Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
The race for digitization created a real need to protect smart infrastructures. Environments are becoming highly connected and automated. Their growing complexity and connectivity make it hard to assure and assess their cyber resilience, i.e., protecting them from cyberattacks, failures, and errors. Traditional strategies for ensuring the cyber resilience of smart infrastructures suffer from a lack of holism. Indeed, since smart infrastructures are often structured in layers, traditional protection methods can lead to conflicting and competing goals. For instance, they may increase the resilience of specific layers at the expense of decreasing the performance of others. This chapter reviews existing methods aiming to address this problem. We focus on two leading methodological assessment families: quantitative and qualitative. The former includes numerical metrics to quantify and assist system-dependent decision-making processes. The latter builds upon symbolic modeling to offer a system-agnostic assessment. The chapter provides an in-depth exploration of quantitative and qualitative methodologies with significant potential to enhance the resilience of layered smart infrastructures. Our exploration covers classical technological aspects (e.g., cascading effects) and socio-technical factors (e.g., human-in-the-loop interaction).
The race for digitization created a real need to protect smart infrastructures. Environments are becoming highly connected and automated. Their growing complexity and connectivity make it hard to assure and assess their cyber resilience, i.e., protecting them from cyberattacks, failures, and errors. Traditional strategies for ensuring the cyber resilience of smart infrastructures suffer from a lack of holism. Indeed, since smart infrastructures are often structured in layers, traditional protection methods can lead to conflicting and competing goals. For instance, they may increase the resilience of specific layers at the expense of decreasing the performance of others. This chapter reviews existing methods aiming to address this problem. We focus on two leading methodological assessment families: quantitative and qualitative. The former includes numerical metrics to quantify and assist system-dependent decision-making processes. The latter builds upon symbolic modeling to offer a system-agnostic assessment. The chapter provides an in-depth exploration of quantitative and qualitative methodologies with significant potential to enhance the resilience of layered smart infrastructures. Our exploration covers classical technological aspects (e.g., cascading effects) and socio-technical factors (e.g., human-in-the-loop interaction).
No abstract
There is an increasing number of cyber-systems (e.g., systems for payment, transportation, voting, critical infrastructures) whose security depends intrinsically on human users. In this paper, we introduce a novel approach for the formal and automated analysis of security ceremonies. A security ceremony expands a security protocol to include human nodes alongside computer nodes, with communication links that comprise user interfaces, human-to-human communication and transfers of physical objects that carry data, and thus a ceremony’s security analysis should include, in particular, the mistakes that human users might make when participating actively in the ceremony. Our approach defines mutation rules that model possible behaviors of a human user, automatically generates mutations in the behavior of the other agents of the ceremony to match the human-induced mutations, and automatically propagates these mutations through the whole ceremony. This allows for the analysis of the original ceremony specification and its possible mutations, which may include the way in which the ceremony has actually been implemented or could be implemented. To automate our approach, we have developed the tool X-Men, which is a prototype that builds on top of Tamarin, one of the most common tools for the automatic unbounded verification of security protocols. As a proof of concept, we have applied our approach to three real-life case studies, uncovering a number of concrete vulnerabilities. Some of these vulnerabilities were so far unknown, whereas others had so far been discovered only by empirical observation of the actual ceremony execution or by directly formalizing alternative models of the ceremony by hand, but X-Men instead allowed us to find them automatically.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.