Security-aware Modeling and Analysis for HW/SW Partitioning

@inproceedings{Li2017SecurityawareMA,
  title={Security-aware Modeling and Analysis for HW/SW Partitioning},
  author={Letitia W. Li and Florian Lugou and Ludovic Apvrille},
  booktitle={MODELSWARD},
  year={2017}
}
The rising wave of attacks on communicating embedded systems has exposed their users to risks of informa- tion theft, monetary damage, and personal injury. Through improved modeling and analysis of security, we propose that these flaws could be mitigated. Since HW/SW partitioning, one of the first phases, impacts future integration of security into the system, this phase would benefit from supporting modeling security abstrac- tions and security properties, providing designers with useful… Expand

Figures, Tables, and Topics from this paper

Security Modeling for Embedded System Design
TLDR
This paper presents how the SysML-Sec Methodology has been enhanced for the evolving graphical modeling of security through the three stages of the authors' embedded system design methodology: Analysis, HW/SW Partitioning, and Software Analysis. Expand
Evolving Attacker Perspectives for Secure Embedded System Design
TLDR
This paper demonstrates that explicitly modeling attacker actions within a system model helps to evaluate its impact and possible countermeasures, and evolved the SysML-Sec Methodology with ``Attacker Scenarios'' for the improved design of secure embedded systems. Expand
A systematic literature review ofmodel-driven security engineering for cyber–physical systems
The last years have elevated the importance of cyber–physical systems like IoT applications, smart cars, or industrial control systems, and, therefore, these systems have also come into the focus ofExpand
A systematic literature review of model-driven security engineering for cyber-physical systems
TLDR
It is found that model-driven security is a relevant research area but most approaches focus only on specific security properties and even for CPS-specific approaches the platform is only rarely taken into account. Expand
Safe and secure model-driven design for embedded systems
  • L. Li
  • Computer Science
  • 2018
TLDR
This thesis proposes a modeling-based methodology for safe and secure design, based on the SysML-Sec Methodology, which involve new modeling and verification methods. Expand
Harmonizing Safety, Security and Performance Requirements in Embedded Systems
  • L. Apvrille, L. Li
  • Computer Science
  • 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)
  • 2019
TLDR
How safety, security, and performance requirements should be assured with a systematic design process, and how these properties can support or conflict with each other as detected during the verification process are discussed. Expand
Security Driven Design Space Exploration for Embedded Systems
TLDR
This paper introduces a novel DSE framework, which allows the consideration of security constraints, in the form of attack scenarios, and attack mitigations, in a form of security tasks, based on the system’s functionality and architecture, possible attacks, and known mitigation techniques. Expand
Towards an Automated Exploration of Secure IoT/CPS Design-Variants
TLDR
A framework that offers designers the possibility to model security constraints from the view of potential attackers, assessing the probability of successful security attacks and the resulting security risk, alike is demonstrated. Expand
A Design Exploration Framework for Secure IoT-Systems
TLDR
A security attack based design space exploration framework, capable of finding the optimal design for an IoT system, based on its architectural, behavioral, and security attack description, is introduced. Expand
Design Space Exploration for Secure IoT Devices and Cyber-Physical Systems
TLDR
This article introduces a novel DSE framework, which allows the consideration of security constraints, in the form of attack scenarios, and attack mitigations in the forms of security tasks, and finds the optimal design for a secure IoT device or CPS. Expand
...
1
2
...

References

SHOWING 1-10 OF 27 REFERENCES
SysML-Sec: A model driven approach for designing safe and secure systems
  • Y. Roudier, L. Apvrille
  • Computer Science
  • 2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)
  • 2015
TLDR
The whole methodology of SysML-Sec is illustrated with the evaluation of a security mechanism added to an existing automotive system, and its partitioning stage during which safety-related and security-related functions are explored jointly and iteratively with regards to requirements and attacks. Expand
SysML models and model transformation for security
TLDR
Novel SysML block and state machine diagrams enhanced to better capture security features and a model-to-Proverif transformation to demonstrate the soundness of the approach using a complex asymmetric key distribution protocol. Expand
Model-Based Verification of Security and Non-Functional Behavior using AADL
TLDR
This work describes how model-based development using the Architecture Analysis and Design Language (AADL) and compatible analysis tools provides the platform for multi-dimensional, multi-fidelity analysis and verification. Expand
A Rigorous Methodology for Security Architecture Modeling and Verification
TLDR
This paper introduces a rigorous methodology for utilizing threat modeling in building secure software architectures using SAM and verifying them formally using Symbolic Model Checking and proposes a translation from SAM Secure models into the SMV model checker. Expand
Architectural Modeling to Verify Security and Nonfunctional Behavior
TLDR
The Architecture Analysis and Design Language (AADL) provides a platform for multidimensional model analysis and verification and a single-source system model annotated with analysis-specific information can reflect architectural changes with little additional effort. Expand
A first step towards formal verification of security policy properties for RBAC
TLDR
The paper presents an example of a RBAC security policy having the dual control property, proved in a first-order linear temporal logic (LTL) that has been embedded in the theorem prover Isabelle/HOL by the authors. Expand
AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties
TLDR
A SysML-based environment named AVATAR is introduced, which can capture both safety and security related elements in the same Sys ML model, and is highlighted with a realistic embedded automotive system taken from an ongoing joint project of academia and industry called EVITA. Expand
Formal verification of security protocol implementations: a survey
TLDR
This paper surveys techniques that bring automated formal proofs closer to real implementations of security protocols, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. Expand
Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design
TLDR
This paper considers attack and system behaviours as two separate models that are later elegantly combined for security analysis, and proposes likelihood/consequence-based measures of confidentiality and integrity losses to characterise security risks to data assets. Expand
UMLsec: Extending UML for Secure Systems Development
TLDR
This work presents the extension UMLsec of UML that allows to express securityrelevant information within the diagrams in a system specification, and gives criteria to evaluate the security aspects of a system design, by referring to a formal semantics of a simplified UML. Expand
...
1
2
3
...