Activities per year
Abstract
Complex embedded systems often contain hard to find vulnerabilities which, when exploited, have potential to cause severe damage to the operating environment and the user. Given that threats and vulnerabilities can exist within any layer of the complex eco-system, OEMs face a major challenge to ensure security throughout the device life-cycle To lower the potential risk and damage that vulnerabilities may cause, OEMs typically perform application threat analysis and security modelling. This process typically provides a high level guideline to solving security problems which can then be implemented during design and development. However, this concept presents issues where new threats or unknown vulnerability has been discovered.
To address this issue, we propose a policy-based security modelling approach, which utilises a configurable policy engine to apply new policies that counter serious threats. By utilising this approach, the traditional security modelling approaches can be enhanced and the consequences of a new threat greatly reduced.
We present a realistic use case of connected car, applying several attack scenarios. By utilising STRIDE threat modelling and DREAD risk assessment model, adequate policies are derived to protect the car assets. This approach poses advantages over the standard approach, allowing a policy update to counter a new threat, which may have otherwise required a product redesign to alleviate the issue under the traditional approach.
To address this issue, we propose a policy-based security modelling approach, which utilises a configurable policy engine to apply new policies that counter serious threats. By utilising this approach, the traditional security modelling approaches can be enhanced and the consequences of a new threat greatly reduced.
We present a realistic use case of connected car, applying several attack scenarios. By utilising STRIDE threat modelling and DREAD risk assessment model, adequate policies are derived to protect the car assets. This approach poses advantages over the standard approach, allowing a policy update to counter a new threat, which may have otherwise required a product redesign to alleviate the issue under the traditional approach.
Original language | English |
---|---|
Title of host publication | 2018 31st IEEE International System-on-Chip Conference (SOCC): Proceedings |
Publisher | IEEE |
Pages | 84-89 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-5386-1491-4 |
DOIs | |
Publication status | Published - 21 Jan 2019 |
Event | 31st International IEEE System-on-Chip Conference - Washington, United States Duration: 04 Sep 2018 → 07 Sep 2018 Conference number: 31 https://www.ieee-socc.org/ |
Publication series
Name | IEEE International System-on-Chip Conference (SOCC): Proceedings |
---|---|
ISSN (Electronic) | 2164-1706 |
Conference
Conference | 31st International IEEE System-on-Chip Conference |
---|---|
Abbreviated title | IEEE SoCC |
Country/Territory | United States |
City | Washington |
Period | 04/09/2018 → 07/09/2018 |
Internet address |
Keywords
- Security Modelling
- Policy-based Security
- Embedded Security
- Threat Modelling
- Autonomous Car
- Cyberphysical systems
- System-on-chip
ASJC Scopus subject areas
- Computer Science(all)
- Engineering(all)
- Architecture
- Hardware and Architecture
- Safety, Risk, Reliability and Quality
Fingerprint
Dive into the research topics of 'Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures'. Together they form a unique fingerprint.Activities
- 1 Participation in conference
-
31st International IEEE System-on-Chip Conference
Fahad Manzoor Siddiqui (Participant)
04 Sep 2018 → 30 Sep 2018Activity: Participating in or organising an event types › Participation in conference