{"title":"Security Issues in Self-Improving System Integration – Challenges and Solution Strategies","authors":"Henner Heck, B. Sick, Sven Tomforde","doi":"10.1109/FAS-W.2018.00044","DOIUrl":null,"url":null,"abstract":"Self-improving system integration (SISSY) has been proposed as an approach to master Interwoven Systems and the resulting complexity issues. This results in a further transfer of traditional design-time decisions to runtime and from the engineer to the systems themselves. As a side-effect of the desired automatic reactions regarding the own integration status in an overall system structure, novel attack vectors and security threats appear. In this article, we classify the underlying attacker types, identify the SISSY-specific security threats, and propose research directions for counter measures to cope with these threats.","PeriodicalId":164903,"journal":{"name":"2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS*W)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS*W)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FAS-W.2018.00044","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Self-improving system integration (SISSY) has been proposed as an approach to master Interwoven Systems and the resulting complexity issues. This results in a further transfer of traditional design-time decisions to runtime and from the engineer to the systems themselves. As a side-effect of the desired automatic reactions regarding the own integration status in an overall system structure, novel attack vectors and security threats appear. In this article, we classify the underlying attacker types, identify the SISSY-specific security threats, and propose research directions for counter measures to cope with these threats.