2021 International Conference on Software Engineering &Amp; Computer Systems and 4th International Conference on Computational 2021
DOI: 10.1109/icsecs52883.2021.00118
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automated Threat Modeling of Cyber-Physical Systems

Abstract: Cyber-Physical System (CPS) seamlessly integrates the computation, communication, and physical components of the system. Often, a CPS controls physical objects through computation and communication and uses of real-time feedback. Threat models of such systems must consider their hardware, network, infrastructure, software, and human aspects and the interactions of these aspects. Commonly, threat modeling of such systems is based on the given system's architecture. In terms of components and interactions among … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…These systems include distributed units with some degree of autonomous functions. However, it is difficult to cover all aspects of such use cases by using a single method Jamil et al (2021a). Thus, the methods are evaluated for the selection in our study, based on the metrics derived from the work in Shevchenko et al (2018).…”
Section: Discussionmentioning
confidence: 99%
“…These systems include distributed units with some degree of autonomous functions. However, it is difficult to cover all aspects of such use cases by using a single method Jamil et al (2021a). Thus, the methods are evaluated for the selection in our study, based on the metrics derived from the work in Shevchenko et al (2018).…”
Section: Discussionmentioning
confidence: 99%
“…We considered five potentially relevant threat modeling methods for a CCAV ecosystem [ 19 ]. It is difficult to address all the challenges of such a use case with a single solution [ 20 ]. Therefore, a selection of metrics developed from the work in [ 21 ] were used to assess the methods in this research: (i) Maturity: Is the technique well-defined and has it been employed in earlier research?…”
Section: Threat Analysis and Risk Assessment Methodsmentioning
confidence: 99%
“…The UAV has a complex architecture and most of the information regarding measures in place is confidential, so it is difficult to identify which threat is more dangerous to a UAV that needs to be modelled at utmost priority [106]. Moreover, there has been wide research for modelling the security and privacy of vehicleto-vehicle (V2V) [117], Vehicle-to-infrastructure (V2I) [118] and Vehicle-to-everything (V2X) [119]. But threat modelling techniques (such as STRIDE, LINDDUN) are not sufficient for securing V2V, V2I and V2X because they require the autonomy approach [120] to deal with privacy and security vulnerabilities.…”
Section: Challenges and Difficulties In Conducting Threat Modelling F...mentioning
confidence: 99%