Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System

作者: Jason Jaskolka

DOI: 10.1007/978-3-030-64330-0_3

关键词:

摘要: Critical infrastructures consist of numerous components, and even more interactions, many which may not be expected or foreseen by the system designers. The existence these so-called implicit interactions indicates design flaws that, if mitigated, could result in losses stability, safety, security. In this paper, we apply a formal methods-based approach for identifying analyzing real-world Wastewater Dechlorination System provided municipal wastewater treatment facility. A model is developed using C\(^2\)KA modeling framework analysis automated software prototype. results include summary identified calculation their severity exploitability, helps to inform mitigation efforts at early stages design. We validate with questionnaire shows that rigorous, practical approaches applied case study have potential improve overall security resilience.

参考文章(17)
Jason Jaskolka, Ridha Khedri, Qinglei Zhang, Endowing Concurrent Kleene Algebra with Communication Actions International Conference on Relational and Algebraic Methods in Computer Science. pp. 19- 36 ,(2014) , 10.1007/978-3-319-06251-8_2
Robin Milner, Communication and Concurrency ,(1989)
Jianjun Shen, Sihan Qing, A dynamic information flow model of secure systems Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 341- 343 ,(2007) , 10.1145/1229285.1229321
Edsger W. Dijkstra, Guarded commands, nondeterminacy and formal derivation of programs Communications of the ACM. ,vol. 18, pp. 453- 457 ,(1975) , 10.1145/360933.360975
Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera, Securing UML Information Flow Using FlowUML. Journal of Research and Practice in Information Technology. ,vol. 38, ,(2006)
V. Varadharajan, Petri net based modelling of information flow security requirements [1990] Proceedings. The Computer Security Foundations Workshop III. pp. 51- 61 ,(1990) , 10.1109/CSFW.1990.128185
R. Focardi, R. Gorrieri, F. Martinelli, Real-time information flow analysis IEEE Journal on Selected Areas in Communications. ,vol. 21, pp. 20- 35 ,(2003) , 10.1109/JSAC.2002.806122
Katia Hristova, Tom Rothamel, Yanhong A. Liu, Scott D. Stoller, Efficient type inference for secure information flow Proceedings of the 2006 workshop on Programming languages and analysis for security - PLAS '06. pp. 85- 94 ,(2006) , 10.1145/1134744.1134759