A Hybrid Threat Model for Smart Systems

被引:8
作者
Valenza, Fulvio [1 ]
Karafili, Erisa [2 ]
Steiner, Rodrigo Vieira [3 ]
Lupu, Emil C. [3 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
[2] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 IBJ, Hants, England
[3] Imperial Coll London, Dept Comp, London SW7 2AZ, England
基金
英国工程与自然科学研究理事会;
关键词
Smart buildings; Passwords; Cyber-physical systems; Phishing; Object recognition; Internet of Things; Wind farms; Threat analysis; cybersecurity modelling; threat model; cyber-physical systems;
D O I
10.1109/TDSC.2022.3213577
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems and their smart components have a pervasive presence in all our daily activities. Unfortunately, identifying the potential threats and issues in these systems and selecting enough protection is challenging given that such environments combine human, physical and cyber aspects to the system design and implementation. Current threat models and analysis do not take into consideration all three aspects of the analyzed system, how they can introduce new vulnerabilities or protection measures to each other. In this work, we introduce a novel threat model for cyber-physical systems that combines the cyber, physical, and human aspects. Our model represents the system's components relations and security properties by taking into consideration these three aspects. Together with the threat model we also propose a threat analysis method that allows understanding the security state of the system's components. The threat model and the threat analysis have been implemented into an automatic tool, called TAMELESS, that automatically analyzes threats to the system, verifies its security properties, and generates a graphical representation, useful for security architects to identify the proper prevention/mitigation solutions. We show and prove the use of our threat model and analysis with three cases studies from different sectors.
引用
收藏
页码:4403 / 4417
页数:15
相关论文
共 37 条
[1]   Analysis of information flow security in cyber-physical systems [J].
Akella, Ravi ;
Tang, Han ;
McMillin, Bruce M. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2010, 3 (3-4) :157-173
[2]  
[Anonymous], 2019, DATA BREACH INVESTIG
[3]  
[Anonymous], 2013, PROC 22 INT C EXHIB
[4]  
BACIC E, 2006, MULVAL EXTENSIONS FO
[5]  
BARRRE M, 2017, P IEEE C COMM NETW S, P378
[6]   securiCAD by foreseeti A CAD tool for enterprise cyber security management [J].
Ekstedt, Mathias ;
Johnson, Pontus ;
Lagerstrom, Robert ;
Gorton, Dan ;
Nydren, Joakim ;
Shahzad, Khurram .
PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2015), 2015, :152-155
[7]  
GONZALEZ LM, 2017, ACM T PRIV SECUR, V20, DOI DOI 10.1145/3105760
[8]  
Hacks Simon, 2020, Energy Informatics, V3, DOI [10.1186/s42162-020-00134-4, 10.1186/s42162-020-00134-4]
[9]   P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language [J].
Holm, Hannes ;
Shahzad, Khurram ;
Buschle, Markus ;
Ekstedt, Mathias .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (06) :626-639
[10]  
Homer J, 2008, LECT NOTES COMPUT SC, V5210, P68, DOI 10.1007/978-3-540-85933-8_7