Automated construction of security integrity wrappers for Industry 4.0 applications
نویسندگان
چکیده
Industry 4.0 (I4.0) refers to the trend towards automation and data exchange in manufacturing technologies processes which include cyber-physical systems, where internet of things connect with each other environment via networking. This new connectivity opens systems attacks, by, e.g. , injecting or tampering messages. The solution supported by communication protocols such as OPC-UA is sign and/or encrypt However, given limited resources devices high performance requirements I4.0 applications, instead applying crypto algorithms all messages network, it better focus on messages, that if tampered injected, could lead undesired configurations. paper describes a framework for developing analyzing formal executable specifications applications Maude. supports engineering design workflow using theory transformations enumerate network attacks leading states, determine wrappers preventing these attacks. In particular, deployment map from application components we define transformation models execution set (network) devices. Given an enumeration (message flows) further wraps device policies signing/signature checking just those needed prevent addition, report series experiments bounded intruder against variations Pick-n-Place application, investigating effect increasing bounds size minimizing number must be signed.
منابع مشابه
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications
We provide a largely automated system for verifying ClarkWilson interprocess information-flow integrity. Information-flow integrity properties are essential to isolate trusted processes from untrusted ones, but system misconfiguration can easily create insecure dependences. For example, an untrusted user process may be able to write to sshd config via a cron script. A useful notion of integrity...
متن کاملAutomated Generation Of Wrappers For Interoperability
The major hurdle in developing distributed systems is the implementing the interoperability between the systems. Currently, most of the interoperability techniques require that the data or services to be tightly coupled to a particular server. Furthermore, as most programmers are trained in designing stand-alone application, developing distributed system proves to be timeconsuming and difficult...
متن کاملSCanDroid: Automated Security Certification of Android Applications
Android is a popular mobile-device platform developed by Google. Android’s application model is designed to encourage applications to share their code and data with other applications. While such sharing can be tightly controlled with permissions, in general users cannot determine what applications will do with their data, and thereby cannot decide what permissions such applications should run ...
متن کاملTowards Security by Construction for Web 2.0 Applications
While security experts routinely bemoan the current state of the art in software security, from the standpoint of the application developer, application security requirements present yet another hurdle to overcome. Given the pressure for extra functionality, “lesser” concerns such as performance and security often do not get the time they deserve. While it is common to blame this on developer e...
متن کاملAutomated Security Testing for Applications Integrating Third-Party Services
Modern applications have become increasingly complex in both function and construction. Commerce websites use inferred user preferences to show relevant merchandise, banking websites implement complex transaction protocols, social networks need to safeguard sensitive user information, and mobile applications incorporate authentication, sharing, and payment mechanisms. Third-party services have ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of logical and algebraic methods in programming
سال: 2022
ISSN: ['2352-2208', '2352-2216']
DOI: https://doi.org/10.1016/j.jlamp.2021.100745