Skip to main content

Showing 1–9 of 9 results for author: Fleming, C H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.12911  [pdf, other

    eess.SY cs.LO math.CT

    Compositional Thinking in Cyberphysical Systems Theory

    Authors: Georgios Bakirtzis, Eswaran Subrahmanian, Cody H. Fleming

    Abstract: Engineering safe and secure cyber-physical systems requires system engineers to develop and maintain a number of model views, both dynamic and static, which can be seen as algebras. We posit that verifying the composition of requirement, behavioral, and architectural models using category theory gives rise to a strictly compositional interpretation of cyber-physical systems theory, which can assis… ▽ More

    Submitted 9 October, 2021; v1 submitted 26 May, 2021; originally announced May 2021.

  2. arXiv:2103.00044  [pdf, ps, other

    cs.CR eess.SY math.CT

    Yoneda Hacking: The Algebra of Attacker Actions

    Authors: Georgios Bakirtzis, Fabrizio Genovese, Cody H. Fleming

    Abstract: Our work focuses on modeling the security of systems from their component-level designs. Towards this goal, we develop a categorical formalism to model attacker actions. Equip** the categorical formalism with algebras produces two interesting results for security modeling. First, using the Yoneda lemma, we can model attacker reconnaissance missions. In this context, the Yoneda lemma shows us tha… ▽ More

    Submitted 13 April, 2022; v1 submitted 26 February, 2021; originally announced March 2021.

  3. arXiv:2010.08003  [pdf, other

    cs.LO eess.SY math.CT

    Categorical Semantics of Cyber-Physical Systems Theory

    Authors: Georgios Bakirtzis, Cody H. Fleming, Christina Vasilakopoulou

    Abstract: Cyber-physical systems require the construction and management of various models to assure their correct, safe, and secure operation. These various models are necessary because of the coupled physical and computational dynamics present in cyber-physical systems. However, to date the different model views of cyber-physical systems are largely related informally, which raises issues with the degree… ▽ More

    Submitted 26 April, 2021; v1 submitted 15 October, 2020; originally announced October 2020.

  4. An Ontological Metamodel for Cyber-Physical System Safety, Security, and Resilience Coengineering

    Authors: Georgios Bakirtzis, Tim Sherburne, Stephen Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming

    Abstract: System complexity has become ubiquitous in the design, assessment, and implementation of practical and useful cyber-physical systems. This increased complexity is impacting the management of models necessary for designing cyber-physical systems that are able to take into account a number of ``-ilities'', such that they are safe and secure and ultimately resilient to disruption of service. We propo… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

  5. Fundamental Challenges of Cyber-Physical Systems Security Modeling

    Authors: Georgios Bakirtzis, Garrett L. Ward, Christopher J. Deloglos, Carl R. Elks, Barry M. Horowitz, Cody H. Fleming

    Abstract: Systems modeling practice lacks security analysis tools that can interface with modeling languages to facilitate security by design. Security by design is a necessity in the age of safety critical cyber-physical systems, where security violations can cause hazards. Currently, the overlap between security and safety is narrow. But deploying cyber-physical systems means that today's adversaries can… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

  6. Data Driven Vulnerability Exploration for Design Phase System Analysis

    Authors: Georgios Bakirtzis, Brandon J. Simon, Aidan G. Collins, Cody H. Fleming, Carl R. Elks

    Abstract: Applying security as a lifecycle practice is becoming increasingly important to combat targeted attacks in safety-critical systems. Among others there are two significant challenges in this area: (1) the need for models that can characterize a realistic system in the absence of an implementation and (2) an automated way to associate attack vector information; that is, historical data, to such syst… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

  7. Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis

    Authors: Georgios Bakirtzis, Brandon J. Simon, Cody H. Fleming, Carl R. Elks

    Abstract: Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to understand the data at hand and, consequently, to conceive more targeted preemption and mitigation security strategies. Despite the recent advances, model-based security analysis is lacking… ▽ More

    Submitted 23 October, 2018; v1 submitted 24 August, 2018; originally announced August 2018.

  8. arXiv:1712.01448  [pdf, other

    cs.CR

    MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis

    Authors: Georgios Bakirtzis, Bryan T. Carter, Cody H. Fleming, Carl R. Elks

    Abstract: Currently, perimeter-based approaches are the mainstay of cybersecurity. While this paradigm is necessary, there is mounting evidence of its insufficiency with respect to sophisticated and coordinated attacks. In contrast to perimeter-based security, mission-centric cybersecurity provides awareness of how attacks can influence mission success and therefore focuses resources for mitigating vulnerab… ▽ More

    Submitted 4 December, 2017; originally announced December 2017.

  9. A Model-Based Approach to Security Analysis for Cyber-Physical Systems

    Authors: Georgios Bakirtzis, Bryan T. Carter, Carl R. Elks, Cody H. Fleming

    Abstract: Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation. Most safety and security decisions that can have major effects on mitigation strategy options after deployment are made early in the system's life cycle. To allow for a vuln… ▽ More

    Submitted 10 June, 2018; v1 submitted 31 October, 2017; originally announced October 2017.

    Comments: 8 pages, 5 figures, conference