Model-driven architecture based security analysis

被引:2
作者
Mili, Saoussen [1 ]
Nguyen, Nga [1 ]
Chelouah, Rachid [1 ]
机构
[1] ETIS Lab, Cergy, France
关键词
code generation; embedded systems; MDA; model checking; model transformation; security; SysML;
D O I
10.1002/sys.21581
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a Model-Driven Architecture approach for the development of an embedded system validation platform namely Model-Based Security Analysis for Embedded Systems (MBSAES). The security properties are formally modeled and verified at an early stage of the design process of the system, which helps to reduce late errors and development time. A separation of the attack scenarios and the system design from the implementation details has been respected. To transform semi-formal models from SysML to NuSVM model checking platform, two Model-to-Text, horizontal and exogenous transformations have been implemented. The first one employs a programming approach with Java to create a Computational Tree Logic specification from an Extended Attack Tree, whereas the second one uses a template approach with Acceleo to generate NuSMV code from SysML structural and behavioral models. To illustrate our approach, a case study, involving attacks aiming to unlock car door systems, via signal jamming and code replaying, is considered. The results of this research will contribute to the automatic validation of system designs against security vulnerabilities via a database of extended attack trees building from existing atomic attacks.
引用
收藏
页码:307 / 321
页数:15
相关论文
共 37 条
[21]  
Li L., 2018, THESIS U PARIS SACLA
[22]  
MDA Guide rev. 2.0, 2014, MDA GUID REV 2 0
[23]   A Taxonomy of Model Transformation [J].
Mens, Tom ;
Van Gorp, Pieter .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 152 :125-142
[24]   Transformation-Based Approach to Security Verification for Cyber-Physical Systems [J].
Mili, Saoussen ;
Nguyen, Nga ;
Chelouah, Rachid .
IEEE SYSTEMS JOURNAL, 2019, 13 (04) :3989-4000
[25]  
MOF Model to Text Transformation Language, 2008, MOF MOD TEXT TRANSF
[26]   Model checking CML: tool development and industrial applications [J].
Mota, A. ;
Farias, A. ;
Woodcock, J. ;
Larsen, P. G. .
FORMAL ASPECTS OF COMPUTING, 2015, 27 (5-6) :975-1001
[27]  
Nguyen P., 2016, INF SOFTW TECHNOL, V11, P83
[28]  
Ouchani S, 2011, ANN CONF PRIV SECUR, P142
[29]  
Pierre Wolper, 1985, Logique Et Analyse, V1985, P119
[30]  
Pudar S, 2007, PRAGMATIC METHOD INT