Skip to content

Commit

Permalink
Added TII BibTeX file.
Browse files Browse the repository at this point in the history
  • Loading branch information
MatthiasEckhart committed Jul 24, 2022
1 parent e967c7c commit 580d540
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 2 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
This prototype implements the methods presented in the following two publications:

1. [Eckhart, M., Ekelhart, A., & Weippl, E. R. (2020). Automated Security Risk Identification Using AutomationML-Based Engineering Data. IEEE Transactions on Dependable and Secure Computing.](https://doi.org/10.1109/TDSC.2020.3033150)
2. Eckhart, M., Ekelhart, A., Biffl S., Lüder A., & Weippl, E. R. (2022). QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Transactions on Industrial Informatics. To Appear.
2. [Eckhart, M., Ekelhart, A., Biffl S., Lüder A., & Weippl, E. R. (2022). QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Transactions on Industrial Informatics.](https://doi.org/10.1109/tii.2022.3193119)

In essence, it identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts.
The results of the risk identification process can be used to generate cyber-physical attack graphs, which model multistage cyber-attacks that potentially lead to physical damage.
Expand Down Expand Up @@ -99,7 +99,7 @@ The measurements and log files obtained during the performance assessment are av

## How to Cite

If you use this prototype in your research, please consider citing our [IEEE TDSC 2020](https://doi.org/10.1109/TDSC.2020.3033150) or IEEE TII 2022 publication. Feel free to use the papers' BibTeX entries ([TDSC](https://github.com/sbaresearch/amlsec/tree/master/bib/Eckhart2022.bib), TII).
If you use this prototype in your research, please consider citing our [IEEE TDSC 2020](https://doi.org/10.1109/TDSC.2020.3033150) or [IEEE TII 2022](https://doi.org/10.1109/tii.2022.3193119) publication. Feel free to use the papers' BibTeX entries ([TDSC](https://github.com/sbaresearch/amlsec/tree/master/bib/Eckhart2022.bib), [TII](https://github.com/sbaresearch/amlsec/tree/master/bib/Eckhart2022a.bib)).

## Acknowledgment

Expand Down
10 changes: 10 additions & 0 deletions bib/Eckhart2022a.bib
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
@Article{Eckhart2022a,
author = {Eckhart, Matthias and Ekelhart, Andreas and Biffl, Stefan and L{\"u}der, Arndt and Weippl, Edgar},
journal = {IEEE Transactions on Industrial Informatics},
title = {{QualSec}: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems},
year = {2022},
issn = {1941-0050},
pages = {1--12},
abstract = {As the threat landscape in the industrial domain continually advances, security-by-design is an ever-growing concern in the engineering of cyber-physical production systems (CPPSs). Often, quality aspects are not considered when securing CPPSs, which creates attack vectors that could lead to malicious activity affecting the products' quality. Since quality control systems generally provide inadequate protection against intentionally introduced defects, and can be susceptible to attacks, quality considerations must be integrated into security-aware CPPS engineering. For this purpose, we propose the QualSec method that automatically identifies security risks pertaining to CPPSs, building on the quality characteristics associated with manufacturing operations to determine cascading effects. QualSec is based on a semantic representation of engineering knowledge, allowing to efficiently reuse engineering models from AutomationML artifacts. Moreover, QualSec utilizes Petri nets to facilitate the analysis of security risks and cascading effects. In this way, QualSec informs users about possible attack paths for compromising quality characteristics, how attackers may disguise their malicious actions, and the possible consequences of attacks with respect to product quality. We demonstrate the benefits of QualSec in a case study and analyze its scalability through a rigorous performance evaluation.},
doi = {10.1109/TII.2022.3193119},
}

0 comments on commit 580d540

Please sign in to comment.