Fundamental Challenges of Cyber-Physical Systems Security Modeling. Bakirtzis, G., Ward, G., Deloglos, C., Elks, C., Horowitz, B., & Fleming, C. In 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), pages 33–36, June, 2020. doi abstract bibtex 4 downloads Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can intentionally trigger accidents. By implementing security assessment tools for modeling languages we are better able to address threats earlier in the system's lifecycle and, therefore, assure their safe and secure behavior in their eventual deployment. We posit that cyber-physical systems security modeling is practiced insufficiently because it is still addressed similarly to information technology systems.
@inproceedings{bakirtzis_fundamental_2020,
title = {Fundamental {Challenges} of {Cyber}-{Physical} {Systems} {Security} {Modeling}},
doi = {10.1109/DSN-S50200.2020.00021},
abstract = {Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can intentionally trigger accidents. By implementing security assessment tools for modeling languages we are better able to address threats earlier in the system's lifecycle and, therefore, assure their safe and secure behavior in their eventual deployment. We posit that cyber-physical systems security modeling is practiced insufficiently because it is still addressed similarly to information technology systems.},
booktitle = {2020 50th {Annual} {IEEE}-{IFIP} {International} {Conference} on {Dependable} {Systems} and {Networks}-{Supplemental} {Volume} ({DSN}-{S})},
author = {Bakirtzis, Georgios and Ward, Garrett and Deloglos, Christopher and Elks, Carl and Horowitz, Barry and Fleming, Cody},
month = jun,
year = {2020},
keywords = {Analytical models, Data models, Safety, Security, Temperature sensors, Tools, cyber-physical system security modeling, information technology systems, modeling languages, n/a, safe behavior, safety critical cyber-physical systems, safety-critical software, secure behavior, security analysis tools, security assessment tools, security violations, systems modeling practice},
pages = {33--36},
}
Downloads: 4
{"_id":"h53mYM9vtCaQmAmou","bibbaseid":"bakirtzis-ward-deloglos-elks-horowitz-fleming-fundamentalchallengesofcyberphysicalsystemssecuritymodeling-2020","authorIDs":["gnpJ2XahbLkbuhcqz"],"author_short":["Bakirtzis, G.","Ward, G.","Deloglos, C.","Elks, C.","Horowitz, B.","Fleming, C."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Fundamental Challenges of Cyber-Physical Systems Security Modeling","doi":"10.1109/DSN-S50200.2020.00021","abstract":"Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can intentionally trigger accidents. By implementing security assessment tools for modeling languages we are better able to address threats earlier in the system's lifecycle and, therefore, assure their safe and secure behavior in their eventual deployment. We posit that cyber-physical systems security modeling is practiced insufficiently because it is still addressed similarly to information technology systems.","booktitle":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","author":[{"propositions":[],"lastnames":["Bakirtzis"],"firstnames":["Georgios"],"suffixes":[]},{"propositions":[],"lastnames":["Ward"],"firstnames":["Garrett"],"suffixes":[]},{"propositions":[],"lastnames":["Deloglos"],"firstnames":["Christopher"],"suffixes":[]},{"propositions":[],"lastnames":["Elks"],"firstnames":["Carl"],"suffixes":[]},{"propositions":[],"lastnames":["Horowitz"],"firstnames":["Barry"],"suffixes":[]},{"propositions":[],"lastnames":["Fleming"],"firstnames":["Cody"],"suffixes":[]}],"month":"June","year":"2020","keywords":"Analytical models, Data models, Safety, Security, Temperature sensors, Tools, cyber-physical system security modeling, information technology systems, modeling languages, n/a, safe behavior, safety critical cyber-physical systems, safety-critical software, secure behavior, security analysis tools, security assessment tools, security violations, systems modeling practice","pages":"33–36","bibtex":"@inproceedings{bakirtzis_fundamental_2020,\n\ttitle = {Fundamental {Challenges} of {Cyber}-{Physical} {Systems} {Security} {Modeling}},\n\tdoi = {10.1109/DSN-S50200.2020.00021},\n\tabstract = {Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can intentionally trigger accidents. By implementing security assessment tools for modeling languages we are better able to address threats earlier in the system's lifecycle and, therefore, assure their safe and secure behavior in their eventual deployment. We posit that cyber-physical systems security modeling is practiced insufficiently because it is still addressed similarly to information technology systems.},\n\tbooktitle = {2020 50th {Annual} {IEEE}-{IFIP} {International} {Conference} on {Dependable} {Systems} and {Networks}-{Supplemental} {Volume} ({DSN}-{S})},\n\tauthor = {Bakirtzis, Georgios and Ward, Garrett and Deloglos, Christopher and Elks, Carl and Horowitz, Barry and Fleming, Cody},\n\tmonth = jun,\n\tyear = {2020},\n\tkeywords = {Analytical models, Data models, Safety, Security, Temperature sensors, Tools, cyber-physical system security modeling, information technology systems, modeling languages, n/a, safe behavior, safety critical cyber-physical systems, safety-critical software, secure behavior, security analysis tools, security assessment tools, security violations, systems modeling practice},\n\tpages = {33--36},\n}\n\n","author_short":["Bakirtzis, G.","Ward, G.","Deloglos, C.","Elks, C.","Horowitz, B.","Fleming, C."],"key":"bakirtzis_fundamental_2020","id":"bakirtzis_fundamental_2020","bibbaseid":"bakirtzis-ward-deloglos-elks-horowitz-fleming-fundamentalchallengesofcyberphysicalsystemssecuritymodeling-2020","role":"author","urls":{},"keyword":["Analytical models","Data models","Safety","Security","Temperature sensors","Tools","cyber-physical system security modeling","information technology systems","modeling languages","n/a","safe behavior","safety critical cyber-physical systems","safety-critical software","secure behavior","security analysis tools","security assessment tools","security violations","systems modeling practice"],"metadata":{"authorlinks":{"elks, c":"https://bibbase.org/show?bib=https%3A%2F%2Fapi.zotero.org%2Fgroups%2F2575028%2Fitems%3Fkey%3DWRT0i5KCH5DutUN8UOzXF5dC%26format%3Dbibtex%26limit%3D100"}},"downloads":4},"bibtype":"inproceedings","biburl":"https://api.zotero.org/groups/2575028/items?key=WRT0i5KCH5DutUN8UOzXF5dC&format=bibtex&limit=100","creationDate":"2020-10-01T15:11:08.304Z","downloads":4,"keywords":["analytical models","data models","safety","security","temperature sensors","tools","cyber-physical system security modeling","information technology systems","modeling languages","n/a","safe behavior","safety critical cyber-physical systems","safety-critical software","secure behavior","security analysis tools","security assessment tools","security violations","systems modeling practice"],"search_terms":["fundamental","challenges","cyber","physical","systems","security","modeling","bakirtzis","ward","deloglos","elks","horowitz","fleming"],"title":"Fundamental Challenges of Cyber-Physical Systems Security Modeling","year":2020,"dataSources":["3szDtHe5XuBcrBHR4","2PHxSBEXp3AWgXrFz"]}