Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0

被引:1
|
作者
Walter, Maximilian [1 ]
Hahner, Sebastian [1 ]
Bures, Tomas [2 ]
Hnetynka, Petr [2 ]
Heinrich, Robert [1 ]
Reussner, Ralf [1 ]
机构
[1] Karlsruhe Inst Technol KIT, Inst Informat Secur & Dependabil KASTEL, Dependabil Software Intens Syst Grp DSiS, Fasanengarten 5, D-76131 Karlsruhe, Germany
[2] Charles Univ Prague, Fac Math & Phys, Malostranske Namesti 25, Prague 1, Czech Republic
关键词
attack propagation; confidentiality; software architecture;
D O I
10.1515/auto-2022-0135
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Exchanging data between entities is an essential part of Industry 4.0. However, the data exchange should not affect the confidentiality. Therefore, data should only be shared with the intended entities. In exceptional scenarios, it is unclear whether data should be shared or not and what the impact of the access decision is. Runtime access control systems such as role-based access control often do not consider the impact on the overall confidentiality. Static design-time analyses often provide this information. We use architectural design-time analyses together with an uncertainty variation metamodel mitigating uncertainty to calculate impact properties of attack paths. Runtime access control approaches can then use this information to support the access control decision. We evaluated our approach on four case studies based on real-world examples and research cases.
引用
收藏
页码:443 / 452
页数:10
相关论文
共 15 条
  • [1] Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
    Walter, Maximilian
    Heinrich, Robert
    Reussner, Ralf
    2022 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2022), 2022, : 59 - 59
  • [2] Architecture-Based Attack Path Analysis for Identifying Potential Security Incidents
    Walter, Maximilian
    Heinrich, Robert
    Reussner, Ralf
    SOFTWARE ARCHITECTURE, ECSA 2023, 2023, 14212 : 37 - 53
  • [3] Architecture-based Uncertainty Impact Analysis to ensure Confidentiality
    Hahner, Sebastian
    Heinrich, Robert
    Reussner, Ralf
    2023 IEEE/ACM 18TH SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS, SEAMS, 2023, : 126 - 132
  • [4] Architecture-Based Issue Propagation Analysis
    Speth, Sandro
    Krieger, Niklas
    Heinrich, Robert
    Becker, Steffen
    SOFTWARE ARCHITECTURE, ECSA 2024, 2024, 14889 : 121 - 137
  • [5] Analysis and design for architecture-based software
    Jia Xiaolin
    JournalofSystemsEngineeringandElectronics, 2005, (04) : 924 - 930
  • [6] Architecture-based software reliability analysis with interface failures
    Gokhale, Swapna S.
    Lipton, Michael W.
    ELEVENTH ISSAT INTERNATIONAL CONFERENCE RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2005, : 6 - 11
  • [7] A blockchain-based confidentiality-preserving approach to traceability in Industry 4.0
    Valentin Mullet
    Patrick Sondi
    Eric Ramat
    The International Journal of Advanced Manufacturing Technology, 2023, 124 : 1297 - 1320
  • [8] Architecture-based performance analysis applied to a telecommunication system
    Petriu, D
    Shousha, C
    Jalnapurkar, A
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (11) : 1049 - 1065
  • [9] A blockchain-based confidentiality-preserving approach to traceability in Industry 4.0
    Mullet, Valentin
    Sondi, Patrick
    Ramat, Eric
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2023, 124 (3-4) : 1297 - 1320
  • [10] Industry 4.0 Middleware Software Architecture Interoperability Analysis
    Jepsen, Sune Chung
    Worm, Torben
    Mork, Thomas Ingemann
    Hviid, Jakob
    2021 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING RESEARCH AND PRACTICES FOR THE IOT (SERP4IOT), 2021, : 32 - 35