On engineering secure software for cyber-physical systems in practice
dc.contributor.advisor | ben-Othmane, Lotfi | |
dc.contributor.advisor | Jacobson, Doug | |
dc.contributor.advisor | Zheng, Mai | |
dc.contributor.advisor | Daniels, Thomas Earl | |
dc.contributor.advisor | Rover, Diane Thiede | |
dc.contributor.author | Jamil, Ameerah Muhsinah | |
dc.contributor.department | Department of Electrical and Computer Engineering | |
dc.date.accessioned | 2022-11-09T02:32:10Z | |
dc.date.available | 2022-11-09T02:32:10Z | |
dc.date.issued | 2021-12 | |
dc.date.updated | 2022-11-09T02:32:11Z | |
dc.description.abstract | Cyber-physical system (CPS) seamlessly integrates computational and physical resources to form intelligent systems. Such CPSs are often used to control physical objects using real-time feedback loops through computation and communication. Some of the CPSs are used for safety-critical operations, such as autonomous driving, and must be secure. Commonly, threat modeling of such systems is based on the given system’s architecture. However, as the components and interactions among the components of a CPS change, the architecture of the given CPS changes over time, making the threat model of the CPS rapidly obsolete–i.e., incomplete and invalid threat model. This thesis aims to study the threat modeling practices of CPSs in the industry and explore the possibility of automating the threat modeling process. First, we interviewed software security practitioners on their current practices to ensure secure-code changes. Unexpectedly, we found that the practitioners commonly use security code analysis and testing tools in their development process. However, they often do not perform threat modeling of their software. Second, we interviewed threat modeling practitioners on their practices of threat modeling of CPS. We found in this study that the practitioners perform threat modeling of their CPS products on demand, and the outcome could become obsolete quickly due to the frequent changes to the systems. In addition, we found that they have limited confidence in the threat models that they obtain using the classic threat modeling methods, and they use their experience to address the limitations. Next, we proposed a semi-automated process for threats identification of a given CPS. We applied the method on Apollo Auto, open-source software for autonomous driving. The architecture recovery of the software was not successful given the large size of the software, which prevents us from validating the approach. To improve the security of CPS, we propose to develop new threat modeling approaches for CPSs, develop a threat knowledge repository, and develop efficient architecture recovery methods that could be used to recover the architecture of real-world software. | |
dc.format.mimetype | ||
dc.identifier.doi | https://doi.org/10.31274/td-20240329-558 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/VrO5y1mw | |
dc.language.iso | en | |
dc.language.rfc3066 | en | |
dc.subject.disciplines | Computer engineering | en_US |
dc.subject.keywords | Continuous threat modeling | en_US |
dc.subject.keywords | Cyber-physical system | en_US |
dc.subject.keywords | Secure cyber-physical system | en_US |
dc.subject.keywords | Secure software | en_US |
dc.subject.keywords | Threat modeling | en_US |
dc.title | On engineering secure software for cyber-physical systems in practice | |
dc.type | dissertation | en_US |
dc.type.genre | dissertation | en_US |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.discipline | Computer engineering | en_US |
thesis.degree.grantor | Iowa State University | en_US |
thesis.degree.level | dissertation | $ |
thesis.degree.name | Doctor of Philosophy | en_US |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Jamil_iastate_0097E_19776.pdf
- Size:
- 821.77 KB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 0 B
- Format:
- Item-specific license agreed upon to submission
- Description: