{"citation":{"chicago":"Gräßler, Iris, Eric Bodden, Jens Pottebaum, Johannes Geismann, and Daniel Roesmann. “Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems.” In Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, 1196:1458–69. Springer International Publishing, 2020.","bibtex":"@inproceedings{Gräßler_Bodden_Pottebaum_Geismann_Roesmann_2020, title={Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems}, volume={1196}, booktitle={Advanced, Contemporary Control, Advances in Intelligent Systems and Computing}, publisher={Springer International Publishing}, author={Gräßler, Iris and Bodden, Eric and Pottebaum, Jens and Geismann, Johannes and Roesmann, Daniel}, year={2020}, pages={1458–1469} }","ieee":"I. Gräßler, E. Bodden, J. Pottebaum, J. Geismann, and D. Roesmann, “Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems,” in Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, 2020, vol. 1196, pp. 1458–1469.","mla":"Gräßler, Iris, et al. “Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems.” Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, vol. 1196, Springer International Publishing, 2020, pp. 1458–69.","short":"I. Gräßler, E. Bodden, J. Pottebaum, J. Geismann, D. Roesmann, in: Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, Springer International Publishing, 2020, pp. 1458–1469.","ama":"Gräßler I, Bodden E, Pottebaum J, Geismann J, Roesmann D. Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems. In: Advanced, Contemporary Control, Advances in Intelligent Systems and Computing. Vol 1196. Springer International Publishing; 2020:1458-1469.","apa":"Gräßler, I., Bodden, E., Pottebaum, J., Geismann, J., & Roesmann, D. (2020). Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems. Advanced, Contemporary Control, Advances in Intelligent Systems and Computing, 1196, 1458–1469."},"year":"2020","user_id":"405","type":"conference","page":"1458-1469","volume":1196,"main_file_link":[{"url":"https://link.springer.com/chapter/10.1007/978-3-030-50936-1_121"}],"publisher":"Springer International Publishing","_id":"23521","title":"Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems","abstract":[{"lang":"eng","text":"Faults in the realization and usage of cyber-physical systems can cause significant security issues. Attackers might exploit vulnerabilities in the physical configurations, control systems, or accessibility through internet connections. For CPS, two challenges are combined: Firstly, discipline-specific security measures should be applied. Secondly, new measures have to be created to cover interdisciplinary impacts. For instance, faulty software configurations in cyber-physical production systems (CPPS) might allow attackers to manipulate the correct control of production processes impacting the quality of end products. From liability and publicity perspective, a worst-case scenario is that such a corrupted product is delivered to a customer. In this context, security-oriented fault-tolerance in Systems Engineering (SE) requires measures to evaluate interdisciplinary system designs with regard to potential scenarios of attacks. The paper at hand contributes a conceptual threat modelling approach to cover potential attack scenarios. The approach can be used to derive both system-level and discipline-specific security solutions. As an application case, issues are focused on which attackers intend to exploit vulnerabilities in a CPPS. The goal is to support systems engineers in verification and validation tasks regarding security-oriented fault-tolerance."}],"language":[{"iso":"eng"}],"date_created":"2021-08-25T12:33:43Z","department":[{"_id":"152"}],"author":[{"full_name":"Gräßler, Iris","orcid":"0000-0001-5765-971X","id":"47565","first_name":"Iris","last_name":"Gräßler"},{"id":"59256","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric","last_name":"Bodden"},{"id":"405","orcid":"http://orcid.org/0000-0001-8778-2989","full_name":"Pottebaum, Jens","last_name":"Pottebaum","first_name":"Jens"},{"first_name":"Johannes","last_name":"Geismann","orcid":"https://orcid.org/0000-0003-2015-2047","id":"20063","full_name":"Geismann, Johannes"},{"last_name":"Roesmann","first_name":"Daniel","id":"54680","full_name":"Roesmann, Daniel"}],"date_updated":"2023-11-16T09:22:50Z","intvolume":" 1196","status":"public","publication":"Advanced, Contemporary Control, Advances in Intelligent Systems and Computing","quality_controlled":"1"}