When Malicious Actors Control Your Subsystems: A Systems Engineering Approach to Functional Perseverance

IF 1 4区 工程技术 Q4 INSTRUMENTS & INSTRUMENTATION
Insight Pub Date : 2025-07-07 DOI:10.1002/inst.12545
David Hetherington, Ivan Taylor
{"title":"When Malicious Actors Control Your Subsystems: A Systems Engineering Approach to Functional Perseverance","authors":"David Hetherington,&nbsp;Ivan Taylor","doi":"10.1002/inst.12545","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Security in modern engineered systems is not merely an added layer of protection but a prerequisite for system functionality. As systems engineers navigate the evolving security landscape, they must prioritize functional perseverance, the ability of a system to maintain operational integrity despite adversarial threats. This article examines a possible method for using system-theoretic process analysis (STPA) and system dynamics (SD) to enhance security-aware system engineering.</p>\n <p>The approach shown is inspired by a 1982 paper called “The Byzantine Generals Problem” and is a peer-to-peer voting design that avoids single points of failure. In particular, we propose a system analysis and design approach that would allow the construction of a system capable of using peer-to-peer self-policing to detect an intruder that has already penetrated the security perimeter of the system and corrupted one or more of the subsystems. This article shows how STPA could inform the design of the peer-to-peer voting system and how SD could be used to examine the tradeoff of investments in redundancy versus the expected level of achieved resilience.</p>\n </div>","PeriodicalId":13956,"journal":{"name":"Insight","volume":"28 3","pages":"53-60"},"PeriodicalIF":1.0000,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Insight","FirstCategoryId":"5","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/inst.12545","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"INSTRUMENTS & INSTRUMENTATION","Score":null,"Total":0}
引用次数: 0

Abstract

Security in modern engineered systems is not merely an added layer of protection but a prerequisite for system functionality. As systems engineers navigate the evolving security landscape, they must prioritize functional perseverance, the ability of a system to maintain operational integrity despite adversarial threats. This article examines a possible method for using system-theoretic process analysis (STPA) and system dynamics (SD) to enhance security-aware system engineering.

The approach shown is inspired by a 1982 paper called “The Byzantine Generals Problem” and is a peer-to-peer voting design that avoids single points of failure. In particular, we propose a system analysis and design approach that would allow the construction of a system capable of using peer-to-peer self-policing to detect an intruder that has already penetrated the security perimeter of the system and corrupted one or more of the subsystems. This article shows how STPA could inform the design of the peer-to-peer voting system and how SD could be used to examine the tradeoff of investments in redundancy versus the expected level of achieved resilience.

当恶意行为者控制你的子系统:一种功能坚持的系统工程方法
在现代工程系统中,安全不仅仅是一个额外的保护层,而且是系统功能的先决条件。当系统工程师在不断发展的安全环境中导航时,他们必须优先考虑功能持久性,即系统在面对敌对威胁时保持操作完整性的能力。本文探讨了一种使用系统理论过程分析(STPA)和系统动力学(SD)来增强安全感知系统工程的可能方法。所展示的方法受到1982年一篇名为“拜占庭将军问题”的论文的启发,是一种避免单点故障的点对点投票设计。特别是,我们提出了一种系统分析和设计方法,该方法允许构建一个能够使用点对点自我监管的系统,以检测已经渗透到系统安全边界并损坏一个或多个子系统的入侵者。本文展示了STPA如何为点对点投票系统的设计提供信息,以及如何使用SD来检查冗余投资与预期实现弹性水平之间的权衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Insight
Insight 工程技术-材料科学:表征与测试
CiteScore
1.50
自引率
9.10%
发文量
0
审稿时长
2.8 months
期刊介绍: Official Journal of The British Institute of Non-Destructive Testing - includes original research and devlopment papers, technical and scientific reviews and case studies in the fields of NDT and CM.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信