Fundamental challenges of cyber-physical systems security modeling

Georgios Bakirtzis, Garrett Ward, Christopher Deloglos, Carl Elks, Barry Horowitz, Cody Fleming

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can intentionally trigger accidents. By implementing security assessment tools for modeling languages we are better able to address threats earlier in the system's lifecycle and, therefore, assure their safe and secure behavior in their eventual deployment. We posit that cyber-physical systems security modeling is practiced insufficiently because it is still addressed similarly to information technology systems.

Original languageEnglish
Title of host publicationProceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Subtitle of host publicationSupplemental Volume, DSN-S 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages33-36
Number of pages4
ISBN (Electronic)9781728172606
DOIs
Publication statusPublished - 1 Jun 2020
Externally publishedYes
Event50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020 - Valencia, Spain
Duration: 29 Jun 20202 Jul 2020

Publication series

NameProceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020

Conference

Conference50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020
Country/TerritorySpain
CityValencia
Period29/06/202/07/20

Fingerprint

Dive into the research topics of 'Fundamental challenges of cyber-physical systems security modeling'. Together they form a unique fingerprint.

Cite this