Awareness that networked embedded systems are vulnerable to cyber-threats has been constantly raising since some years ago. In the industrial arena recent severe attacks, such as the popular case of the Stuxnet worm, have completely debunked the myth of security of embedded devices based on their isolation. Indeed, the ever increasing dependence of many industrial systems on digital communication networks is causing the cyber-security requirements to become a priority in their planning, design, deployment and management. This paper deals with our experience in checking the conformance of a distributed industrial automation system, which includes several types of embedded devices, with respect to a set of security policies defined at the global system level. In particular, the focus of the paper is on the use of modeling techniques and semi-automated s/w tools to verify the configuration of devices and services with attention to the correct use of their security capabilities to support the desired set of policies.

System Configuration Check Against Security Policies in Industrial Networks

M Cheminod;L Durante;A Valenzano
2012

Abstract

Awareness that networked embedded systems are vulnerable to cyber-threats has been constantly raising since some years ago. In the industrial arena recent severe attacks, such as the popular case of the Stuxnet worm, have completely debunked the myth of security of embedded devices based on their isolation. Indeed, the ever increasing dependence of many industrial systems on digital communication networks is causing the cyber-security requirements to become a priority in their planning, design, deployment and management. This paper deals with our experience in checking the conformance of a distributed industrial automation system, which includes several types of embedded devices, with respect to a set of security policies defined at the global system level. In particular, the focus of the paper is on the use of modeling techniques and semi-automated s/w tools to verify the configuration of devices and services with attention to the correct use of their security capabilities to support the desired set of policies.
2012
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
Inglese
7th IEEE International Symposium on Industrial Embedded Systems (SIES), June 20 - June 22, 2012, Karlsruhe, Germany, Conference Proceedings. -
7th IEEE International Symposium on Industrial Embedded Systems (SIES 2012)
247
256
10
978-1-4673-2685-8
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6356591&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DSystem+Configuration+Check+Against+Security+Policies
The Institute of Electrical and Electronics Engineers (IEEE)
Piscataway
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
20-22 Giugno 2012
Karlsruhe
Role-based access control (RBAC)
security policies
automatic analysis
networked embedded systems
3
none
M. Cheminod; L. Durante; A. Valenzano
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/233792
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact