Mission-Aware Vulnerability Assessment for Cyber-Physical Systems

被引:1
作者
Wang, Xiaotian [1 ]
Davis, Matthew [1 ]
Zhang, Junjie [1 ]
Saunders, Vance [1 ]
机构
[1] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
来源
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 | 2015年
关键词
D O I
10.1109/Trustcom.2015.496
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerability assessment becomes indispensable. In this paper, we discuss our ongoing work on building an automated mission-aware vulnerability CPS assessment framework that can accomplish three objectives including i) mapping CPS missions into infrastructural components, ii) evaluating global impact of each vulnerability, and iii) achieving verifiable results and high flexibility. In order to accomplish these objectives, we follow a model-assisted analysis strategy. Specifically, we take advantage of CPS simulator to model the behaviors of CPS components under different missions; our framework facilitates a bottomup approach to construct a holistic model of a CPS that aim at profiling relationships among all CPS components. Formal methods, including program symbolic execution, logic programming, and linear optimization, have been employed to analyze the model, which build mathematical rigor into our framework. The framework first identifies mission-critical components, then discovers all attack paths from system access points to mission-critical components, and finally recommends the optimized mitigation plan.
引用
收藏
页码:1148 / 1153
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 1997, INTRO LINEAR OPTIMIZ
[2]  
[Anonymous], 2004, FORMAL METHODS COMPO
[3]  
[Anonymous], 2006, TECHNICAL REPORT
[4]  
Cadar Cristian., OSDI
[5]  
Clarke E. M., ACM COMPUTING SURVEY
[6]  
Clocksin W.F., 1987, PROGRAMMING PROLOG, V5
[7]  
Corte-Real J., P PPDP 13
[8]  
Jakobson G., 2011, INFORM FUSION FUSION
[9]   SYMBOLIC EXECUTION AND PROGRAM TESTING [J].
KING, JC .
COMMUNICATIONS OF THE ACM, 1976, 19 (07) :385-394
[10]  
Musman S., 2011, COMPUTATIONAL INTELL