2020
DOI: 10.4271/11-03-02-0005
|View full text |Cite
|
Sign up to set email alerts
|

Threat Identification and Defense Control Selection for Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Within VERDICT, the analysis of the AADL model receives information primarily from the Security Threat Evaluation and Mitigation (STEM) component [10]. STEM identifies possible CAPEC attacks, possible NIST-800-53 defenses and defenses currently implemented in the components of the system.…”
Section: Defense Modelsmentioning
confidence: 99%
“…Within VERDICT, the analysis of the AADL model receives information primarily from the Security Threat Evaluation and Mitigation (STEM) component [10]. STEM identifies possible CAPEC attacks, possible NIST-800-53 defenses and defenses currently implemented in the components of the system.…”
Section: Defense Modelsmentioning
confidence: 99%
“…Controls and enhancements are continually updated-there are 863 controls and enhancements as of revision four. Detailed mapping between the CAPECs, NIST controls and the architectural level component properties can be found in [36].…”
Section: Security Threat Evaluation and Mitigation (Stem)mentioning
confidence: 99%
“…Mitigations are linked to CAPECs so that controls are only suggested if they are useful in mitigating attacks that have a defined effect on the system under consideration. The mapping between CAPECs, VERDICT cyber defense properties and NIST-800-53 controls is shown in Table A1 in Appendix A adapted from [36]. CAPECs that are mitigated by the same defense have been grouped together.…”
Section: Security Threat Evaluation and Mitigation (Stem)mentioning
confidence: 99%
“…VERDICT identifies possible threats and suggested mitigations (Moitra, et al, 2020). Threats are in terms of Mitre's CAPEC (Mitre, 2020); mitigations are in the form of defense profiles constructed from NIST's Security and Privacy Controls.…”
Section: Example Aadl Model: Delivery Dronementioning
confidence: 99%