2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) 2019
DOI: 10.1109/seams.2019.00023
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Architecture-Based Adaptations

Abstract: As any software system, a self-adaptive system is subject to security threats. However, applying self-adaptation may introduce additional threats. So far, little research has been devoted to this important problem. In this paper, we propose an approach for vulnerability analysis of architecturebased adaptations in self-adaptive systems using threat modeling and analysis techniques. To this end, we specify components' vulnerabilities and the system architecture formally and generate an attack model that describ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(22 citation statements)
references
References 33 publications
0
22
0
Order By: Relevance
“…Tun et al [25] propose an approach to specify adaptive security under partial environment knowledge that is dynamically updated, as more information becomes available at runtime. Khakpour et al [10] provide a method to perform security risk assessment on adaptations that considers dependencies of components vulnerabilities. Compared to the current work, (i) we combine information flow control and trust-based methods to enforce security that is a novel approach not present in any of the discussed work, (ii) we target distributed open systems with multiple feedback loops, where modules can specify their policies individually, and (iii) instead of adapting the underlying system, we adapt the structure and behavior of the superimposed trust architecture, which enables us to support a broader range of systems compared to the approaches above.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Tun et al [25] propose an approach to specify adaptive security under partial environment knowledge that is dynamically updated, as more information becomes available at runtime. Khakpour et al [10] provide a method to perform security risk assessment on adaptations that considers dependencies of components vulnerabilities. Compared to the current work, (i) we combine information flow control and trust-based methods to enforce security that is a novel approach not present in any of the discussed work, (ii) we target distributed open systems with multiple feedback loops, where modules can specify their policies individually, and (iii) instead of adapting the underlying system, we adapt the structure and behavior of the superimposed trust architecture, which enables us to support a broader range of systems compared to the approaches above.…”
Section: Discussionmentioning
confidence: 99%
“…Let T m be the set of context pairs to be merged, T s be the set of contexts to be split and T i be the set of contexts to be isolated. We define the local utility function as Equation (10) where w 0 , w 1 , and w 2 are weights placed on each part of the plan based on the perceived importance of each of the merge, split and isolation actions, respectively. Weight assignment is domain specific and decided by the user.…”
Section: Utility-based Reconfiguration Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, they presented ARP spoofing and route hijacking scenarios. Khakpour et al [81] defined several rules for the exploitation and propagation of vulnerabilities. Inokuchi et al [82] proposed a methodical procedure for defining new interaction rules, and they applied the method to define four categories of behavior: privilege escalation, credential access, lateral movement, and execution.…”
Section: Extension Findingsmentioning
confidence: 99%
“…The approach of Khakpour et al [7] focuses on vulnerabilities of the system in transient states that occur especially during architecture-based adaptations. They manually add vulnerability information to the architecture description by utilizing Acme's properties of components.…”
Section: Related Workmentioning
confidence: 99%