Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

被引:0
作者
Bakirtzis, Georgios [1 ]
Simon, Brandon J. [1 ]
Fleming, Cody H. [2 ]
Elks, Carl R. [1 ]
机构
[1] Virginia Commonwealth Univ, Elect & Comp Engn, Med Coll Virginia Campus, Richmond, VA 23284 USA
[2] Virginia Commonwealth Univ, Syst Engn & Mech & Aerosp Engn, Richmond, VA USA
来源
2018 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC 2018) | 2018年
关键词
Human-centered computing; Visualization; Visualization techniques; Graph drawings; Visualization systems and tools; Visualization toolkits; Security and privacy; Systems Security; Vulnerability management; Security in hardware; Embedded systems security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking tools that employ effective dashboards-to manage potential attack vectors, system components, and requirements. This problem is further exacerbated because model-based security analysis produces significantly larger result spaces than security analysis applied to realized systems-where platform specific information, software versions, and system element dependencies are known. Therefore, there is a need to manage the analysis complexity in model-based security through better visualization techniques. Towards that goal, we propose an interactive security analysis dashboard that provides different views largely centered around the system, its requirements, and its associated attack vector space. This tool makes it possible to start analysis earlier in the system lifecycle. We apply this tool in a significant area of engineering design-the design of cyber-physical systems-where security violations can lead to safety hazards.
引用
收藏
页数:8
相关论文
共 28 条
[1]  
Adams S., 2018, TRUST SEC PRIV COMP, P1
[2]   Analysis of Safety-Critical Computer Failures in Medical Devices [J].
Alemzadeh, Homa ;
Iyer, Ravishankar K. ;
Kalbarczyk, Zbigniew ;
Raman, Jai .
IEEE SECURITY & PRIVACY, 2013, 11 (04) :14-26
[3]  
Angelini M., 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), P1, DOI [10.1109/VIZSEC.2015, DOI 10.1109/VIZSEC.2015]
[4]  
Bakirtzis G., 2018, SYST C SYSCON 2018 A
[5]  
Bellovin S. M., 2015, THINKING SECURITY ST
[6]  
Brandes Ulrik, 2013, Graph markup language (GraphML)
[7]  
Cardon A, 2006, UNDERST COMPLEX SYST, P25, DOI 10.1007/3-540-34824-7_2
[8]  
Carter B. T., 2018, SYST C SYSCON 2018 A
[9]  
Carter B. T., 2018, C SYST ENG RES CSER
[10]  
Checkoway D., 2011, P USENIX SEC S SAN F, P6