Classification and detection of computer intrusions
Classification and detection of computer intrusions
LSCs: Breathing Life into Message Sequence Charts
Formal Methods in System Design
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Mapping live sequence chart to coloured petri nets for analysis and verification of embedded systems
ACM SIGSOFT Software Engineering Notes
UCSIM: A Tool for Simulating Use Case Scenarios
ICSE COMPANION '07 Companion to the proceedings of the 29th International Conference on Software Engineering
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
Towards Practical Security Monitors of UML Policies for Mobile Applications
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
SCESM '07 Proceedings of the Sixth International Workshop on Scenarios and State Machines
Executable misuse cases for modeling security concerns
Proceedings of the 30th international conference on Software engineering
Misuse Cases: Use Cases with Hostile Intent
IEEE Software
Improving Translation of Live Sequence Charts to Temporal Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
Microcontroller-based process monitoring using petri-nets
EURASIP Journal on Embedded Systems - Challenges on complexity and connectivity in embedded systems
Secure vehicular communication systems: design and architecture
IEEE Communications Magazine
Model-Based generation of run-time monitors for AUTOSAR
ECMFA'13 Proceedings of the 9th European conference on Modelling Foundations and Applications
Hi-index | 0.00 |
In our integrated model-based development process for security monitors, we use Live Sequence Charts (LSCs) as expressive, formal specification. Generating target specific monitors from these, requires a complex interpretation of their syntax and semantics. In this paper, we propose a Petri Net dialect as an intermediate language for monitor generation---named Monitor Petri Nets (MPNs). It is based on standard Petri Nets that are syntactically and semantically extended to suit the needs of monitoring. With our MPNs, we are able to represent use and misuse cases described by LSCs in a format that is easy to interpret. MPNs provide the basis for the generation of SW/HW security monitors or can alternatively be interpreted by a generic monitor.