Optimizing System Architecture Cost and Security Countermeasures

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The design of an embedded system is built on a trade-off between its performance and its cost. Nowadays, the security threats that target most of the embedded systems introduce a new factor in this trade-off: the security level of the system. So system architects must consider, during the design, the different attacks that target the system and the possible countermeasures, and their costs. In this article, we present a methodology to help designers explore different countermeasures and evaluate their impact on the cost of the architecture and the probability of success of an adversary. This methodology is based on extended and formalized Attack-Defense Trees that allow to assess the impact of countermeasures on system components and attacks. We use propagation rules to characterize a main attack from its different steps, and we formalize the trade-off between security and cost by an optimization problem between attack probability and total architecture cost.

Original languageEnglish
Title of host publicationGraphical Models for Security- 6th International Workshop, GraMSec 2019, Revised Papers
EditorsMassimiliano Albanese, Ross Horne, Christian W. Probst
PublisherSpringer
Pages50-67
Number of pages18
ISBN (Print)9783030365363
DOIs
Publication statusPublished - 1 Jan 2019
Externally publishedYes
Event6th International Workshop on Graphical Models for Security, GraMSec 2019 - Hoboken, United States
Duration: 24 Jun 201924 Jun 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11720 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Workshop on Graphical Models for Security, GraMSec 2019
Country/TerritoryUnited States
CityHoboken
Period24/06/1924/06/19

Keywords

  • Attack-Defense Tree
  • Countermeasures
  • Security of embedded system

Fingerprint

Dive into the research topics of 'Optimizing System Architecture Cost and Security Countermeasures'. Together they form a unique fingerprint.

Cite this