Data-Driven Vulnerability Exploration for Design Phase System Analysis. Bakirtzis, G., Simon, B. J., Collins, A. G., Fleming, C. H., & Elks, C. R. IEEE Systems Journal, 2019. doi abstract bibtex Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others, there are two significant challenges in this area: the need for models that can characterize a realistic system in the absence of an implementation and an automated way to associate attack vector information, that is, historical data, to such system models. We propose the cybersecurity body of knowledge (CYBOK), which takes in sufficiently characteristic models of systems and acts as a search engine for potential attack vectors. CYBOK is fundamentally an algorithmic approach to vulnerability exploration, which is a significant extension to the body of knowledge it builds upon. By using CYBOK, security analysts and system designers can work together to assess the overall security posture of systems early in their lifecycle, during major design decisions and before final product designs, consequently, assisting in applying security earlier and throughout the systems lifecycle.
@article{bakirtzis_data-driven_2019,
title = {Data-{Driven} {Vulnerability} {Exploration} for {Design} {Phase} {System} {Analysis}},
issn = {1937-9234},
doi = {10.1109/JSYST.2019.2940145},
abstract = {Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others, there are two significant challenges in this area: the need for models that can characterize a realistic system in the absence of an implementation and an automated way to associate attack vector information, that is, historical data, to such system models. We propose the cybersecurity body of knowledge (CYBOK), which takes in sufficiently characteristic models of systems and acts as a search engine for potential attack vectors. CYBOK is fundamentally an algorithmic approach to vulnerability exploration, which is a significant extension to the body of knowledge it builds upon. By using CYBOK, security analysts and system designers can work together to assess the overall security posture of systems early in their lifecycle, during major design decisions and before final product designs, consequently, assisting in applying security earlier and throughout the systems lifecycle.},
journal = {IEEE Systems Journal},
author = {Bakirtzis, Georgios and Simon, Brandon J. and Collins, Aidan G. and Fleming, Cody Harrison and Elks, Carl R.},
year = {2019},
keywords = {Analytical models, Computer security, Cyber-physical systems, Data models, Hardware, Safety, Software, model-based engineer-ing, safety, security},
pages = {1--10},
}
Downloads: 0
{"_id":"ifLHoqR6rZ7BhZYQh","bibbaseid":"bakirtzis-simon-collins-fleming-elks-datadrivenvulnerabilityexplorationfordesignphasesystemanalysis-2019","authorIDs":["gnpJ2XahbLkbuhcqz"],"author_short":["Bakirtzis, G.","Simon, B. J.","Collins, A. G.","Fleming, C. H.","Elks, C. R."],"bibdata":{"bibtype":"article","type":"article","title":"Data-Driven Vulnerability Exploration for Design Phase System Analysis","issn":"1937-9234","doi":"10.1109/JSYST.2019.2940145","abstract":"Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others, there are two significant challenges in this area: the need for models that can characterize a realistic system in the absence of an implementation and an automated way to associate attack vector information, that is, historical data, to such system models. We propose the cybersecurity body of knowledge (CYBOK), which takes in sufficiently characteristic models of systems and acts as a search engine for potential attack vectors. CYBOK is fundamentally an algorithmic approach to vulnerability exploration, which is a significant extension to the body of knowledge it builds upon. By using CYBOK, security analysts and system designers can work together to assess the overall security posture of systems early in their lifecycle, during major design decisions and before final product designs, consequently, assisting in applying security earlier and throughout the systems lifecycle.","journal":"IEEE Systems Journal","author":[{"propositions":[],"lastnames":["Bakirtzis"],"firstnames":["Georgios"],"suffixes":[]},{"propositions":[],"lastnames":["Simon"],"firstnames":["Brandon","J."],"suffixes":[]},{"propositions":[],"lastnames":["Collins"],"firstnames":["Aidan","G."],"suffixes":[]},{"propositions":[],"lastnames":["Fleming"],"firstnames":["Cody","Harrison"],"suffixes":[]},{"propositions":[],"lastnames":["Elks"],"firstnames":["Carl","R."],"suffixes":[]}],"year":"2019","keywords":"Analytical models, Computer security, Cyber-physical systems, Data models, Hardware, Safety, Software, model-based engineer-ing, safety, security","pages":"1–10","bibtex":"@article{bakirtzis_data-driven_2019,\n\ttitle = {Data-{Driven} {Vulnerability} {Exploration} for {Design} {Phase} {System} {Analysis}},\n\tissn = {1937-9234},\n\tdoi = {10.1109/JSYST.2019.2940145},\n\tabstract = {Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others, there are two significant challenges in this area: the need for models that can characterize a realistic system in the absence of an implementation and an automated way to associate attack vector information, that is, historical data, to such system models. We propose the cybersecurity body of knowledge (CYBOK), which takes in sufficiently characteristic models of systems and acts as a search engine for potential attack vectors. CYBOK is fundamentally an algorithmic approach to vulnerability exploration, which is a significant extension to the body of knowledge it builds upon. By using CYBOK, security analysts and system designers can work together to assess the overall security posture of systems early in their lifecycle, during major design decisions and before final product designs, consequently, assisting in applying security earlier and throughout the systems lifecycle.},\n\tjournal = {IEEE Systems Journal},\n\tauthor = {Bakirtzis, Georgios and Simon, Brandon J. and Collins, Aidan G. and Fleming, Cody Harrison and Elks, Carl R.},\n\tyear = {2019},\n\tkeywords = {Analytical models, Computer security, Cyber-physical systems, Data models, Hardware, Safety, Software, model-based engineer-ing, safety, security},\n\tpages = {1--10},\n}\n\n","author_short":["Bakirtzis, G.","Simon, B. J.","Collins, A. G.","Fleming, C. H.","Elks, C. R."],"key":"bakirtzis_data-driven_2019","id":"bakirtzis_data-driven_2019","bibbaseid":"bakirtzis-simon-collins-fleming-elks-datadrivenvulnerabilityexplorationfordesignphasesystemanalysis-2019","role":"author","urls":{},"keyword":["Analytical models","Computer security","Cyber-physical systems","Data models","Hardware","Safety","Software","model-based engineer-ing","safety","security"],"metadata":{"authorlinks":{"elks, c":"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fgroups%2F2575028%2Fitems%3Fkey%3DWRT0i5KCH5DutUN8UOzXF5dC%26format%3Dbibtex%26limit%3D100"}},"downloads":0},"bibtype":"article","biburl":"https://api.zotero.org/groups/2575028/items?key=WRT0i5KCH5DutUN8UOzXF5dC&format=bibtex&limit=100","creationDate":"2020-10-01T15:11:08.303Z","downloads":0,"keywords":["analytical models","computer security","cyber-physical systems","data models","hardware","safety","software","model-based engineer-ing","safety","security"],"search_terms":["data","driven","vulnerability","exploration","design","phase","system","analysis","bakirtzis","simon","collins","fleming","elks"],"title":"Data-Driven Vulnerability Exploration for Design Phase System Analysis","year":2019,"dataSources":["3szDtHe5XuBcrBHR4","2PHxSBEXp3AWgXrFz"]}