Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems 2020
DOI: 10.1145/3377024.3377026
|View full text |Cite
|
Sign up to set email alerts
|

Using variability modeling to support security evaluations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 14 publications
1
9
0
Order By: Relevance
“…Those exploits attempt to force a break at the vulnerable parts. As our first case study also confirmed, an attacker needs detailed information about the victim system and its environment [26]. CVE.…”
Section: Introductionsupporting
confidence: 53%
See 2 more Smart Citations
“…Those exploits attempt to force a break at the vulnerable parts. As our first case study also confirmed, an attacker needs detailed information about the victim system and its environment [26]. CVE.…”
Section: Introductionsupporting
confidence: 53%
“…In our previous case study [26], we evaluated detailed information about the characteristics of vulnerabilities, their exploitation and compatible attack scenarios. We extracted this information from various database and used it to virtualize vulnerable systems in Docker containers.…”
Section: Case Study and First Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…FMs have been demonstrated very useful in the security field where they are applied to model the domain of configuration of security systems [44] and for the selection of configurations t o r educe t he security risk in the selection of configurations [50]. The idea of using FMs to represent the vulnerabilities of systems already existed in the literature [27]. The authors analyse the vulnerabilities to create synthetic attack scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Other researches developed a security requirements engineering framework for CPSs, that is an extension of SREP [31]. The capacity to support the high variability in the security context though Feature Models appeared in previous papers [23], where the authors study the possible vulnerabilities to create attack scenarios, but not it does not apply to a complex scenario as the CPSs need.…”
Section: Cybersecurity and Feature Model Analysismentioning
confidence: 99%