Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2022
DOI: 10.1145/3524844.3528062
|View full text |Cite
|
Sign up to set email alerts
|

Towards model co-evolution across self-adaptation steps for combined safety and security analysis

Abstract: Self-adaptive systems offer several attack surfaces due to the communication via different channels and the different sensors required to observe the environment. Often, attacks cause safety to be compromised as well, making it necessary to consider these two aspects together. Furthermore, the approaches currently used for safety and security analysis do not sufficient take into account the intermediate steps of an adaptation. Current work in this area ignores the fact that a self-adaptive system also reveals … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 26 publications
(37 reference statements)
0
0
0
Order By: Relevance
“…Witte et al [40] propose the Attack-Fault-Trees modeling approach to analyze security issues, while Yuan et al [41] provide a taxonomy, patterns, and tactics for self-protecting software systems, and propose the Architecture-Based Self-Protection approach [42] for web applications. The Anomaly Behavior Analysis Intrusion Detection System [43], [44] is used to detect known and unknown attacks in smart cyber infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…Witte et al [40] propose the Attack-Fault-Trees modeling approach to analyze security issues, while Yuan et al [41] provide a taxonomy, patterns, and tactics for self-protecting software systems, and propose the Architecture-Based Self-Protection approach [42] for web applications. The Anomaly Behavior Analysis Intrusion Detection System [43], [44] is used to detect known and unknown attacks in smart cyber infrastructures.…”
Section: Related Workmentioning
confidence: 99%