2018 IEEE Symposium on Visualization for Cyber Security (VizSec) 2018
DOI: 10.1109/vizsec.2018.8709187
|View full text |Cite
|
Sign up to set email alerts
|

Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

Abstract: Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking tools that employ effective dashboards-to manage potential attack vectors, system components, and requirements. Th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

4
5

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Tools and visualization methods using natural language processing can be used to aid this process. 18,19 As the system is refined, implementation choices with associated details emerge. It is at this phase in the lifecycle development where potential exploits or attack surfaces for the system architecture are captured.…”
Section: Threat Modelingmentioning
confidence: 99%
“…Tools and visualization methods using natural language processing can be used to aid this process. 18,19 As the system is refined, implementation choices with associated details emerge. It is at this phase in the lifecycle development where potential exploits or attack surfaces for the system architecture are captured.…”
Section: Threat Modelingmentioning
confidence: 99%
“…For example, changing the definition of a single element to one that has no recorded attacks might significantly increase the security posture of the overall CPS. 1 Moreover, a full GUI is developed based on this methodology to implement further interactivity functions on top of CYBOK [23]. This is a natural progression of CYBOK since in-depth analysis requires the analyst to interact with the data through interactivity functions, for example, filtering, to facilitate effective exploration of the diverse types of data input and output to and by CYBOK [24].…”
Section: F Visualizationsmentioning
confidence: 99%
“…Running the prototype tools shows that the total number of attack vectors returned by the search process is large (Table 1). Filtering functionality is implemented to manage these attack vectors [7]. But the general lessons stemming from the large result space is that it is highly sensitive to the fidelity of the model.…”
Section: Demonstration: Particle Separation Centrifugementioning
confidence: 99%
“…Although the theory and visualization techniques for transitioning to model-based cybersecurity analysis are advancing [2][3][4][5][6][7], there are still several challenges. The first is moving to mature software implementation of security modeling tools that can be run within already existing systems modeling tools.…”
Section: Introductionmentioning
confidence: 99%