A Method for Revealing and Addressing Security Vulnerabilities in Cyber-physical Systems by Modeling Malicious Agent Interactions with Formal Verification

التفاصيل البيبلوغرافية
العنوان: A Method for Revealing and Addressing Security Vulnerabilities in Cyber-physical Systems by Modeling Malicious Agent Interactions with Formal Verification
المؤلفون: Dean C. Wardell, Robert F. Mills, Mark E. Oxley, Gilbert L. Peterson
المصدر: Procedia Computer Science. 95:24-31
بيانات النشر: Elsevier BV, 2016.
سنة النشر: 2016
مصطلحات موضوعية: Model checking, Control system security, 0209 industrial biotechnology, Computer science, industrial control systems, Cyber-physical system, Vulnerability, 02 engineering and technology, Industrial control system, Computer security, computer.software_genre, model checking, Critical infrastructure, 020901 industrial engineering & automation, malicious agents, vulnerability detection, 0202 electrical engineering, electronic engineering, information engineering, Security through obscurity, General Earth and Planetary Sciences, Systems design, 020201 artificial intelligence & image processing, computer, Formal verification, General Environmental Science
الوصف: Several cyber-attacks on the cyber-physical systems (CPS) that monitor and control critical infrastructure were publically announced over the last few years. Almost without exception, the proposed security solutions focus on preventing unauthorized access to the industrial control systems (ICS) at various levels – the defense in depth approach. While useful, it does not address the problem of making the systems more capable of responding to the malicious actions of an attacker once they have gained access to the system. The first step in making an ICS more resilient to an attacker is identifying the cyber security vulnerabilities the attacker can use during system design. This paper presents a method that reveals cyber security vulnerabilities in ICS through the formal modeling of the system and malicious agents. The inclusion of the malicious agent in the analysis of an existing systems identifies security vulnerabilities that are missed in traditional functional model checking.
تدمد: 1877-0509
DOI: 10.1016/j.procs.2016.09.289
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e4684bdba8304ae97ac4d54c09742ae8
حقوق: OPEN
رقم الأكسشن: edsair.doi.dedup.....e4684bdba8304ae97ac4d54c09742ae8
قاعدة البيانات: OpenAIRE
الوصف
تدمد:18770509
DOI:10.1016/j.procs.2016.09.289