Model‐driven architecture based security analysis

نویسندگان

چکیده

This paper proposes a Model-Driven Architecture approach for the development of an embedded system validation platform namely Model-Based Security Analysis Embedded Systems (MBSAES). The security properties are formally modeled and verified at early stage design process system, which helps to reduce late errors time. A separation attack scenarios from implementation details has been respected. To transform semi-formal models SysML NuSVM model checking platform, two Model-to-Text, horizontal exogenous transformations have implemented. first one employs programming with Java create Computational Tree Logic specification Extended Attack Tree, whereas second uses template Acceleo generate NuSMV code structural behavioral models. illustrate our approach, a case study, involving attacks aiming unlock car door systems, via signal jamming replaying, is considered. results this research will contribute automatic designs against vulnerabilities database extended trees building existing atomic attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Architecture Based Information Flow Analysis for Software Security

Using information flow modeling to perform security analysis is a common technique used during software design. While much theoretical work has been conducted in this area, there are few tools to assist with such analysis. In many instances the security analysis must be done by hand, requiring considerable expertise, time, and effort. Most of the available tools require custom code to be writte...

متن کامل

Model-based security analysis of the German health card architecture.

OBJECTIVES Health-care information systems are particularly security-critical. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such systems. METHODS This work presents the experiences and results from the security analysis of the system architecture of the German Health Card, by making use of an ap...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Architecture-based Simulation for Security and Performance

Architectural analysis is key to producing high quality architectures. In this demonstration we present two extensions to AcmeStudio, and domain-neutral Architecture Development Environment, to add Performance and Security Simulation. Using AcmeStudio as the integration platform for these analyses allows comparisons and trade-offs between these different quality attributes.

متن کامل

Security-Based Risk Assessment for Software Architecture

Security-based Risk Assessment for Software Architecture

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Systems Engineering

سال: 2021

ISSN: ['1098-1241', '1520-6858']

DOI: https://doi.org/10.1002/sys.21581