Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems
I. Gräßler, E. Bodden, J. Pottebaum, J. Geismann, D. Roesmann, in: Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, Springer International Publishing, 2020, pp. 1458–1469.
Download
No fulltext has been uploaded.
Conference Paper
| English
Author
Department
Abstract
Faults in the realization and usage of cyber-physical systems can cause significant security issues. Attackers might exploit vulnerabilities in the physical configurations, control systems, or accessibility through internet connections. For CPS, two challenges are combined: Firstly, discipline-specific security measures should be applied. Secondly, new measures have to be created to cover interdisciplinary impacts. For instance, faulty software configurations in cyber-physical production systems (CPPS) might allow attackers to manipulate the correct control of production processes impacting the quality of end products. From liability and publicity perspective, a worst-case scenario is that such a corrupted product is delivered to a customer. In this context, security-oriented fault-tolerance in Systems Engineering (SE) requires measures to evaluate interdisciplinary system designs with regard to potential scenarios of attacks. The paper at hand contributes a conceptual threat modelling approach to cover potential attack scenarios. The approach can be used to derive both system-level and discipline-specific security solutions. As an application case, issues are focused on which attackers intend to exploit vulnerabilities in a CPPS. The goal is to support systems engineers in verification and validation tasks regarding security-oriented fault-tolerance.
Publishing Year
Proceedings Title
Advanced, Contemporary Control, Advances in Intelligent Systems and Computing
Volume
1196
Page
1458-1469
LibreCat-ID
Cite this
Gräßler I, Bodden E, Pottebaum J, Geismann J, Roesmann D. Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems. In: Advanced, Contemporary Control, Advances in Intelligent Systems and Computing. Vol 1196. Springer International Publishing; 2020:1458-1469.
Gräßler, I., Bodden, E., Pottebaum, J., Geismann, J., & Roesmann, D. (2020). Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems. Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, 1196, 1458–1469.
@inproceedings{Gräßler_Bodden_Pottebaum_Geismann_Roesmann_2020, title={Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems}, volume={1196}, booktitle={Advanced, Contemporary Control, Advances in Intelligent Systems and Computing}, publisher={Springer International Publishing}, author={Gräßler, Iris and Bodden, Eric and Pottebaum, Jens and Geismann, Johannes and Roesmann, Daniel}, year={2020}, pages={1458–1469} }
Gräßler, Iris, Eric Bodden, Jens Pottebaum, Johannes Geismann, and Daniel Roesmann. “Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems.” In Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, 1196:1458–69. Springer International Publishing, 2020.
I. Gräßler, E. Bodden, J. Pottebaum, J. Geismann, and D. Roesmann, “Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems,” in Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, 2020, vol. 1196, pp. 1458–1469.
Gräßler, Iris, et al. “Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems.” Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, vol. 1196, Springer International Publishing, 2020, pp. 1458–69.
Link(s) to Main File(s)
Access Level
Closed Access