Design for Process Security
نویسندگان
چکیده
Chemical process security has been an area of interest due to the potential of process industries as a possible terrorism target. As a result, model-based process security analysis methods that try to detect process vulnerabilities in a fundamental way have been proposed. The design aspect of the problem, however, has not been addressed yet. In this work, an adverse-MPC approach, which enables estimation of security vulnerability for a given process is proposed, and is coupled by a secure-design problem that retrofits the design to minimize the vulnerability. The proposed method is realized using a bi-level formulation, where the security evaluation is posed as a constraint in the outer design problem. The method described in this work enables design of processes that are inherently less vulnerable to security threats. Further, the method can be extended to combine economics into the security problem, hence enabling design of optimal designs in terms of both security and cost efficiency. The algorithm can also be utilized for design of robust security systems. The application potential of the approach is demonstrated by a runaway reactor example.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملEnvironment Security and Decrease of Crimes with CPTED Approach Critical and Analytical Discussion
Crime and the fear of crime are pervasive and endemic concerns in modern post-industrial society and criminal justice systems are clearly failing to tackle both issues. In this research after mentioning the abstract for motivation and the vital opinion in the security public, the role of city framework (programming the environmental design) in the decrease and prediction of crimes in the city...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کامل