Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Published

    View graph of relations

    Within complex IoT ecosystems and network structures, hard to find vulnerabilities have potential to cause significant disruption and damage. In addition, device tampering and re-purposing can threaten business models of service providers. The vulnerability surface area of the ecosystem ranges across the entire system architecture, from the cloud to the IoT device. These can be introduced at any stage of the device life-cycle, including design, programming, manufacturing, integration, operation and maintenance of the device. While threat modelling during the design phase can alleviate some potential vulnerabilities, it is more difficult or even impossible to mitigate problems for devices already in the market. A policy-based device security model is proposed as an approach, that can be enforced using hardware and software security architectures.
    This paper reflects on existing literature on threat modelling and how derived security models can influence the design phase. This contribution proposes that by using the threat modelling to define specific use case security policies within the security model, OEMs will be able to tailor their solution to conform to the user’s security requirements. Platform vendors, on the other hand, will have reduced design costs as they can offer generic solutions for differing levels of criticality.
    An example scenario is provided using an industrial PLC as the attack target. While threat modelling can establish countermeasures for both the design process and policy defining, the policy can be introduced quickly, whereas the design method approach requires extensive modification to the system firmware.
    Original languageEnglish
    Title of host publicationIEEE International Conference on Secure and Dependable Systems: Proceedings
    Place of PublicationKaohsiung, Taiwan
    Publisher IEEE
    Number of pages8
    ISBN (Electronic)9781538657904
    ISBN (Print)9781538657904
    DOIs
    Publication statusPublished - 24 Jan 2019
    EventIEEE International Conference on Dependable and Secure Systems - Kaohsiung, Taiwan, Province of China
    Duration: 10 Dec 201813 Dec 2018
    https://dsc2018.nsysu.edu.tw/

    Conference

    ConferenceIEEE International Conference on Dependable and Secure Systems
    Abbreviated titleDSC
    CountryTaiwan, Province of China
    CityKaohsiung
    Period10/12/201813/12/2018
    Internet address

      Research areas

    • access control, attack trees, SDLC, Secure by design, Security Modelling, Security policy, SELinux, STRIDE, Threat Modelling, Trusted Computing

    Research outputs

    ID: 160007232