Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Formal Verification of Security Pattern Composition: Application to SCADA

In: Computing and Informatics, vol. 38, no. 5
F. Obeid - P. Dhaussy

Details:

Year, pages: 2020, 1149 - 1180
Language: eng
Keywords:
Information security, security patterns, formal verification, model checking, SCADA
About article:
Information security was initially required in specific applications, however, nowadays, most companies and even individuals are interested in securing their information assets. The new requirement can be costly, especially with the high demand on security solutions and security experts. Security patterns are reusable security solutions that prove to be efficient and can help developers achieve some security goals without the need for expertise in the security domain. Some security pattern combinations can be beneficial while others are inconsistent. Model checking can be used to verify the production of combining multiple security patterns with an architecture. Supervisory control and data acquisition (SCADA) systems control many of our critical industrial infrastructures. Due to their limitations, and their augmented connectivity, SCADA systems have many unresolved security issues. In this paper, we demonstrate how we can automatically generate a secure SCADA model based on an insecure one and how to verify the generated model.
How to cite:
ISO 690:
Obeid, F., Dhaussy, P. 2020. Formal Verification of Security Pattern Composition: Application to SCADA. In Computing and Informatics, vol. 38, no.5, pp. 1149-1180. 1335-9150. DOI: https://doi.org/10.31577/cai_2019_5_1149

APA:
Obeid, F., Dhaussy, P. (2020). Formal Verification of Security Pattern Composition: Application to SCADA. Computing and Informatics, 38(5), 1149-1180. 1335-9150. DOI: https://doi.org/10.31577/cai_2019_5_1149
About edition:
Publisher: Ústav informatiky SAV
Published: 9. 3. 2020