transforming graphical system models to graphical attack
play

Transforming Graphical System Models to Graphical Attack Models ! - PowerPoint PPT Presentation

From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment Transforming Graphical System Models to Graphical Attack Models ! Joint work with Marieta Georgieva Ivanova, ! ! Ren e Rydhof Hansen, and Florian


  1. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment Transforming Graphical System Models to Graphical Attack Models ! Joint work with Marieta Georgieva Ivanova, ! ! Ren´ e Rydhof Hansen, and Florian Kamm¨ uller Christian W. Probst Language-Based Technology, DTU Compute

  2. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment ! From organisational models to attacks ! ! System Model Analytic approach Success based on experience and imagination of the modeller Attack Attack Attack Attack Attack Attack Attack Attack Attack trees Descriptive method Success based on experience and imagination of the consultant/defender TREsPASS From System Models to Attack Models * Christian W. Probst * GraMSec * July 13, 2015 1 / 26 �

  3. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment ! Example System ! ! TREsPASS From System Models to Attack Models * Christian W. Probst * GraMSec * July 13, 2015 2 / 26 �

  4. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment ! System Model Components ! ! Locations in the organisation linked by directed edges in the graph. Actors in the modelled organisation. Processes modelling information sharing or policies. Items modelling tangible assets in the modelled organisation, for example, access cards, harddrives, etc. Data modelling intangible assets. TREsPASS From System Models to Attack Models * Christian W. Probst * GraMSec * July 13, 2015 3 / 26 �

  5. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment ! Constraining Actions ! ! Policies regulate access to locations and assets. Policies consist of required credentials and enabled actions. Credentials are required data, items, or an identity. TREsPASS From System Models to Attack Models * Christian W. Probst * GraMSec * July 13, 2015 4 / 26 �

  6. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment ! Graphical System Model ! ! processes network world actors Bank ATM A1 WS: out Computer C safe card[(pin,X)],(pin,X) : in C: out(“transfer”, number, pwd, amount) cash, C: out(“deposit”, number, amount) Pc 1000 account Charlie number, cash, pin, pwd,313 34567 100 96 card pin, owner, 96 Charlie Paccount City Alice trustedby(Alice): move pwd, pin, Home Door 313 42 Alice: out Workstation WS card harddrive Pws pin, owner, pwd, 42 Alice 313 TREsPASS From System Models to Attack Models * Christian W. Probst * GraMSec * July 13, 2015 5 / 26 �

  7. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment KLAIM: Kernel Language for Agents In- ! ! teraction and Mobility ! Mobile components Communication via tuple spaces Distribute/retrieve data and processes Localities as first-class citizens Created, communicated, scoping Similar ideas have been adapted by industry Mostly based on LINDA JavaSpaces by Sun TSpaces by IBM Plus implementations for other programming languages Also used for ubiquitous computing (sTuples) and the Semantic Web (Triple Spaces, Semantic Web Spaces) TREsPASS From System Models to Attack Models * Christian W. Probst * GraMSec * July 13, 2015 6 / 26 �

  8. From Graphical System Models... ... to Graphical Attack Models ... ... to Risk Assessment From Models to Attacks No Asset Mobility Asset Mobility Attack Generation is White-box Testing ! ! of System Models ! Structured system model for systematic, formal treatment. With clearly defined semantics. Specification of attacker goals. Formal specification of transformation. TREsPASS From System Models to Attack Models * Christian W. Probst * GraMSec * July 13, 2015 7 / 26 �

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend