首页 | 本学科首页   官方微博 | 高级检索  
     

采用完整性威胁树的信息流完整性度量方法
作者姓名:吴奇烜  马建峰  孙聪
作者单位:1. 西安电子科技大学网络与信息安全学院,陕西 西安 710071;2. 腾讯科技(深圳)有限公司,广东 深圳 518057
基金项目:国家自然科学基金资助项目(61872279)
摘    要:针对传统信息流完整性分析方法缺乏对具体系统结构及关联性攻击事件考虑的缺陷,提出完整性威胁树对系统信息流完整性做量化分析,提出条件触发门对存在关联的攻击事件进行建模。使用攻击代价来量化攻击各信道的难易度,依据架构相关的完整性威胁树,利用可满足性模理论及其工具求解最小攻击代价,以量化分析系统完整性威胁。通过对实际飞控系统模型的建模分析求解说明方法的实用性,并得出条件触发门参数对系统完整性的影响。

关 键 词:完整性  信息流  可满足性模理论  攻击树  

Information flow integrity measurement method using integrity threat tree
Authors:Qixuan WU  Jianfeng MA  Cong SUN
Affiliation:1. School of Cyber Engineering,Xidian University,Xi’an 710071,China;2. Tencent Technology (Shenzhen) Company Limited,Shenzhen 518057,China
Abstract:In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed.
Keywords:integrity  information flow  satisfiability modulo theories  attack tree  
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号