Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures

Research output: Contribution to conferencePaperpeer-review

101 Downloads (Pure)


Complex embedded systems often contain hard to find vulnerabilities which, when exploited, have potential to cause severe damage to the operating environment and the user. Given that threats and vulnerabilities can exist within any layer of the complex eco-system, OEMs face a major challenge to ensure security throughout the device life-cycle To lower the potential risk and damage that vulnerabilities may cause, OEMs typically perform application threat analysis and security modelling. This process typically provides a high level guideline to solving security problems which can then be implemented during design and development. However, this concept presents issues where new threats or unknown vulnerability has been discovered.
To address this issue, we propose a policy-based security modelling approach, which utilises a configurable policy engine to apply new policies that counter serious threats. By utilising this approach, the traditional security modelling approaches can be enhanced and the consequences of a new threat greatly reduced.
We present a realistic use case of connected car, applying several attack scenarios. By utilising STRIDE threat modelling and DREAD risk assessment model, adequate policies are derived to protect the car assets. This approach poses advantages over the standard approach, allowing a policy update to counter a new threat, which may have otherwise required a product redesign to alleviate the issue under the traditional approach.
Original languageEnglish
Publication statusAccepted - 16 Jul 2018
Event31st International IEEE System-on-Chip Conference - Washington, United States
Duration: 04 Sep 201807 Sep 2018
Conference number: 31


Conference31st International IEEE System-on-Chip Conference
Abbreviated titleIEEE SoCC
Country/TerritoryUnited States
Internet address


  • Secure by design
  • Security Modelling
  • Policy
  • Embedded Security
  • Threat Modelling


Dive into the research topics of 'Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures'. Together they form a unique fingerprint.

Cite this