TY - GEN
T1 - Optimizing System Architecture Cost and Security Countermeasures
AU - Berro, Sahar
AU - Apvrille, Ludovic
AU - Duc, Guillaume
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019/1/1
Y1 - 2019/1/1
N2 - The design of an embedded system is built on a trade-off between its performance and its cost. Nowadays, the security threats that target most of the embedded systems introduce a new factor in this trade-off: the security level of the system. So system architects must consider, during the design, the different attacks that target the system and the possible countermeasures, and their costs. In this article, we present a methodology to help designers explore different countermeasures and evaluate their impact on the cost of the architecture and the probability of success of an adversary. This methodology is based on extended and formalized Attack-Defense Trees that allow to assess the impact of countermeasures on system components and attacks. We use propagation rules to characterize a main attack from its different steps, and we formalize the trade-off between security and cost by an optimization problem between attack probability and total architecture cost.
AB - The design of an embedded system is built on a trade-off between its performance and its cost. Nowadays, the security threats that target most of the embedded systems introduce a new factor in this trade-off: the security level of the system. So system architects must consider, during the design, the different attacks that target the system and the possible countermeasures, and their costs. In this article, we present a methodology to help designers explore different countermeasures and evaluate their impact on the cost of the architecture and the probability of success of an adversary. This methodology is based on extended and formalized Attack-Defense Trees that allow to assess the impact of countermeasures on system components and attacks. We use propagation rules to characterize a main attack from its different steps, and we formalize the trade-off between security and cost by an optimization problem between attack probability and total architecture cost.
KW - Attack-Defense Tree
KW - Countermeasures
KW - Security of embedded system
UR - https://www.scopus.com/pages/publications/85076824971
U2 - 10.1007/978-3-030-36537-0_4
DO - 10.1007/978-3-030-36537-0_4
M3 - Conference contribution
AN - SCOPUS:85076824971
SN - 9783030365363
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 50
EP - 67
BT - Graphical Models for Security- 6th International Workshop, GraMSec 2019, Revised Papers
A2 - Albanese, Massimiliano
A2 - Horne, Ross
A2 - Probst, Christian W.
PB - Springer
T2 - 6th International Workshop on Graphical Models for Security, GraMSec 2019
Y2 - 24 June 2019 through 24 June 2019
ER -