首页> 外文会议>Parallel, Distributed and Network-Based Processing (PDP), 2012 20th Euromicro International Conference on >A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components
【24h】

A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components

机译:嵌入式组件系统安全威胁和攻击的分析和建模方法

获取原文
获取原文并翻译 | 示例

摘要

The development of systems based on embedded components is a challenging task because of their distributed, reactive and real-time nature. From a security point of view, embedded devices are basically systems owned by a certain entity, used frequently as part of systems owned by other entities and operated in a potentially hostile environment. The development of security-enhanced systems of embedded components is a difficult task due to different types of threats that may affect such systems, and because the security in systems of embedded devices is currently added as an additional feature when the development is advanced, or avoided as a superfluous characteristic. We present in this paper a methodology for the analysis and modeling of threats and attacks for systems of embedded components. The Intruder Model allows us to describe possible actions a potential intruder can accomplish, depending on his/her capabilities, resources, etc. Using this information, we can define a Threat Model that will specify the threats and attacks that affect different security properties in specific domains.
机译:基于嵌入式组件的系统的开发具有分布式,响应式和实时性,因此是一项艰巨的任务。从安全角度来看,嵌入式设备基本上是某个实体拥有的系统,经常用作其他实体拥有的系统的一部分,并在潜在的敌对环境中运行。嵌入式组件的安全性增强系统的开发是一项艰巨的任务,因为可能会影响这种系统的威胁类型不同,并且由于当前在进行高级开发或避免开发时,嵌入式设备系统中的安全性已作为附加功能被添加。作为多余的特征。我们在本文中介绍了一种用于嵌入式组件系统的威胁和攻击的分析和建模的方法。入侵者模型使我们可以根据潜在入侵者的能力,资源等来描述潜在入侵者可以完成的操作。使用此信息,我们可以定义威胁模型,该模型将指定影响特定安全性的不同威胁的威胁和攻击域。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号