Abstract
Emerging technologies utilised in building modern systems make them inter-operable but potentially exposed to security threats. Thus, engineers need to consider the system structure and behaviour at the design level. This paper addresses the security risk assessment of inter-operable IoT systems designed in BIP (Behaviour-Interaction-Priority). For this purpose, we model different attacks scenarios from Microsoft STRIDE threats catalogue and identify the threats entry points in the component-port-connector architecture. Using standards communication styles such as message passing, we compose architectural components to model data flow between communication entities. We use BIP statistical model checking to assess the architecture conformance regarding security properties expressed in temporal logic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
SPLC: www.adobe.com/security/splc.
- 3.
- 4.
- 5.
- 6.
References
Stride threats in BIP. https://github.com/hakimuga/Threat_Modeling_BIP
Amir, P.: The temporal logic of programs. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 46–57. IEEE Computer Society, October 1977
Baouya, A., Chehida, S., Bensalem, S., Bozga, M.: Formal modeling and verification of blockchain consensus protocol for IoT systems. In: Proceedings of the 19th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2020, 22–24 September 2020, vol. 327, pp. 330–342. IOS Press (2020)
van den Berghe, A., Yskout, K., Scandariato, R., Joosen, W.: A lingua franca for security by design. In: 2018 IEEE Cybersecurity Development (SecDev), pp. 69–76 (2018)
Chondamrongkul, N., Sun, J., Warren, I.: PAT approach to architecture behavioural verification, pp. 187–192, July 2019
Chondamrongkul, N., Sun, J., Warren, I.: Formal security analysis for software architecture design: an expressive framework to emerging architectural styles. Sci. Comput. Program. 206, 102631 (2021)
Crnkovic, I.: Component-based software engineering for embedded systems. In: ICSE 2005, pp. 712–713 (2005)
Hussain, S., Erwin, H., Dunne, P.: Threat modeling using formal methods: a new approach to develop secure web applications. In: 2011 7th International Conference on Emerging Technologies, ICET 2011, September 2011
Kent, S.: Sherman Kent and the profession of intelligence analysis, center for the study of intelligence, central intelligence agency, p. 55, November 2002. https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm
Kruchten, P.: The 4+1 view model of architecture. IEEE Softw. 12(6), 42–50 (1995)
Liu, Y., Sun, J., Dong, J.S.: PAT 3: An extensible architecture for building multi-domain model checkers. In: 22nd ISSRE 2011, pp. 190–199. IEEE (2011)
McGraw, G.: Software Security: Building Security in. Addison-Wesley Professional Computing Series. Addison-Wesley, United States (2006)
Microsoft, the STRIDE Threat Model: Microsoft corporation (2009). https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN
Nouri, A., Mediouni, B.L., Bozga, M., Combaz, J., Bensalem, S., Legay, A.: Performance evaluation of stochastic real-time systems with the SBIP framework. Int. J. Crit. Comput. Based Syst. 8, 1–33 (2018)
Ouchani, S., Jarraya, Y., Ait Mohamed, O., Debbabi, M.: Probabilistic attack scenarios to evaluate policies over communication protocols. J. Softw. 7, 1488–1495 (2012)
Ouchani, S., Mohamed, O.A., Debbabi, M.: A security risk assessment framework for SysML activity diagrams. In: IEEE 7th International Conference on Software Security and Reliability, pp. 227–236 (2013)
Rouland, Q., Hamid, B., Jaskolka, J.: Specification, detection, and treatment of stride threats for software components: modeling, formal methods, and tool support. J. Syst. Archit. 117, 102073 (2021)
Sgandurra, D., Karafili, E., Lupu, E.: Formalizing threat models for virtualized systems. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 251–267. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41483-6_18
U.S. Department of Homeland Security: Common attack pattern enumeration and classification, November 2002. http://capec.mitre.org
Acknowledgement
The research leading to the presented results has been undertaken within the research profile CPS4EU, funded by the European Union, grant number: 826276.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Baouya, A., Ouchani, S., Bensalem, S. (2022). Formal Modelling and Security Analysis of Inter-Operable Systems. In: Fujita, H., Fournier-Viger, P., Ali, M., Wang, Y. (eds) Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence. IEA/AIE 2022. Lecture Notes in Computer Science(), vol 13343. Springer, Cham. https://doi.org/10.1007/978-3-031-08530-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-031-08530-7_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08529-1
Online ISBN: 978-3-031-08530-7
eBook Packages: Computer ScienceComputer Science (R0)