2018
DOI: 10.14236/ewic/ics2018.1
|View full text |Cite
|
Sign up to set email alerts
|

CPS Security Assessment using Automatically Generated Attack Trees

Abstract: Over the last decades, cyber-physical systems have evolved from isolated to complex interconnected systems that are remotely accessible. This made them easier to attack, especially since they often contain legacy components with known vulnerabilities. This paper presents a methodology to assess the security of a cyber-physical system. It automatically generates attack trees based on the system architecture. The generated attack trees are processed to provide both technical and non-technical feedback. The asses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 17 publications
1
7
0
Order By: Relevance
“…Automatically synthesizing defenses is a wellresearched idea. Depamelaere et al [20] present an approach that takes SysML models as inputs and generates ADTrees that are evaluated using a tree evaluation algorithm. Vigo et al [21] use SMT solvers on process algebraic specifications to automatically generate attack trees.…”
Section: Related Workmentioning
confidence: 99%
“…Automatically synthesizing defenses is a wellresearched idea. Depamelaere et al [20] present an approach that takes SysML models as inputs and generates ADTrees that are evaluated using a tree evaluation algorithm. Vigo et al [21] use SMT solvers on process algebraic specifications to automatically generate attack trees.…”
Section: Related Workmentioning
confidence: 99%
“…FTA focuses mostly on safety and reliability, and is used in a wide variety of industries such as aerospace, power plants, nuclear plants, and other high-hazard engineering fields [17,22,64]. Attack trees also constitute a major security research area [24,26,66,75]. Structurally speaking, attack trees are similar to fault trees where nodes representing attack steps are logically combined to achieve the attacker's goal (root of the attack tree).…”
Section: Related Workmentioning
confidence: 99%
“…Reference 24 proposed a method to transform a graphical system model into the form of an ATree. References 25 and 26 proposed a method of automatically generating ATrees based on the given system architecture and provided a method to feed the evaluation results back to the system architecture. Reference 27 proposed a method for security model analysis and ADTree generation.…”
Section: Related Workmentioning
confidence: 99%
“…The SysML modeling approach in this paper is based on the free and open source tool TTool, 35 and the structure of the CPS is modeled by creating block diagrams. After the modeling of the CPS is completed, the FAST‐CPS framework 25 is used to convert the model into an inductive definition programming (IDP) framework. The framework not only allows users to use SysML to model a system but also automatically links the known vulnerabilities extracted from the vulnerability database on the Internet to the elements in the system project.…”
Section: Automatic Generation Of An Adtree Based On Sysmlmentioning
confidence: 99%