Model‐driven architecture based security analysis
نویسندگان
چکیده
This paper proposes a Model-Driven Architecture approach for the development of an embedded system validation platform namely Model-Based Security Analysis Embedded Systems (MBSAES). The security properties are formally modeled and verified at early stage design process system, which helps to reduce late errors time. A separation attack scenarios from implementation details has been respected. To transform semi-formal models SysML NuSVM model checking platform, two Model-to-Text, horizontal exogenous transformations have implemented. first one employs programming with Java create Computational Tree Logic specification Extended Attack Tree, whereas second uses template Acceleo generate NuSMV code structural behavioral models. illustrate our approach, a case study, involving attacks aiming unlock car door systems, via signal jamming replaying, is considered. results this research will contribute automatic designs against vulnerabilities database extended trees building existing atomic attacks.
منابع مشابه
Architecture Based Information Flow Analysis for Software Security
Using information flow modeling to perform security analysis is a common technique used during software design. While much theoretical work has been conducted in this area, there are few tools to assist with such analysis. In many instances the security analysis must be done by hand, requiring considerable expertise, time, and effort. Most of the available tools require custom code to be writte...
متن کاملModel-based security analysis of the German health card architecture.
OBJECTIVES Health-care information systems are particularly security-critical. In order to make these applications secure, the security analysis has to be an integral part of the system design and IT management process for such systems. METHODS This work presents the experiences and results from the security analysis of the system architecture of the German Health Card, by making use of an ap...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملArchitecture-based Simulation for Security and Performance
Architectural analysis is key to producing high quality architectures. In this demonstration we present two extensions to AcmeStudio, and domain-neutral Architecture Development Environment, to add Performance and Security Simulation. Using AcmeStudio as the integration platform for these analyses allows comparisons and trade-offs between these different quality attributes.
متن کاملSecurity-Based Risk Assessment for Software Architecture
Security-based Risk Assessment for Software Architecture
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Systems Engineering
سال: 2021
ISSN: ['1098-1241', '1520-6858']
DOI: https://doi.org/10.1002/sys.21581