The modelling and verification of systems security is an open research topic whose complexity and importance needs, in our view, the use of formal and non-formal methods. This paper addresses the modelling of security using misuse cases and the automatic verification of survivability properties using model checking. The survivability of a system characterises its capacity to fulfil its mission (promptly) in the presence of attacks, failures, or accidents, as defined by Ellison. The original contributions of this paper are a methodology and its tool support, through a framework called surreal. The methodology starts from a misuse case specification enriched with UML profile annotations and obtains, as a by-product, a survivability assessment...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
Business and social life have become increasingly dependent on large-scale communication and informa...
This paper presents a security engineering process for the modelling of security-sensitive systems u...
The modelling and verification of systems security is an open research topic whose complexity and im...
International audienceWith the increasing number of cyber-attacks on cyber-physical systems, many se...
International audienceIn critical applications regarding safety, a solution must be validated before...
The application of cyber-physical systems (CPSs) in safety-critical application domain requires rigo...
Critical infrastructures are complex networked systems. They must be able to provide essential servi...
peer reviewedModern systems are more and more complex and security has become a key component in the...
Survivability is a crucial property for those systems – such as critical infrastructures or military...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
Developing security-critical systems is difficult and there are many well-known examples of security...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...
We propose a model-based procedure for preventing security threats using formal models. We encode sy...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
Business and social life have become increasingly dependent on large-scale communication and informa...
This paper presents a security engineering process for the modelling of security-sensitive systems u...
The modelling and verification of systems security is an open research topic whose complexity and im...
International audienceWith the increasing number of cyber-attacks on cyber-physical systems, many se...
International audienceIn critical applications regarding safety, a solution must be validated before...
The application of cyber-physical systems (CPSs) in safety-critical application domain requires rigo...
Critical infrastructures are complex networked systems. They must be able to provide essential servi...
peer reviewedModern systems are more and more complex and security has become a key component in the...
Survivability is a crucial property for those systems – such as critical infrastructures or military...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
Developing security-critical systems is difficult and there are many well-known examples of security...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...
We propose a model-based procedure for preventing security threats using formal models. We encode sy...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
Business and social life have become increasingly dependent on large-scale communication and informa...
This paper presents a security engineering process for the modelling of security-sensitive systems u...