Affiliation:
1. School of Automotive Studies, Tongji University, Shanghai, China
2. Institute of Software Engineering, University of Stuttgart, Stuttgart, Germany
Abstract
Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework.
Funder
German Federal Ministry of Education and Research
Reference29 articles.
1. Introducing octave allegro: improving the information security risk assessment process. Technical report, Carnegie-Mellon University;Caralli,2007
2. A systems approach for eliciting mission-centric security requirements;Carter,2018
3. Systems-theoretic security requirements modeling for cyber-physical systems;Carter;Systems Engineering,2019
4. ETSI TS 102 165-1: Cyber methods and protocols. part 1: method and pro forma for threat, vulnerability, risk analysis (TVRA);ETSI,2017
5. Common vulnerability scoring system v. 3.0: specification document;FIRST,2015
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献