Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safetycritical systems. Among others there are two significant challenges in this area: (1) the need for models that can characterize a realistic system in the absence of an implementation and (2) an automated way to associate attack vector information; that is, historical data, to such system models. We propose the cybersecurity body of knowledge (CYBOK), which takes in sufficiently characteristic models of systems and acts as a search engine for potential attack vectors. CYBOK is fundamentally an algorithmic approach to vulnerability exploration, which is a significant extension to the body of knowledge it builds upon. By using CYBOK, security analysts and system designers can work together to assess the overall security posture of systems early in their lifecycle, during major design decisions and before final product designs. Consequently, assisting in applying security earlier and throughout the systems lifecycle.Index Terms-Cyber-physical systems, security, safety, modelbased engineering. arXiv:1909.02923v1 [eess.SY]
Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking tools that employ effective dashboards-to manage potential attack vectors, system components, and requirements. This problem is further exacerbated because model-based security analysis produces significantly larger result spaces than security analysis applied to realized systems-where platform specific information, software versions, and system element dependencies are known. Therefore, there is a need to manage the analysis complexity in model-based security through better visualization techniques. Towards that goal, we propose an interactive security analysis dashboard that provides different views largely centered around the system, its requirements, and its associated attack vector space. This tool makes it possible to start analysis earlier in the system lifecycle. We apply this tool in a significant area of engineering design-the design of cyber-physical systems-where security violations can lead to safety hazards.
This research note describes ByrdBot, a science communication tool that leverages bird songs to communicate data regarding human impacts on the environment. With ByrdBot, listeners can compare simulated soundscapes of 1970, 2017, and 2065 to immediately, and viscerally, experience decades of past or projected future environmental change. The communication tactic of ByrdBot—what we call emergent sonification—is discussed as one that capitalizes on computational media to facilitate attunement to nonhuman voices and, subsequently, to offer an affective grasping of the impacts of such phenomena as habitat destruction and climate change on wildlife displacement and loss.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.