scholarly journals Security Analysis of IoT Systems Using Attack Trees

Author(s):  
Delphine Beaulaton ◽  
Najah Ben Said ◽  
Ioana Cristescu ◽  
Salah Sadou
Information ◽  
2020 ◽  
Vol 11 (5) ◽  
pp. 273 ◽  
Author(s):  
Mohammad Hamad ◽  
Vassilis Prevelakis

In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it did not determine which method could be used to achieve this process. Therefore, many threat modeling approaches were adopted. However, using one individual approach will not identify all the threats which could target the system, and may lead to insufficient mitigation mechanisms. Thus, having complete security requires the usage of a comprehensive threat model which identifies all the potential threats and vulnerabilities. In this work, we tried to revise the existing threat modeling efforts in the vehicular domain. Also, we proposed using a hybrid method called the Software, Asset, Vulnerability, Threat, and Attacker (SAVTA)-centric method to support security analysis for vehicular systems. SAVTA combines different existing threat modeling approaches to create a comprehensive and hybridized threat model. The model is used as an aid to construct general attack trees which illustrate attack vectors that threaten a particular vehicle asset and classify these attacks under different sub-trees.


Author(s):  
Yu.M. Sklyarova ◽  
I.Yu. Sklyarov ◽  
E.N. Lapina

2020 ◽  
Vol 10 (5) ◽  
pp. 43-49
Author(s):  
MARINA MARKHGEYM ◽  
◽  
ANNA BEZUGLAYA

The article presents the author’s analysis of constitutional texts, regulations and analytical materials of the countries of the Commonwealth of Independent States in order to consolidate in them the consolidated powers of the chambers of parliaments associated with the implementation of food security. Analysis of legal acts of the studied group of states showed that the sphere of food security (as part of the agrarian and food sphere/function) is one of the eventual spheres of interaction between the chambers of parliament. In the course of the study, two approaches of states to the formalization of provisions related to food security in constitutional texts were identified. The first approach is to consolidate norms that indirectly affect the field of food security (Belarus, Kazakhstan, Russia); the second - in the absence of such provisions (Tajikistan and Uzbekistan). It has been established that the interaction of the chambers of parliaments in the field of food security is implemented through the adoption of laws, as well as through various parliamentary events (parliamentary hearings, round tables, seminars, meetings, etc.). It is concluded that the available options for interaction between the chambers of parliaments of states in the field of food security reflect their independent approaches, which are developed on the basis of legal doctrine and practice.


2012 ◽  
Vol 3 (5) ◽  
pp. 82-84
Author(s):  
Reshna Wilson ◽  
◽  
Biju Balakrishnan

Author(s):  
Yukiyasu TSUNOO ◽  
Teruo SAITO ◽  
Maki SHIGERI ◽  
Takeshi KAWABATA

2010 ◽  
Vol 69 (7) ◽  
pp. 629-638
Author(s):  
J. Sisniega-Gonzalez ◽  
E. Aguirre-Anaya ◽  
Mariko Nakano-Miyatake ◽  
Hector Manuel Perez-Meana

Sign in / Sign up

Export Citation Format

Share Document