On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When?

B. Nuseibeh
{"title":"On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When?","authors":"B. Nuseibeh","doi":"10.1145/3055186.3055190","DOIUrl":null,"url":null,"abstract":"Boundaries play a critical role in the systems development process. In software engineering, boundaries are used to scope the real world problems that the software is required to address, and to scope the design solutions through which the software will meet its requirements. In security engineering, boundaries delimit the points at which assets may be legitimately accessed or the defences that attackers seek to breach. Cyber physical systems (CPS) add another set of boundaries that require consideration - the boundaries between the digital and the physical spaces that the CPS inhabit, as well as the boundaries with the social spaces in which such systems will operate. These boundaries have been the bedrock upon which developers build software, systems, and security capabilities. They help manage complexity of systems, organise their development, and manage their deployment. However, the views and behaviours of \"end users\" of CPS - legitimate or otherwise - do not always align with the separation of concerns embodied by such boundaries. Legitimate users, for example, may see a CPS as a single provider of services and functions, and may not find it useful to separate digital, physical, and social considerations. Similarly, malicious users may intentionally exploit the larger attack surfaces presented by a CPS, and actively exploit the design or accidental interplay between digital, physical, and social spaces. Thus, in a world of disappearing boundaries, there is sometimes what appears to be a conflicting need to make these boundaries visible and explicit. In our research work, we explore the development of software-intensive systems deployed in such a world, and set this against the development of secure, privacy-aware, forensics-ready systems, where boundaries need to be recognised and managed. We suggest some technical contributions that may contribute to addressing some of the research challenges in the area, including techniques for engineering adaptive software, collaborative security, and topology awareness. We contextualise our research in cyber-physical-social systems, which we argue provide research challenges to the community that go beyond any single technical discipline such as software or security engineering. Indeed we further argue, and demonstrate, that considerations of the interplay of security and human behaviour are fundamental to tackling some of the key challenges of developing secure cyber physical systems.","PeriodicalId":140504,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3055186.3055190","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Boundaries play a critical role in the systems development process. In software engineering, boundaries are used to scope the real world problems that the software is required to address, and to scope the design solutions through which the software will meet its requirements. In security engineering, boundaries delimit the points at which assets may be legitimately accessed or the defences that attackers seek to breach. Cyber physical systems (CPS) add another set of boundaries that require consideration - the boundaries between the digital and the physical spaces that the CPS inhabit, as well as the boundaries with the social spaces in which such systems will operate. These boundaries have been the bedrock upon which developers build software, systems, and security capabilities. They help manage complexity of systems, organise their development, and manage their deployment. However, the views and behaviours of "end users" of CPS - legitimate or otherwise - do not always align with the separation of concerns embodied by such boundaries. Legitimate users, for example, may see a CPS as a single provider of services and functions, and may not find it useful to separate digital, physical, and social considerations. Similarly, malicious users may intentionally exploit the larger attack surfaces presented by a CPS, and actively exploit the design or accidental interplay between digital, physical, and social spaces. Thus, in a world of disappearing boundaries, there is sometimes what appears to be a conflicting need to make these boundaries visible and explicit. In our research work, we explore the development of software-intensive systems deployed in such a world, and set this against the development of secure, privacy-aware, forensics-ready systems, where boundaries need to be recognised and managed. We suggest some technical contributions that may contribute to addressing some of the research challenges in the area, including techniques for engineering adaptive software, collaborative security, and topology awareness. We contextualise our research in cyber-physical-social systems, which we argue provide research challenges to the community that go beyond any single technical discipline such as software or security engineering. Indeed we further argue, and demonstrate, that considerations of the interplay of security and human behaviour are fundamental to tackling some of the key challenges of developing secure cyber physical systems.
数字、物理和社会空间之间正在消失的边界:谁、什么、何时何地?
边界在系统开发过程中起着至关重要的作用。在软件工程中,边界用于确定软件需要解决的现实世界问题的范围,以及确定软件满足其需求的设计解决方案的范围。在安全工程中,边界界定了资产可能被合法访问的点或攻击者试图突破的防御。网络物理系统(CPS)增加了另一组需要考虑的边界——CPS所居住的数字空间和物理空间之间的边界,以及这些系统将在其中运行的社会空间的边界。这些边界一直是开发人员构建软件、系统和安全功能的基础。他们帮助管理系统的复杂性,组织系统的开发,并管理系统的部署。然而,CPS的“最终用户”的观点和行为——合法的或不合法的——并不总是与这种边界所体现的关注点分离一致。例如,合法用户可能将CPS视为服务和功能的单一提供者,并且可能认为将数字、物理和社会因素分开是没有用的。同样,恶意用户可能有意利用CPS提供的更大的攻击面,并积极利用数字、物理和社会空间之间的设计或意外相互作用。因此,在一个边界正在消失的世界里,有时似乎是一种相互冲突的需要,使这些边界可见和明确。在我们的研究工作中,我们探索了在这样一个世界中部署的软件密集型系统的发展,并将其与安全,隐私意识,法医准备系统的发展相对照,其中需要识别和管理边界。我们提出了一些可能有助于解决该领域一些研究挑战的技术贡献,包括工程自适应软件、协作安全性和拓扑感知技术。我们将我们的研究置于网络-物理-社会系统的背景下,我们认为这为社区提供了超越任何单一技术学科(如软件或安全工程)的研究挑战。事实上,我们进一步论证并证明,考虑安全和人类行为的相互作用是解决开发安全网络物理系统的一些关键挑战的基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信