Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge

作者: Vasily Desnitsky , Igor Kotenko

DOI: 10.1007/S12652-016-0371-6

关键词: Cloud computingInternet accessComputer scienceEmbedded systemCloud computing securitySecurity serviceComputer security modelComponent (UML)Security testingIdentification (information)

摘要: The rising significance and widening of embedded systems stipulate the importance security means against a great deal computer threats. Such involving diversity an-hoc mobile electronic devices functioning with use broadband Internet access even cloud technologies, are referenced conventionally as Things (IoT). Due to specificity IoT application combined mechanisms requires their efficient energy computing resource consumption, identification potential conflicts incompatibilities, control information flows, monitoring anomalies data in system other issues. At that an increased design complexity is determined by low structuring formalization knowledge field. We proposed approach expert for its subsequent automated design, verification testing tools secure systems. paper encompasses core elements technique, namely component configuring, revelation implicit conflicts, network flows abnormal from sensors. domain specific analysis field described. also present revealed used configuration, devices. Issues software implementation discussion covered.

参考文章(30)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Exposing Security Risks for Commercial Mobile Devices Lecture Notes in Computer Science. pp. 3- 21 ,(2012) , 10.1007/978-3-642-33704-8_2
Vasily Desnitsky, Igor Kotenko, Andrey Chechulin, Configuration-Based Approach to Embedded Device Security Lecture Notes in Computer Science. pp. 270- 285 ,(2012) , 10.1007/978-3-642-33704-8_23
Andrey Chechulin, Igor Kotenko, Vasily Desnitsky, An Approach for Network Information Flow Analysis for Systems of Embedded Components Lecture Notes in Computer Science. pp. 146- 155 ,(2012) , 10.1007/978-3-642-33704-8_13
Vasily Desnitsky, Igor Kotenko, Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices Advanced Information Systems Engineering. pp. 194- 210 ,(2014) , 10.1007/978-3-319-10975-6_15
Eduardo Fernandez, Duane Hybertson, Markus Schumacher, Frank Buschmann, Security Patterns: Integrating Security and Systems Engineering ,(2006)
Thomas A. Henzinger, Joseph Sifakis, The Embedded Systems Design Challenge FM 2006: Formal Methods. pp. 1- 15 ,(2006) , 10.1007/11813040_1
Andrew Rae, Colin J. Fidge, Identifying Critical Components During Information Security Evaluations Journal of Research and Practice in Information Technology. ,vol. 37, pp. 311- 322 ,(2005)
VA Desnitsky, IV Kotenko, SB Nogin, None, Detection of anomalies in data for monitoring of security components in the Internet of Things soft computing. pp. 189- 192 ,(2015) , 10.1109/SCM.2015.7190452
Markus G. Kuhn, Oliver Kömmerling, Design principles for tamper-resistant smartcard processors WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology. pp. 2- 2 ,(1999)
Igor Kotenko, Olga Polubelova, None, Verification of security policy filtering rules by Model Checking Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems. ,vol. 2, pp. 706- 710 ,(2011) , 10.1109/IDAACS.2011.6072862