首页> 外文OA文献 >Security in Embedded Systems : A Model-Based Approach with Risk Metrics
【2h】

Security in Embedded Systems : A Model-Based Approach with Risk Metrics

机译:嵌入式系统中的安全性:基于模型的风险度量方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The increasing prevalence of embedded devices and a boost in sophisticated attacks against them make embedded system security an intricate and pressing issue. New approaches to support the development of security-enhanced systems need to be explored. We realise that efficient transfer of knowledge from security experts to embedded system engineers is vitally important, but hardly achievable in current practice. This thesis proposes a Security-Enhanced Embedded system Design (SEED) approach, which is a set of concepts, methods, and processes that together aim at addressing this challenge of bridging the gap between the two areas of expertise.  We introduce the concept of a Domain-Specific Security Model (DSSM) as a suitable abstraction to capture the knowledge of security experts in a way that this knowledge can be later reused by embedded system engineers. Each DSSM characterises common security issues of a specific application domain in a form of security properties linked to a range of solutions. Next, we complement a DSSM with the concept of a Performance Evaluation Record (PER) to account for the resource-constrained nature of embedded systems. Each PER characterises the resource overhead created by a security solution, a provided level of security, and other relevant information.  We define a process that assists an embedded system engineer in selecting a suitable set of security solutions. The process couples together (i) the use of the security knowledge accumulated in DSSMs and PERs, (ii) the identification of security issues in a system design, (iii) the analysis of resource constraints of a system and available security solutions, and (iv) model-based quantification of security risks to data assets associated with a design model. The approach is supported by a set of tools that automate certain steps. We use scenarios from a smart metering domain to demonstrate how the SEED approach can be applied. We show that our artefacts are rich enough to support security experts in description of knowledge about security solutions, and to support embedded system engineers in integration of an appropriate set of security solutions based on that knowledge. We demonstrate the effectiveness of the proposed method for quantification of security risks by applying it to a metering device. This shows its usage for visualising of and reasoning about security risks inherent in a system design.
机译:嵌入式设备的日益普及和对它们的复杂攻击的增加,使嵌入式系统安全成为一个复杂而紧迫的问题。需要探索支持安全性增强系统开发的新方法。我们认识到,从安全专家到嵌入式系统工程师的有效知识转移至关重要,但在当前实践中很难实现。本文提出了一种安全性增强的嵌入式系统设计(SEED)方法,该方法是一组概念,方法和过程,旨在共同解决弥合这两个专业领域之间鸿沟的挑战。我们引入了特定于域的安全模型(DSSM)的概念,将其作为一种合适的抽象来捕获安全专家的知识,以便以后嵌入式系统工程师可以重用这些知识。每个DSSM都以链接到一系列解决方案的安全属性的形式来表征特定应用程序域的常见安全问题。接下来,我们用性能评估记录(PER)的概念对DSSM进行补充,以解决嵌入式系统资源受限的本质。每个PER都描述了安全解决方案所产生的资源开销,提供的安全级别以及其他相关信息。我们定义一个过程,以帮助嵌入式系统工程师选择合适的安全解决方案集。该过程将(i)DSSM和PER中积累的安全知识的使用结合在一起;(ii)在系统设计中识别安全问题;(iii)分析系统的资源约束和可用的安全解决方案;以及( iv)基于模型的与设计模型相关的数据资产安全风险量化。该方法由自动化某些步骤的一组工具支持。我们使用来自智能计量领域的方案来演示如何应用SEED方法。我们表明,我们的产品足够丰富,可以支持安全专家描述有关安全解决方案的知识,并支持嵌入式系统工程师集成基于该知识的一组适当的安全解决方案。通过将其应用于计量设备,我们证明了所提出方法量化安全风险的有效性。这显示了其用于可视化和推理系统设计中固有的安全风险的用法。

著录项

  • 作者

    Vasilevskaya, Maria;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号