Abstract:
Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. S...Show MoreMetadata
Abstract:
Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking tools that employ effective dashboards-to manage potential attack vectors, system components, and requirements. This problem is further exacerbated because model-based security analysis produces significantly larger result spaces than security analysis applied to realized systems-where platform specific information, software versions, and system element dependencies are known. Therefore, there is a need to manage the analysis complexity in model-based security through better visualization techniques. Towards that goal, we propose an interactive security analysis dashboard that provides different views largely centered around the system, its requirements, and its associated attack vector space. This tool makes it possible to start analysis earlier in the system lifecycle. We apply this tool in a significant area of engineering design-the design of cyber-physical systems-where security violations can lead to safety hazards.
Date of Conference: 22-22 October 2018
Date Added to IEEE Xplore: 09 May 2019
ISBN Information:
ISSN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Security ,
- Analytical models ,
- Tools ,
- Visualization ,
- Topology ,
- Software
- Index Terms
- System Design ,
- Cyber-physical Systems ,
- Interactive ,
- Cybersecurity ,
- Model-based Analysis ,
- Security Analysis ,
- Attack Vector ,
- Security Analysts ,
- Security Tools ,
- Model System ,
- Systems Engineering ,
- Visualization Tool ,
- Data Security ,
- Design Phase ,
- Domain Experts ,
- Language Model ,
- IT Systems ,
- System Topology ,
- Potential Violations ,
- Unsafe Behavior ,
- Wireless Module ,
- Attack Patterns ,
- Traditional Vector ,
- Attack Surface ,
- Pop-up Window ,
- Security Posture ,
- Safety Constraints ,
- Operational Goals ,
- Graph Layout ,
- Model Fidelity
- Author Keywords
- Human-centered computing ,
- Visualization ,
- Visualization techniques ,
- Graph drawings ,
- Human-centered computing ,
- Visualization ,
- Visualization systems and tools ,
- Visualization toolkits ,
- Security and privacy ,
- Systems Security ,
- Vulnerability management ,
- Security and privacy ,
- Security in hardware ,
- Embedded systems security
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Security ,
- Analytical models ,
- Tools ,
- Visualization ,
- Topology ,
- Software
- Index Terms
- System Design ,
- Cyber-physical Systems ,
- Interactive ,
- Cybersecurity ,
- Model-based Analysis ,
- Security Analysis ,
- Attack Vector ,
- Security Analysts ,
- Security Tools ,
- Model System ,
- Systems Engineering ,
- Visualization Tool ,
- Data Security ,
- Design Phase ,
- Domain Experts ,
- Language Model ,
- IT Systems ,
- System Topology ,
- Potential Violations ,
- Unsafe Behavior ,
- Wireless Module ,
- Attack Patterns ,
- Traditional Vector ,
- Attack Surface ,
- Pop-up Window ,
- Security Posture ,
- Safety Constraints ,
- Operational Goals ,
- Graph Layout ,
- Model Fidelity
- Author Keywords
- Human-centered computing ,
- Visualization ,
- Visualization techniques ,
- Graph drawings ,
- Human-centered computing ,
- Visualization ,
- Visualization systems and tools ,
- Visualization toolkits ,
- Security and privacy ,
- Systems Security ,
- Vulnerability management ,
- Security and privacy ,
- Security in hardware ,
- Embedded systems security