File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

권철현

Kwon, Cheolhyeon
High Assurance Mobility Control Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Trustworthy design architecture: Cyber-physical system

Author(s)
Choi, SungChavez, AdrianTorres, MarcosKwon, CheolhyeonHwang, Inseok
Issued Date
2017-10-23
DOI
10.1109/CCST.2017.8167827
URI
https://scholarworks.unist.ac.kr/handle/201301/34915
Fulltext
https://ieeexplore.ieee.org/document/8167827
Citation
2017 International Carnahan Conference on Security Technology, ICCST 2017, pp.1 - 9
Abstract
Conventional cyber defenses require continual maintenance: virus, firmware, and software updates; costly functional impact tests; and dedicated staff within a security operations center. The conventional defenses require access to external sources for the latest updates. The whitelisted system, however, is ideally a system that can sustain itself freed from external inputs. Cyber-Physical Systems (CPS), have the following unique traits: digital commands are physically observable and verifiable; possible combinations of commands are limited and finite. These CPS traits, combined with a trust anchor to secure an unclonable digital identity (i.e., digitally unclonable function [DUF] - Patent Application #15/183,454; CodeLock), offers an excellent opportunity to explore defenses built on whitelisting approach called 'Trustworthy Design Architecture (TDA).' There exist significant research challenges in defining what are the physically verifiable whitelists as well as the criteria for cyber-physical traits that can be used as the unclonable identity. One goal of the project is to identify a set of physical and/or digital characteristics that can uniquely identify an endpoint. The measurements must have the properties of being reliable, reproducible, and trustworthy. Given that adversaries naturally evolve with any defense, the adversary will have the goal of disrupting or spoofing this process. To protect against such disruptions, we provide a unique system engineering technique, when applied to CPSs (e.g., nuclear processing facilities, critical infrastructures), that will sustain a secure operational state without ever needing external information or active inputs from cybersecurity subject-matter experts (i.e., virus updates, IDS scans, patch management, vulnerability updates). We do this by eliminating system dependencies on external sources for protection. Instead, all internal communication is actively sealed and protected with integrity, authenticity and assurance checks that only cyber identities bound to the physical component can deliver. As CPSs continue to advance (i.e., IoTs, drones, ICSs), resilient-maintenance free solutions are needed to neutralize/reduce cyber risks. TDA is a conceptual system engineering framework specifically designed to address cyber-physical systems that can potentially be maintained and operated without the persistent need or demand for vulnerability or security patch updates.
Publisher
Institute of Electrical and Electronics Engineers
ISSN
1071-6572

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.