A survey of MulVAL extensions and their attack scenarios coverage

D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …

[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores

M Riegler, J Sametinger, M Vierhauser… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …

Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach

D Ayed, PA Dragan, E Félix, ZA Mann… - 2022 22nd IEEE …, 2022 - ieeexplore.ieee.org
Data produced by end devices like smartphones, sensors or IoT devices can be stored and
processed across a continuum of compute resources, from end devices via fog nodes to the …

Towards model co-evolution across self-adaptation steps for combined safety and security analysis

T Witte, R Groner, A Raschke, M Tichy… - Proceedings of the 17th …, 2022 - dl.acm.org
Self-adaptive systems offer several attack surfaces due to the communication via different
channels and the different sensors required to observe the environment. Often, attacks …

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems

N Li, M Zhang, J Li, S Adepu, E Kang, Z Jin - ACM Transactions on …, 2024 - dl.acm.org
Security attacks present unique challenges to the design of self-adaptation mechanism for
software-intensive systems due to the adversarial nature of the environment. Game …

Design and implementation of self-protecting systems: A formal approach

C Skandylas, N Khakpour - Future Generation Computer Systems, 2021 - Elsevier
As threats to computer security become more common, complex and frequent, systems that
can automatically protect themselves from attacks are imminently needed. In this paper, we …

A model-based approach for self-adaptive security in CPS: Application to smart grids

S Chehida, E Rutten, G Giraud, S Mocanu - Journal of Systems …, 2024 - Elsevier
Security risk assessment is an important challenge in the design of Cyber Physical Systems
(CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to …

Expressive and systematic risk assessments with instance-centric threat models

S Verreydt, D Van Landuyt, W Joosen - Proceedings of the 38th ACM …, 2023 - dl.acm.org
A threat modeling exercise involves systematically assessing the likelihood and potential
impact of diverse threat scenarios. As threat modeling approaches and tools act at the level …

Self-protection against business logic vulnerabilities

S Zeller, N Khakpour, D Weyns, D Deogun - Proceedings of the IEEE …, 2020 - dl.acm.org
Attacks against business logic rules occur when the attacker exploits the domain rules in a
malicious way. Such attacks have not received sufficient attention in research so far. In this …

Adaptive trust-aware decentralized information flow control

C Skandylas, N Khakpour… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Modern software systems are decentralized, distributed, and dynamic, and consequently,
require decentralized mechanisms to enforce security. In this paper, we propose an adaptive …