On engineering secure software for cyber-physical systems in practice

dc.contributor.advisor ben-Othmane, Lotfi
dc.contributor.advisor Jacobson, Doug
dc.contributor.advisor Zheng, Mai
dc.contributor.advisor Daniels, Thomas Earl
dc.contributor.advisor Rover, Diane Thiede
dc.contributor.author Jamil, Ameerah Muhsinah
dc.contributor.department Department of Electrical and Computer Engineering
dc.date.accessioned 2022-11-09T02:32:10Z
dc.date.available 2022-11-09T02:32:10Z
dc.date.issued 2021-12
dc.date.updated 2022-11-09T02:32:11Z
dc.description.abstract Cyber-physical system (CPS) seamlessly integrates computational and physical resources to form intelligent systems. Such CPSs are often used to control physical objects using real-time feedback loops through computation and communication. Some of the CPSs are used for safety-critical operations, such as autonomous driving, and must be secure. Commonly, threat modeling of such systems is based on the given system’s architecture. However, as the components and interactions among the components of a CPS change, the architecture of the given CPS changes over time, making the threat model of the CPS rapidly obsolete–i.e., incomplete and invalid threat model. This thesis aims to study the threat modeling practices of CPSs in the industry and explore the possibility of automating the threat modeling process. First, we interviewed software security practitioners on their current practices to ensure secure-code changes. Unexpectedly, we found that the practitioners commonly use security code analysis and testing tools in their development process. However, they often do not perform threat modeling of their software. Second, we interviewed threat modeling practitioners on their practices of threat modeling of CPS. We found in this study that the practitioners perform threat modeling of their CPS products on demand, and the outcome could become obsolete quickly due to the frequent changes to the systems. In addition, we found that they have limited confidence in the threat models that they obtain using the classic threat modeling methods, and they use their experience to address the limitations. Next, we proposed a semi-automated process for threats identification of a given CPS. We applied the method on Apollo Auto, open-source software for autonomous driving. The architecture recovery of the software was not successful given the large size of the software, which prevents us from validating the approach. To improve the security of CPS, we propose to develop new threat modeling approaches for CPSs, develop a threat knowledge repository, and develop efficient architecture recovery methods that could be used to recover the architecture of real-world software.
dc.format.mimetype PDF
dc.identifier.doi https://doi.org/10.31274/td-20240329-558
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/VrO5y1mw
dc.language.iso en
dc.language.rfc3066 en
dc.subject.disciplines Computer engineering en_US
dc.subject.keywords Continuous threat modeling en_US
dc.subject.keywords Cyber-physical system en_US
dc.subject.keywords Secure cyber-physical system en_US
dc.subject.keywords Secure software en_US
dc.subject.keywords Threat modeling en_US
dc.title On engineering secure software for cyber-physical systems in practice
dc.type dissertation en_US
dc.type.genre dissertation en_US
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Computer engineering en_US
thesis.degree.grantor Iowa State University en_US
thesis.degree.level dissertation $
thesis.degree.name Doctor of Philosophy en_US
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Jamil_iastate_0097E_19776.pdf
Size:
821.77 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
0 B
Format:
Item-specific license agreed upon to submission
Description: