Parametric Analyses of Attack-fault Trees

被引:6
|
作者
Andre, Etienne [1 ]
Lime, Didier [2 ]
Ramparison, Mathias [3 ]
Stoelinga, Marielle [4 ]
机构
[1] Univ Lorraine, CNRS, INRIA, LORIA, F-54000 Nancy, France
[2] Ecole Cent Nantes, LS2N, CNRS, UMR 6004, Nantes, France
[3] Univ Sorbonne Paris Nord, LIPN, CNRS, F-93430 Villetaneuse, France
[4] Univ Twente, Formal Methods & Tools, Enschede, Netherlands
关键词
security; attack-fault trees; parametric timed automata; IMITATOR;
D O I
10.3233/FI-2021-2066
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Risk assessment of cyber-physical systems, such as power plants, connected devices and IT-infrastructures has always been challenging: safety (i. e., absence of unintentional failures) and security (i. e., no disruptions due to attackers) are conditions that must be guaranteed. One of the traditional tools used to consider these problems is attack trees, a tree-based formalism inspired by fault trees, a well-known formalism used in safety engineering. In this paper we define and implement the translation of attack-fault trees (AFTs) to a new extension of timed automata, called parametric weighted timed automata. This allows us to parameterize constants such as time and discrete costs in an AFT and then, using the model-checker IMITATOR, to compute the set of parameter values such that a successful attack is possible. Moreover, we add the possibility to define counter-measures. Using the different sets of parameter values computed, different attack and fault scenarios can be deduced depending on the budget, time or computation power of the attacker, providing helpful data to select the most efficient counter-measure.
引用
收藏
页码:69 / 94
页数:26
相关论文
共 50 条
  • [31] A Fault Attack on ECDSA
    Schmidt, Joern-Marc
    Medwed, Marcel
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 93 - 99
  • [32] WHERE IS THE FAULT IN FAULT-TREES
    RUSSO, JE
    KOLZOW, KJ
    JOURNAL OF EXPERIMENTAL PSYCHOLOGY-HUMAN PERCEPTION AND PERFORMANCE, 1994, 20 (01) : 17 - 32
  • [33] Automated generation of attack trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    Proceedings of the Computer Security Foundations Workshop, 2014, 2014-January : 337 - 350
  • [34] Fault Trees vs. Component Fault Trees: An Empirical Study
    Gonschorek, Tim
    Zeller, Marc
    Hoefig, Kai
    Ortmeier, Frank
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 239 - 251
  • [35] The caterpillar attack on fruit trees
    Theobald, FV
    NATURE, 1917, 99 : 326 - 326
  • [36] Attack Trees with Sequential Conjunction
    Jhawar, Ravi
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Trujillo-Rasua, Rolando
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 339 - 353
  • [37] Attack-defense trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    JOURNAL OF LOGIC AND COMPUTATION, 2014, 24 (01) : 55 - 87
  • [38] Automated Generation of Attack Trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 337 - 350
  • [39] On the Meaning and Purpose of Attack Trees
    Mantel, Heiko
    Probst, Christian W.
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 184 - 199
  • [40] Simplified Timed Attack Trees
    Ali, Aliyu Tanko
    RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS 2021), 2021, 415 : 653 - 660