2013
DOI: 10.3384/lic.diva-98213
|View full text |Cite
|
Sign up to set email alerts
|

Designing Security-enhanced Embedded Systems: Bridging Two Islands of Expertise

Abstract: The increasing prevalence of embedded devices and a boost in sophisticated attacks against them make embedded system security an intricate and pressing issue. New approaches to support the development of security-enhanced systems need to be explored. We realise that efficient transfer of knowledge from security experts to embedded system engineers is vitally important, but hardly achievable in current practice. This thesis proposes a Security-Enhanced Embedded system Design (SEED) approach, which is a set of c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 84 publications
0
2
0
2
Order By: Relevance
“…A similar approach is followed by Vasilevskaya, who also proposes to model security enhancements into UML diagrams, but mainly uses UML activity diagrams for visualization [41]. Since the scope is embedded systems, the diagrams model the internal behavior of suchlike systems very specifically.…”
Section: A Uml Security Extensionsmentioning
confidence: 99%
“…A similar approach is followed by Vasilevskaya, who also proposes to model security enhancements into UML diagrams, but mainly uses UML activity diagrams for visualization [41]. Since the scope is embedded systems, the diagrams model the internal behavior of suchlike systems very specifically.…”
Section: A Uml Security Extensionsmentioning
confidence: 99%
“…Goal-driven security decision making treats security just as functional aspects, where design goals are defined, often taking different stakeholders' perspectives, and then refined into requirements. It has been pursued to integrate security into software requirements engineering [29][30][31][32][33] and model-based systems engineering [34,35], but not for CPSs. This is probably due to the fact that goal-based engineering is popular in software engineering (so it seemed natural to extend the same principles to software security engineering), but largely unknown in CPS or ICS engineering.…”
Section: Goal-driven Security Decision Makingmentioning
confidence: 99%
“…Mas, nem sempre isso é possível. A verificação de requisitos de segurança precisa ser feita pela sistematização de avaliações de segurança de software, com projetos especificamente elaborados para o contexto de segurança da informação (Chikh, Abulaish, Nabi, & Alghathbar, 2011;Daramola, Sindre, & Stalhane, 2012;Elahi, 2009;Massacci, Mylopoulos, Paci, Yu, & Tun, 2011;Mellado, Blanco, Sánchez, & Fernández-Medina, 2010;Mellado et al, 2007;Salini & Kanmani, 2012, 2013Souag, tornam ainda mais sujeitos a ataques, pois todas as classes de atacantes podem explorar a falha para obtenção de vantagem indevida.…”
Section: John Mcafeeunclassified
“…Definir os requisitos de segurança é um passo importante no processo de desenvolvimento. Um método para análise de requisitos com base em Security Targets Vasilevskaya (2013), com base em uma ontologia, propõe um método chamado Asset Elicitation Technique, que analisa o projeto do sistema para obter requisitos de segurança. Uma ontologia de avaliação (top-level) foi desenvolvida para capturar os resultados da avaliação de desempenho.…”
Section: Abordagens Baseadas Em Ontologiaunclassified