Evolving attacker perspectives for secure embedded system design

Letitia W. Li, Florian Lugou, Ludovic Apvrille

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In our increasingly connected world, security is a growing concern for embedded systems. A systematic design and verification methodology could help detect vulnerabilities before mass production. While Attack Trees help a designer consider the attacks a system will face during a preliminary analysis phase, they can be further integrated into the design phases. We demonstrate that explicitly modeling attacker actions within a system model helps us to evaluate its impact and possible countermeasures. This paper describes how we evolved the SysML-Sec Methodology with “Attacker Scenarios” for the improved design of secure embedded systems.

Original languageEnglish
Title of host publicationMODELSWARD 2018 - Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development
EditorsSlimane Hammoudi, Luis Ferreira Pires, Bran Selic
PublisherSciTePress
Pages287-294
Number of pages8
ISBN (Electronic)9789897582837
DOIs
Publication statusPublished - 1 Jan 2018
Externally publishedYes
Event6th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2018 - Funchal, Madeira, Portugal
Duration: 22 Jan 201824 Jan 2018

Publication series

NameMODELSWARD 2018 - Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development
Volume2018-January

Conference

Conference6th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2018
Country/TerritoryPortugal
CityFunchal, Madeira
Period22/01/1824/01/18

Keywords

  • Formal Verification
  • Model-Driven Engineering
  • Security

Fingerprint

Dive into the research topics of 'Evolving attacker perspectives for secure embedded system design'. Together they form a unique fingerprint.

Cite this