Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents cause...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
PeerJ Inc.
2021-02-01
|
Series: | PeerJ Computer Science |
Subjects: | |
Online Access: | https://peerj.com/articles/cs-362.pdf |
id |
doaj-ec9b48dcab194b65ac9bf59f65f3c743 |
---|---|
record_format |
Article |
spelling |
doaj-ec9b48dcab194b65ac9bf59f65f3c7432021-02-05T15:05:20ZengPeerJ Inc.PeerJ Computer Science2376-59922021-02-017e36210.7717/peerj-cs.362Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)Jinghua Yu0Stefan Wagner1Feng Luo2School of Automotive Studies, Tongji University, Shanghai, ChinaInstitute of Software Engineering, University of Stuttgart, Stuttgart, GermanySchool of Automotive Studies, Tongji University, Shanghai, ChinaSecurity analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework.https://peerj.com/articles/cs-362.pdfSecurity analysisComplex interactionInformation-critical systemData flow structureSTPA-Sec |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jinghua Yu Stefan Wagner Feng Luo |
spellingShingle |
Jinghua Yu Stefan Wagner Feng Luo Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) PeerJ Computer Science Security analysis Complex interaction Information-critical system Data flow structure STPA-Sec |
author_facet |
Jinghua Yu Stefan Wagner Feng Luo |
author_sort |
Jinghua Yu |
title |
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_short |
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_full |
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_fullStr |
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_full_unstemmed |
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec) |
title_sort |
data-flow-based adaption of the system-theoretic process analysis for security (stpa-sec) |
publisher |
PeerJ Inc. |
series |
PeerJ Computer Science |
issn |
2376-5992 |
publishDate |
2021-02-01 |
description |
Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework. |
topic |
Security analysis Complex interaction Information-critical system Data flow structure STPA-Sec |
url |
https://peerj.com/articles/cs-362.pdf |
work_keys_str_mv |
AT jinghuayu dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec AT stefanwagner dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec AT fengluo dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec |
_version_ |
1724283591226032128 |