首页> 外文期刊>IEEE systems journal >Transformation-Based Approach to Security Verification for Cyber-Physical Systems
【24h】

Transformation-Based Approach to Security Verification for Cyber-Physical Systems

机译:基于转换的网络物理系统安全性验证方法

获取原文
获取原文并翻译 | 示例
       

摘要

The increasing complexity of cyber-physical systems motivates new modeling approaches to ensure system security right from the design process. In this paper, we present a model-based approach to formally validate communicating systems against cyber-attacks. Security requirements are modeled by using the unified modeling language (UML) extended attack tree profile with temporal logic operators. Moreover, to identify attack propagation, another UML profile, i.e., the connectivity profile, has been integrated to model interactions between system components. In order to carry out a formal verification of the system, a transformation platform that automatically generates a new symbolic model verifier code from systems modeling language (SysML) models for both static and dynamic aspects has been developed. The modeling and validation process is illustrated via two case studies on connected cars: 2014 Jeep Cherokee attack and 2016 Tesla Model S attack.
机译:网络物理系统的日益复杂性激发了新的建模方法,以确保从设计过程开始就确保系统安全。在本文中,我们提出了一种基于模型的方法来正式验证通信系统是否受到网络攻击。通过使用带有时态逻辑运算符的统一建模语言(UML)扩展攻击树概要文件来对安全要求进行建模。此外,为了识别攻击传播,已经集成了另一个UML配置文件,即连接配置文件,以对系统组件之间的交互进行建模。为了进行系统的形式验证,已经开发了一种转换平台,该转换平台可以从系统建模语言(SysML)模型自动为静态和动态方面生成新的符号模型验证程序代码。通过两个有关联网汽车的案例研究说明了建模和验证过程:2014年吉普切诺基攻击和2016年特斯拉Model S攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号