International audienceCybersecurity is becoming vital as industries are gradually moving from automating physical processes to a higher level automation using cyber physical systems (CPS) and internet of things (IoT). In this context, security is becoming a continuous process that runs in parallel to other processes during the complete life cycle of a system. Traditional threat analysis methods use design models alongside threat models as an input for security analysis, hence missing the life-cycle-based dynamicity required by the security concern. In this paper, we argue for an attacker-aware systems modeling language that exposes the systems attack surfaces. For this purpose, we have designed Pimca, a domain specific modeling language gea...
International audienceThe design and development of security mechanisms, such as authentication, req...
Abstract- In this paper, we investigate how threat modeling can be used as foundations for the speci...
We routinely hear vendors claim that their systems are “secure. ” However, without knowing what assu...
International audienceCybersecurity is becoming vital as industries are gradually moving from automa...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
International audienceWe propose a security-based modeling language for IoT systems with two importa...
Context: In order to provide more functionalities and services, systems collaborate with each other ...
Abstract. Protecting socio-technical systems is a challenging task, as a single vulnerability or exp...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
International audience<p>Security attacks are hard to understand, often expressed with unfriendly an...
The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many differen...
There is continuing growth in the need to secure critical infrastructures from malicious adversaries...
Threat modeling provides a systematic way to identify cybersecurity threats. It is an essential part...
This paper introduces aspect-oriented modeling (AOM) as a powerful, model-based design technique to ...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Enginee...
International audienceThe design and development of security mechanisms, such as authentication, req...
Abstract- In this paper, we investigate how threat modeling can be used as foundations for the speci...
We routinely hear vendors claim that their systems are “secure. ” However, without knowing what assu...
International audienceCybersecurity is becoming vital as industries are gradually moving from automa...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
International audienceWe propose a security-based modeling language for IoT systems with two importa...
Context: In order to provide more functionalities and services, systems collaborate with each other ...
Abstract. Protecting socio-technical systems is a challenging task, as a single vulnerability or exp...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
International audience<p>Security attacks are hard to understand, often expressed with unfriendly an...
The heterogeneous nature of the Internet of Things (IoT) represents a big challenge in many differen...
There is continuing growth in the need to secure critical infrastructures from malicious adversaries...
Threat modeling provides a systematic way to identify cybersecurity threats. It is an essential part...
This paper introduces aspect-oriented modeling (AOM) as a powerful, model-based design technique to ...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Enginee...
International audienceThe design and development of security mechanisms, such as authentication, req...
Abstract- In this paper, we investigate how threat modeling can be used as foundations for the speci...
We routinely hear vendors claim that their systems are “secure. ” However, without knowing what assu...