首页> 外文OA文献 >Diversity, Safety and Security in Embedded Systems: modelling adversary effort and supply chain risks
【2h】

Diversity, Safety and Security in Embedded Systems: modelling adversary effort and supply chain risks

机译:嵌入式系统中的多样性,安全性和安全性:模拟对手的努力和供应链风险

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We present quantitative considerations for the design of redundancy and diversity in embedded systems with security requirements. The potential for malicious activity against these systems have complicated requirements and design choices. New design trade-offs have arisen besides those already familiar in this area: for instance, adding redundancy may increase the attack surface of a system and thus increase overall risk. Our case study concerns protecting redundant communications between a control system and its controlled physical system. We study the effects of using: (i) different encryption keys on replicated channels, and (ii) diverse encryption schemes and implementations. We consider two attack scenarios, with adversaries having access to (i) ways of reducing the search space in attacks using random searches for keys; or (ii) hidden major flaws in some crypto algorithm or implementation. Trade-offs between the requirements of integrity and confidentiality are found, but not in all cases. Simple models give useful design insights. In this system, we find that key diversity improves integrity without impairing confidentiality – no trade-offs arise between the two – and it can substantially increase adversary effort, but it will not remedy substantial weaknesses of the crypto system. Implementation diversity does involve design trade-offs between integrity and confidentiality, which we analyse, but turns out to be generally desirable for highly critical applications of the control system considered.
机译:我们提出了对具有安全要求的嵌入式系统中冗余和多样性设计的定量考虑。针对这些系统进行恶意活动的可能性具有复杂的要求和设计选择。除了在该领域已经很熟悉的设计之外,还出现了新的设计折衷:例如,增加冗余可能会增加系统的攻击面,从而增加总体风险。我们的案例研究涉及保护控制系统与其受控物理系统之间的冗余通信。我们研究使用以下内容的影响:(i)复制通道上的不同加密密钥,以及(ii)多种加密方案和实现。我们考虑两种攻击情形,攻击者可以使用以下方式:(i)使用随机搜索密钥减少攻击中搜索空间的方式;或(ii)某些加密算法或实现中隐藏的主要缺陷。可以在完整性和机密性要求之间进行权衡,但并非在所有情况下都可以。简单的模型可以提供有用的设计见解。在这个系统中,我们发现密钥多样性在不损害机密性的情况下提高了完整性-两者之间没有权衡取舍-它可以极大地增加对手的努力,但不会弥补加密系统的实质性弱点。实现多样性确实涉及完整性和机密性之间的设计权衡,我们对此进行了分析,但事实证明,对于所考虑的控制系统的高度关键应用而言,实现多样性通常是合乎需要的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号