1 / 8

A Context Analysis Method for Developing Secure Embedded

SESS’ 11. A Context Analysis Method for Developing Secure Embedded. Naoyasu Ubayashi Kyushu University, Japan May 22, 2011. Motivation. Security is one of the important issues in developing embedded systems.

armine
Download Presentation

A Context Analysis Method for Developing Secure Embedded

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SESS’11 A Context Analysis Methodfor Developing Secure Embedded NaoyasuUbayashi Kyushu University, Japan May 22, 2011

  2. Motivation • Security is one of the important issues in developing embedded systems. • Context such as physical phenomena implicitly may become a threat to the embedded systems. • Temperature, air pressure, and light may make an alteration of sensed data. This can be considered as an another type of falsification. • It is important to provide a context analysis method for constructing secure embedded systems.

  3. Problems to be tackled • It is difficult to decide the boundary of the contextthat should be taken into account: which context element, an object existing outside of the system, should be included as the targets of requirements analysis. Association ? Boundary ? Embedded System Actuator Sensor Contexts Frame Problem !

  4. Our approach • CAMEmb (Context Analysis Method for Embedded systems) • UML Profile for Context Analysis • Guide Words for Context Analysis • Only the value-context elements are extracted as the associated context elements because many embedded systems are abstracted as a sensor-and-actuator machine. • Other context elements can be ignored.

  5. CAMEmb--- Context analysis using guide words Guide Words for Context Analysis

  6. Context modeling UML profile for context analysis Steps for exploring boundary Contexts that do not change the values are ignored ! The frame problem is avoided ! Context elements (value object) observed or controlled directly by a sensor or an actuator are extracted. Impact factors that affect the states (values) of these context elements are extracted using guide words. Factor that determines the upper limit Sensor cannot observe original data Factor related to a specific value Initial Boundary Final Boundary

  7. Summary • Applying the guide words, we can explore only a sequence of context elements directly or indirectly affecting the data value observed or controlled by the system sensors and actuators. • We can explore the context boundary that guarantees the expected system behavior. NaoyasuUbayashi, Yasutaka Kamei, Masayuki Hirayama, and Tetsuo Tamai: A Context Analysis Method for Embedded Systems --- Exploring a Requirement Boundary between a System and Its Context, 19th IEEE International Requirements Engineering Conference (RE 2011), to appear.

  8. Appendix

More Related