{"title":"安全嵌入式系统的模型驱动工程设计","authors":"L. Apvrille, Letitia W. Li, Y. Roudier","doi":"10.1109/ACVI.2016.6","DOIUrl":null,"url":null,"abstract":"The communication capabilities of recent embedded systems offer more opportunities for attack tocyber criminals. Moreover, those attacks may compromisethe safety of these systems. SysML-Sec is a SysML-basedenvironment for the design of such embedded systems withsafety and security features. The paper focuses on the SysML-Sec methodology contain-ing the following stages: assumptions, requirements, attacks,partitioning, software design and software deployment. Ourmethod is supported by TTool, and offers a press-buttonapproach for formal proof of safety and security. Previousprojects and case studies modeled and validated with SysML-Sec range from automotive systems, drone systems, information systems (e.g., the analysis of malware targeting bankingsystems), industrial systems (Analysis of SCADA malware),and more generally, security protocols.","PeriodicalId":202109,"journal":{"name":"2016 Architecture-Centric Virtual Integration (ACVI)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Model-Driven Engineering for Designing Safe and Secure Embedded Systems\",\"authors\":\"L. Apvrille, Letitia W. Li, Y. Roudier\",\"doi\":\"10.1109/ACVI.2016.6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The communication capabilities of recent embedded systems offer more opportunities for attack tocyber criminals. Moreover, those attacks may compromisethe safety of these systems. SysML-Sec is a SysML-basedenvironment for the design of such embedded systems withsafety and security features. The paper focuses on the SysML-Sec methodology contain-ing the following stages: assumptions, requirements, attacks,partitioning, software design and software deployment. Ourmethod is supported by TTool, and offers a press-buttonapproach for formal proof of safety and security. Previousprojects and case studies modeled and validated with SysML-Sec range from automotive systems, drone systems, information systems (e.g., the analysis of malware targeting bankingsystems), industrial systems (Analysis of SCADA malware),and more generally, security protocols.\",\"PeriodicalId\":202109,\"journal\":{\"name\":\"2016 Architecture-Centric Virtual Integration (ACVI)\",\"volume\":\"122 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Architecture-Centric Virtual Integration (ACVI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACVI.2016.6\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Architecture-Centric Virtual Integration (ACVI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACVI.2016.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Model-Driven Engineering for Designing Safe and Secure Embedded Systems
The communication capabilities of recent embedded systems offer more opportunities for attack tocyber criminals. Moreover, those attacks may compromisethe safety of these systems. SysML-Sec is a SysML-basedenvironment for the design of such embedded systems withsafety and security features. The paper focuses on the SysML-Sec methodology contain-ing the following stages: assumptions, requirements, attacks,partitioning, software design and software deployment. Ourmethod is supported by TTool, and offers a press-buttonapproach for formal proof of safety and security. Previousprojects and case studies modeled and validated with SysML-Sec range from automotive systems, drone systems, information systems (e.g., the analysis of malware targeting bankingsystems), industrial systems (Analysis of SCADA malware),and more generally, security protocols.