Data Driven Vulnerability Exploration for Design Phase System Analysis

09/06/2019
by   Georgios Bakirtzis, et al.
0

Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others there are two significant challenges in this area: (1) the need for models that can characterize a realistic system in the absence of an implementation and (2) an automated way to associate attack vector information; that is, historical data, to such system models. We propose the cybersecurity body of knowledge (CYBOK), which takes in sufficiently characteristic models of systems and acts as a search engine for potential attack vectors. CYBOK is fundamentally an algorithmic approach to vulnerability exploration, which is a significant extension to the body of knowledge it builds upon. By using CYBOK, security analysts and system designers can work together to assess the overall security posture of systems early in their lifecycle, during major design decisions and before final product designs. Consequently, assisting in applying security earlier and throughout the systems lifecycle.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/31/2017

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

Evaluating the security of cyber-physical systems throughout their life ...
research
08/02/2023

An Adaptable Approach for Successful SIEM Adoption in Companies

In corporations around the world, the topic of cybersecurity and informa...
research
07/24/2022

Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches

The thesis advances the field of software security by providing knowledg...
research
09/09/2020

A Security Architecture for Railway Signalling

We present the proposed security architecture Deutsche Bahn plans to dep...
research
08/24/2018

Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

Today, there is a plethora of software security tools employing visualiz...
research
09/14/2020

Hold Tight and Never Let Go: Security of Deep Learning based Automated Lane Centering under Physical-World Attack

Automated Lane Centering (ALC) systems are convenient and widely deploye...
research
07/21/2021

The analysis approach of ThreatGet

Nowadays, almost all electronic devices include a communication interfac...

Please sign up or login with your details

Forgot password? Click here to reset