scholarly journals A Model Checking-Based Security Analysis Framework for IoT Systems

2021 ◽  
pp. 100004
Author(s):  
Zheng Fang ◽  
Hao Fu ◽  
Tianbo Gu ◽  
Zhiyun Qian ◽  
Trent Jaeger ◽  
...  
2020 ◽  
Vol 32 (3) ◽  
pp. 37-49
Author(s):  
Ziwei Ye ◽  
Yuanbo Guo ◽  
Ankang Ju ◽  
Fushan Wei ◽  
Ruijie Zhang ◽  
...  

Social engineering attacks are becoming serious threats to cloud service. Social engineering attackers could get Cloud service custom privacy information or attack virtual machine images directly. Existing security analysis instruments are difficult to quantify the social engineering attack risk, resulting in invalid defense guidance for social engineering attacks. In this article, a risk analysis framework for social engineering attack is proposed based on user profiling. The framework provides a pathway to quantitatively calculate the possibility of being compromised by social engineering attack and potential loss, so as to effectively complement current security assessment instruments. The frequency of related operations is used to profile and group users for respective risk calculation, and other features such as security awareness and capability of protection mechanism are also considered. Finally, examples are given to illustrate how to use the framework in actual scenario and apply it to security assessment.


Entropy ◽  
2019 ◽  
Vol 21 (8) ◽  
pp. 815 ◽  
Author(s):  
Miguel Angel Murillo-Escobar ◽  
Manuel Omar Meranza-Castillón ◽  
Rosa Martha López-Gutiérrez ◽  
César Cruz-Hernández

Currently, chaos-based cryptosystems are being proposed in the literature to provide confidentiality for digital images, since the diffusion effect in the Advance Encryption Standard (AES) algorithm is weak. Security is the most important challenge to assess in cryptosystems according to the National Institute of Standard and Technology (NIST), then cost and performance, and finally algorithm and implementation. Recent chaos-based image encryption algorithms present basic security analysis, which could make them insecure for some applications. In this paper, we suggest an integral analysis framework related to comprehensive security analysis, cost and performance, and the algorithm and implementation for chaos-based image cryptosystems. The proposed guideline based on 20 analysis points can assist new cryptographic designers to present an integral analysis of new algorithms. Future comparisons of new schemes can be more consistent in terms of security and efficiency. In addition, we present aspects regarding digital chaos implementation, chaos validation, and key definition to improve the security of the overall cryptosystem. The suggested guideline does not guarantee security, and it does not intend to limit the liberty to implement new analysis. However, it provides for the first time in the literature a solid basis about integral analysis for chaos-based image cryptosystems as an effective approach to improve security.


Author(s):  
Hooman Alavizadeh ◽  
Hootan Alavizadeh ◽  
Dong Seong Kim ◽  
Julian Jang-Jaccard ◽  
Masood Niazi Torshiz

Author(s):  
Florian Kammüller ◽  
Christian W. Probst ◽  
Franco Raimondi

In this chapter, the authors give a short overview of the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular model checking. Based on prior experience with safety analysis—in particular the TWIN elevator (ThyssenKrupp) case study—the current case study ventures into the rising field of social engineering attacks on security. This main focus and original contribution of this chapter considers the security analysis of an insider attack illustrating the benefits of model checking with belief logics and actor system modeling.


2018 ◽  
Vol 17 ◽  
pp. 03026 ◽  
Author(s):  
Zhi Xu ◽  
Deming Zhong ◽  
Weigang Li ◽  
Hao Huang ◽  
And Yigang Sun

Software security is an important and challenging research topic in developing dynamic hybrid embedded software systems. Ensuring the correct behavior of these systems is particularly difficult due to the interactions between the continuous subsystem and the discrete subsystem. Currently available security analysis methods for system risks have been limited, as they rely on manual inspections of the individual subsystems under simplifying assumptions. To improve this situation, a new approach is proposed that is based on the symbolic model checking tool NuSMV. A dual PID system is used as an example system, for which the logical part and the computational part of the system are modeled in a unified manner. Constraints are constructed on the controlled object, and a counter-example path is ultimately generated, indicating that the hybrid system can be analyzed by the model checking tool.


2016 ◽  
Vol 60 ◽  
pp. 1-14 ◽  
Author(s):  
Nikolaos Alexiou ◽  
Stylianos Basagiannis ◽  
Sophia Petridou

Sign in / Sign up

Export Citation Format

Share Document