as Communicating Concurrent Kleene Algebra (C 2 KA). To identify and defend against a range o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…Implicit interactions indicate the presence of a cybersecurity vulnerability that can be exploited to mount a cyberattack. By compromising the agent at the beginning of an implicit interaction's communication sequence (the source agent), an attacker can influence the behavior of the agent at the end of the communication sequence (the sink agent) to perform actions other than the functions the system was intended to perform, impacting the system's stability, safety, and security [Jas20a]. The impacts of such an attack are of particular concern in ICS, where agent behaviors may correspond to actions performed by physical components, and so implicit interactions pose a threat not just to software system integrity, but also to the integrity of physical components, the process controlled by the ICS, and the safety of individuals around the system.…”
Section: Motivationmentioning
confidence: 99%
See 4 more Smart Citations
“…Implicit interactions indicate the presence of a cybersecurity vulnerability that can be exploited to mount a cyberattack. By compromising the agent at the beginning of an implicit interaction's communication sequence (the source agent), an attacker can influence the behavior of the agent at the end of the communication sequence (the sink agent) to perform actions other than the functions the system was intended to perform, impacting the system's stability, safety, and security [Jas20a]. The impacts of such an attack are of particular concern in ICS, where agent behaviors may correspond to actions performed by physical components, and so implicit interactions pose a threat not just to software system integrity, but also to the integrity of physical components, the process controlled by the ICS, and the safety of individuals around the system.…”
Section: Motivationmentioning
confidence: 99%
“…Implicit interactions are exploited through a compromised agent, which refers to an agent that can behave in a way that is not consistent with its original or intended specification. This means that it has the ability to issue any stimulus and/or alter its concrete behavior (e.g., by defining a shared environment) [Jas20a]. The compromised agent then, can exploit the implicit interactions in the system for which it serves as the source agent (e.g., by issuing stimuli or defining shared environments out-of-sequence from the intended system interactions) to cause knock-on affects that adversely impact other agents in the system.…”
Section: Approaches To Identify and Analyze Implicit Interactionsmentioning
confidence: 99%
See 3 more Smart Citations