2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.70
|View full text |Cite
|
Sign up to set email alerts
|

Towards Incorporating Discrete-Event Systems in Secure Software Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Several aspects of security have also been considered in the DES literature, including the stealthy deception attacks in [1,22] that aim at injecting false information without being detected by the controller; or the opacity of DESs in [21,5,14,29] and references there in, whose goal is to keep the system's secret behavior uncertain to outsiders. Intrusion detection in the DES framework has been investigated in [23,27,8], with the goal of guaranteeing the confidentiality and integrity of DESs.…”
Section: Corrupted String (May Be An Empty String) Observa9on String ...mentioning
confidence: 99%
“…Several aspects of security have also been considered in the DES literature, including the stealthy deception attacks in [1,22] that aim at injecting false information without being detected by the controller; or the opacity of DESs in [21,5,14,29] and references there in, whose goal is to keep the system's secret behavior uncertain to outsiders. Intrusion detection in the DES framework has been investigated in [23,27,8], with the goal of guaranteeing the confidentiality and integrity of DESs.…”
Section: Corrupted String (May Be An Empty String) Observa9on String ...mentioning
confidence: 99%
“…Following that, a state estimator called a diagnoser (or detector, if only detection of failure is required) is designed which observes sequences of events generated by the system to decide whether the states through which the system traverses correspond to the normal or faulty DES model. This idea has been used to develop host based IDS [14,15], where a sequence of system calls under normal conditions comprises the normal model and the sequence under compromised conditions comprises the failure (attack) model. So, the DES detector acts as the host IDS.…”
Section: Introductionmentioning
confidence: 99%
“…Design of such an IDS requires certain extensions over the (classical) theory [13] and techniques which have been used in [14][15][16]. The basic motivations and the extensions are enumerated below:…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation