A model-based approach to security analysis for cyber-physical systems

Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation. Most safety and security decisions that can have major effects on mitigation strategy options after deployment are made early in the system's life cycle. To allow for a cyber-vulnerability analysis before deployment, a sufficient well-formed model has to be constructed. To construct such a model we produce a taxonomy of attributes; that is, a generalized schema for system attributes. This schema captures the necessary specificity that characterizes a possible real system and can also map to the attack vector space associated with the model's attributes. In this way, we can match possible attack vectors and provide architectural mitigation at the design phase. We present a model of a flight control system encoded in the Systems Modeling Language, commonly known as SysML, but also show agnosticism with respect to the modeling language or tool used.

Original languageEnglish
Title of host publication12th Annual IEEE International Systems Conference, SysCon 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-8
Number of pages8
ISBN (Electronic)9781538636640
DOIs
Publication statusPublished - 30 May 2018
Externally publishedYes
Event12th Annual IEEE International Systems Conference, SysCon 2018 - Vancouver, Canada
Duration: 24 Apr 201826 Apr 2018

Publication series

Name12th Annual IEEE International Systems Conference, SysCon 2018 - Proceedings

Conference

Conference12th Annual IEEE International Systems Conference, SysCon 2018
Country/TerritoryCanada
CityVancouver
Period24/04/1826/04/18

Fingerprint

Dive into the research topics of 'A model-based approach to security analysis for cyber-physical systems'. Together they form a unique fingerprint.

Cite this