An approach for network information flow analysis for systems of embedded components

  • Authors:
  • Andrey Chechulin;Igor Kotenko;Vasily Desnitsky

  • Affiliations:
  • St. Petersburg Institute for Informatics and Automation (SPIIRAS), St. Petersburg, Russia;St. Petersburg Institute for Informatics and Automation (SPIIRAS), St. Petersburg, Russia;St. Petersburg Institute for Informatics and Automation (SPIIRAS), St. Petersburg, Russia

  • Venue:
  • MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Systems (devices) with embedded components operate in a potentially hostile environment and have strong recourse limitations. The development of security-enhanced embedded components is a complicated task owning to different types of threats and attacks that may affect the device, and because the security in embedded devices is commonly provided as an additional feature at the final stages of the development process, or even neglected. In the paper we consider an approach to analysis of network information flows in systems containing embedded components. This approach helps to the system engineer to evaluate the embedded system from security point of view and to correct the architecture of future system on early stages of the development.