Model-Based Generation of Attack-Fault Trees

09/18/2023
by   Raffaela Groner, et al.
0

Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to model and model-check a holistic view on both safety and security. Manually creating a complete AFT for the whole system is, however, a daunting task. It needs to span multiple abstraction layers, e.g., abstract application architecture and data flow as well as system and library dependencies that are affected by various vulnerabilities. We present an AFT generation tool-chain that facilitates this task using partial Fault and Attack Trees that are either manually created or mined from vulnerability databases. We semi-automatically create two system models that provide the necessary information to automatically combine these partial Fault and Attack Trees into complete AFTs using graph transformation rules.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/12/2019

Parametric analyses of attack-fault trees

Risk assessment of cyber-physical systems, such as power plants, connect...
research
03/10/2023

Securing Safety in Collaborative Cyber-Physical Systems through Fault Criticality Analysis

Collaborative Cyber-Physical Systems (CCPS) are systems that contain tig...
research
09/28/2022

Extending Attack-Fault Trees with Runtime Verification

Autonomous systems are often complex and prone to software failures and ...
research
09/18/2023

Towards Model Co-evolution Across Self-Adaptation Steps for Combined Safety and Security Analysis

Self-adaptive systems offer several attack surfaces due to the communica...
research
03/13/2019

Safety Analysis for Vehicle Guidance Systems with Dynamic Fault Trees

This paper considers the design-phase safety analysis of vehicle guidanc...
research
05/05/2020

Automatic Generation of RAMS Analyses from Model-based Functional Descriptions using UML State Machines

In today's industrial practice, safety, reliability or availability arti...
research
08/10/2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Attack graphs are one of the main techniques used to automate the risk a...

Please sign up or login with your details

Forgot password? Click here to reset