Maximilian Walter, Sebastian Hahner, T. Bures, P. Hnetynka, R. Heinrich, R. Reussner
{"title":"Architecture-based attack propagation and variation analysis for identifying confidentiality issues in Industry 4.0","authors":"Maximilian Walter, Sebastian Hahner, T. Bures, P. Hnetynka, R. Heinrich, R. Reussner","doi":"10.1515/auto-2022-0135","DOIUrl":null,"url":null,"abstract":"Abstract Exchanging data between entities is an essential part of Industry 4.0. However, the data exchange should not affect the confidentiality. Therefore, data should only be shared with the intended entities. In exceptional scenarios, it is unclear whether data should be shared or not and what the impact of the access decision is. Runtime access control systems such as role-based access control often do not consider the impact on the overall confidentiality. Static design-time analyses often provide this information. We use architectural design-time analyses together with an uncertainty variation metamodel mitigating uncertainty to calculate impact properties of attack paths. Runtime access control approaches can then use this information to support the access control decision. We evaluated our approach on four case studies based on real-world examples and research cases.","PeriodicalId":55437,"journal":{"name":"At-Automatisierungstechnik","volume":"71 1","pages":"443 - 452"},"PeriodicalIF":0.7000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"At-Automatisierungstechnik","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1515/auto-2022-0135","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 2
Abstract
Abstract Exchanging data between entities is an essential part of Industry 4.0. However, the data exchange should not affect the confidentiality. Therefore, data should only be shared with the intended entities. In exceptional scenarios, it is unclear whether data should be shared or not and what the impact of the access decision is. Runtime access control systems such as role-based access control often do not consider the impact on the overall confidentiality. Static design-time analyses often provide this information. We use architectural design-time analyses together with an uncertainty variation metamodel mitigating uncertainty to calculate impact properties of attack paths. Runtime access control approaches can then use this information to support the access control decision. We evaluated our approach on four case studies based on real-world examples and research cases.
期刊介绍:
Automatisierungstechnik (AUTO) publishes articles covering the entire range of automation technology: development and application of methods, the operating principles, characteristics, and applications of tools and the interrelationships between automation technology and societal developments. The journal includes a tutorial series on "Theory for Users," and a forum for the exchange of viewpoints concerning past, present, and future developments. Automatisierungstechnik is the official organ of GMA (The VDI/VDE Society for Measurement and Automatic Control) and NAMUR (The Process-Industry Interest Group for Automation Technology).
Topics
control engineering
digital measurement systems
cybernetics
robotics
process automation / process engineering
control design
modelling
information processing
man-machine interfaces
networked control systems
complexity management
machine learning
ambient assisted living
automated driving
bio-analysis technology
building automation
factory automation / smart factories
flexible manufacturing systems
functional safety
mechatronic systems.