High-level Threat Models
نویسنده
چکیده
A secure system should exhibit all the functionality that the system designer expects and no functionality that the designer doesn’t expect. Thus whether a system is secure depends on how principals—in particular how adversarial principals—interact with the system. This set of expected adversarial interactions is defined as the threat model. Threat models are characterized of the means, motivation, and opportunity of the attacker. The DoD Defense Science Board defines a hierarchy of threats ranging from socalled “script kiddies” to sophisticated nation states capable of introducing backdoor vulnerabilities into commercial products and combining sophisticated cyber attacks with military and/or intelligence activities:
منابع مشابه
Agricultural crop growth modelling: a tool for dealing with the threat of climate change affecting food security (case study for greenhouse tomato)
Climate change and essentiality of the food security have motived scientists to try innovative approaches, among which, crop growth models can help to predict crop yield. In order to simulate tomato (Solanum lycopersicum) growth, phenological characteristics of a short-life variety of tomato were assessed. Phenologic characteristics included leaf area index (LAI), specific leaf area (S...
متن کاملMental Health Problems in Adolescence and the Interpretation of Unambiguous Threat
Aberrant threat perception has been linked to paranoia, anxiety and other mental health problems, and is widely considered to be a core, transdiagnostic feature of psychopathology. However, to date there has been only limited investigation of whether mental health problems are associated with a biased interpretation of stimuli that have explicit (as opposed to ambiguous) connotations of threat....
متن کاملPOMDP Planning for High Level UAV Decisions: Search vs. Strike
The Partially Observable Markov Decision Process (POMDP) model is explored for high level decision making for Unmanned Air Vehicles (UAVs). The type of UAV modeled is a flying munition with a limited fuel supply. The UAV is destroyed when it strikes a target. When a UAV detects a target, a decision has to be made whether to continue to search for a better target or strike the current target imm...
متن کاملA Tool for Automated Test Code Generation from High-Level Petri Nets
Automated software testing has gained much attention because it is expected to improve testing productivity and reduce testing cost. Automated generation and execution of tests, however, are still very limited. This paper presents a tool, ISTA (Integration and System Test Automation), for automated test generation and execution by using high-level Petri nets as finite state test models. ISTA ha...
متن کاملBreakApp: Automated, Flexible Application Compartmentalization
Developers of large-scale software systems may use third-party modules to reduce costs and accelerate release cycles, at some risk to safety and security. BREAKAPP exploits module boundaries to automate compartmentalization of systems and enforce security policies, enhancing reliability and security. BREAKAPP transparently spawns modules in protected compartments while preserving their original...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017