Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)

Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents cause...

Full description

Bibliographic Details
Main Authors: Jinghua Yu, Stefan Wagner, Feng Luo
Format: Article
Language:English
Published: PeerJ Inc. 2021-02-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-362.pdf
id doaj-ec9b48dcab194b65ac9bf59f65f3c743
record_format Article
spelling doaj-ec9b48dcab194b65ac9bf59f65f3c7432021-02-05T15:05:20ZengPeerJ Inc.PeerJ Computer Science2376-59922021-02-017e36210.7717/peerj-cs.362Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)Jinghua Yu0Stefan Wagner1Feng Luo2School of Automotive Studies, Tongji University, Shanghai, ChinaInstitute of Software Engineering, University of Stuttgart, Stuttgart, GermanySchool of Automotive Studies, Tongji University, Shanghai, ChinaSecurity analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework.https://peerj.com/articles/cs-362.pdfSecurity analysisComplex interactionInformation-critical systemData flow structureSTPA-Sec
collection DOAJ
language English
format Article
sources DOAJ
author Jinghua Yu
Stefan Wagner
Feng Luo
spellingShingle Jinghua Yu
Stefan Wagner
Feng Luo
Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
PeerJ Computer Science
Security analysis
Complex interaction
Information-critical system
Data flow structure
STPA-Sec
author_facet Jinghua Yu
Stefan Wagner
Feng Luo
author_sort Jinghua Yu
title Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_short Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_full Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_fullStr Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_full_unstemmed Data-flow-based adaption of the System-Theoretic Process Analysis for Security (STPA-Sec)
title_sort data-flow-based adaption of the system-theoretic process analysis for security (stpa-sec)
publisher PeerJ Inc.
series PeerJ Computer Science
issn 2376-5992
publishDate 2021-02-01
description Security analysis is an essential activity in security engineering to identify potential system vulnerabilities and specify security requirements in the early design phases. Due to the increasing complexity of modern systems, traditional approaches lack the power to identify insecure incidents caused by complex interactions among physical systems, human and social entities. By contrast, the System-Theoretic Process Analysis for Security (STPA-Sec) approach views losses as resulting from interactions, focuses on controlling system vulnerabilities instead of external threats, and is applicable for complex socio-technical systems. However, the STPA-Sec pays less attention to the non-safety but information-security issues (e.g., data confidentiality) and lacks efficient guidance for identifying information security concepts. In this article, we propose a data-flow-based adaption of the STPA-Sec (named STPA-DFSec) to overcome the mentioned limitations and elicit security constraints systematically. We use the STPA-DFSec and STPA-Sec to analyze a vehicle digital key system and investigate the relationship and differences between both approaches, their applicability, and highlights. To conclude, the proposed approach can identify information-related problems more directly from the data processing aspect. As an adaption of the STPA-Sec, it can be used with other STPA-based approaches to co-design systems in multi-disciplines under the unified STPA framework.
topic Security analysis
Complex interaction
Information-critical system
Data flow structure
STPA-Sec
url https://peerj.com/articles/cs-362.pdf
work_keys_str_mv AT jinghuayu dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec
AT stefanwagner dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec
AT fengluo dataflowbasedadaptionofthesystemtheoreticprocessanalysisforsecuritystpasec
_version_ 1724283591226032128