2015
DOI: 10.1016/j.compeleceng.2015.02.019
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of socio-technical physical systems

Abstract: a b s t r a c tRecent initiatives that evaluate the security of physical systems with objects as assets and people as agents -here calledsocio-technical physical systems -have limitations: their agent behavior is too simple, they just estimate feasibility and not the likelihood of attacks, or they do estimate likelihood but on explicitly provided attacks only. We propose a model that can detect and quantify attacks. It has a rich set of agent actions with associated probability and cost. We also propose a thre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 15 publications
0
19
0
Order By: Relevance
“…However, it is challenging to prove through derivation of formulae. We thus simulated them by using PRISM [ 16,24], a useful probabilistic model checker that is widely used for modeling and verification of issues such as contract signing and analysis of anonymity [25,26,37,38,34]. PRISM has been evaluated in [12].…”
Section: Simulations and Resultsmentioning
confidence: 99%
“…However, it is challenging to prove through derivation of formulae. We thus simulated them by using PRISM [ 16,24], a useful probabilistic model checker that is widely used for modeling and verification of issues such as contract signing and analysis of anonymity [25,26,37,38,34]. PRISM has been evaluated in [12].…”
Section: Simulations and Resultsmentioning
confidence: 99%
“…Indeed, it is impossible to model all security-relevant devices, protocols and behaviours in a single model. Typically, socio-technical models look at capturing organisational infrastructure (e.g., [10], [16], [18], [12]), but sometimes they can focus only on some aspects of human-computer interactions (e.g., [19], [6]).…”
Section: Socio-technical Models Versus Attack-defence Modelsmentioning
confidence: 99%
“…In [12] the authors work on directly applying model checking to a sociotechnical model in order to evaluate some reachability-based security properties.…”
Section: Related Workmentioning
confidence: 99%
“…Lenzini et al [15] provide a modelling formalism to support planning around whether and how a malicious party can gain unauthorised access to resources in a complex physical location. The modelling approach the authors describe allows definition of people and objects within the locations that are being considered.…”
Section: Related Workmentioning
confidence: 99%