Security Assessment of Systems of Systems
2019 IEEE/ACM 7th International Workshop on Software Engineering for Systems-of-Systems (SESoS) and 13th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (WDES)
https://doi.org/10.1109/SESOS/WDES.2019.00017Abstract
Engineering Systems of Systems is one of the new challenges of the last few years. This depends on the increasing number of systems that must interact one with another to achieve a goal. One peculiarity of Systems of Systems is that they are made of systems able to live on their own with well-established functionalities and re quirements, and that are not necessarily aware of the joint mission or prepared to collaborate. In this emergent sce nario, security is one crucial aspect that must be consid ered from the very beginning. In fact, the security of a Sys tem of Systems is not automatically granted even if the se curity of each constituent system is guaranteed. The aim of this paper is to address the problem of assessing security properties in Systems of Systems. We discuss the specific security aspects of such emergent systems, and propose the TeSSoS approach, which includes modelling and test ing security properties in Systems of Systems and intro duces the Red and Blue Requirements Specification con cepts.
References (19)
- C. B. Nielsen, P. G. Larsen, J Fitzgerald, J Woodcock, and J Peleska. "Systems of systems engineering: basic concepts, model-based techniques, and research directions'' ACM CSUR, 48(2), 18, 2015.
- J D. Richardson and T J Wheeler, "An object oriented methodology integrating design, analysis, modelling, and simulation of systems of systems," 4th Armual Conference on AI, Simulation and Planning in High Autonomy Systems, Tucson, AZ, USA, 1993, pp. 238-244.
- D. J. Bodeau, "System-of-systems security engineering". In Proc. lOth ACSAC, 1994. (pp. 228-235). IEEE
- E Silva, E Cavalcante, T Batista, F Oquendo, F C. Delicato, P.F. Pires, "On the characterization of missions of systems-of-systems". In: Proceedings of the 2014 ECSA Workshops. ACM, 2014. p. 26.
- E. Silva, T. Batista, and F. Oquendo, "A mission-oriented approach for designing system-of-systems," in 2015 lOth SoSE Conference, 2015, pp. 346-351.
- V. Chiprianov, K. Falkner, L. Gallon, and M. Munier. ''Towards modelling and analysing non-functional properties of systems of systems". In 9th Int. Conference on SOSE, 2014 (pp. 289-294).
- D. Ki-Aries, S. Faily, H. Dogan, and C. Williams. "Assessing system of systems security risk and requirements with OASoSIS" In Proc. IEEE 5th International Workshop on ESPRE (pp. 14-20). IEEE. 2018
- M. Felderer, M. Buchler, M. Johns, A D. Brucker, R Breu, and A Pretschner, "Security testing: A survey," Adv. Comput., val. 101, no. March, pp. 1-51,2016.
- W. G. J. Halfond, S. R. Choudhary, and A Orso, "Penetration testing with improved input vector identification," Proc. -2nd lnt. Conf. Softw. Testing, Verif Validation, !CST 2009, pp. 346-355,2009.
- J S Dahmann and K. J. Baldwin, "Understanding the current state of US defense systems of systems and the implications for systems engineering," SysCon 2008, pp. 99-105, 2008.
- A vanLamsweerde, "Goal-oriented requirements engineering: a guided tour," Proc. Fifth IEEE lnt. Symp. Requir. Eng., pp. 249-262, 2001.
- S. Tueno, R. Laleau, A. Mammar, & M. Frappier, "The SysMUKAOS domain modeling approach". arXiv preprint arXiv:1710.00903, 2017.
- C. Guariniello and D. DeLaurentis, "Communications, information, and cyber security in systems-of-systems: Assessing the impact of attacks through interdependency analysis," Procedia Comput. Sci., vol. 28, no. Cser, pp. 720--727, 2014.
- J H. Allen, S. Barnum. R J Ellison, G. McGraw, and N. R Mead, "Requirements engineering for secure software" Addison-Wesley Professional, 2008.
- D. Meyer, J. Haase, M. Eckert, and B. Klauer, "A threat-model for building and home au tomation," Proc. IECON 2017-43rd Annu. Conf IEEE lnd. Electron. Soc., val. 2017-Janua, pp. 8126-8131, 2017.
- B. Solhaug and K. Stelen, "The CORAS Language-Why it is designed the way it is," Safety, Reliab. Risk Life-Cycle Perform. Struct. Infrastructures, pp. 3155-3162, 2013.
- K. Graves, CEH: official certified ethical hacker review guide. 2007.
- B. Beizer, "Black-box testing: techniques for functional testing of software and systems." 1995.
- M. Cohn, "User stories applied: For agile software development " Addison-Wesley Profession, 2004.