{"title":"Keynote: Topology Aware Adaptive Security","authors":"L. Pasquale","doi":"10.1109/SER-IP.2017..21","DOIUrl":null,"url":null,"abstract":"Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Cyber-Physical Systems can be harmed through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the often ignored interplay between the cyber and physical spaces characterizing a system operating environment. Awareness of the topology of the operating environment of systems as well as its dynamics can support adaptive security more effectively. In this talk I propose the use of Bigraphical Reactive Systems to represent the topology of cyber and physical spaces. I describe how to use this representation to reason about the consequences of the evolution of topological configurations on the satisfaction of security requirements. I also illustrate a planning technique to identify an adaptation strategy to be used at runtime, to circumvent, prevent, or mitigate security requirements violations previously identified. Finally I will describe how this approach has been integrated into an existing commercial access control software.","PeriodicalId":279970,"journal":{"name":"2017 IEEE/ACM 4th International Workshop on Software Engineering Research and Industrial Practice (SER&IP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE/ACM 4th International Workshop on Software Engineering Research and Industrial Practice (SER&IP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SER-IP.2017..21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Cyber-Physical Systems can be harmed through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the often ignored interplay between the cyber and physical spaces characterizing a system operating environment. Awareness of the topology of the operating environment of systems as well as its dynamics can support adaptive security more effectively. In this talk I propose the use of Bigraphical Reactive Systems to represent the topology of cyber and physical spaces. I describe how to use this representation to reason about the consequences of the evolution of topological configurations on the satisfaction of security requirements. I also illustrate a planning technique to identify an adaptation strategy to be used at runtime, to circumvent, prevent, or mitigate security requirements violations previously identified. Finally I will describe how this approach has been integrated into an existing commercial access control software.