CPSC 875 John D. McGregor C24.

Slides:



Advertisements
Similar presentations
Sachin Rawat Crypsis SDL Threat Modeling.
Advertisements

A New Generation of Surgical Technique: Telesurgery Using Haptic Interfaces By Sarah L. Choy ~ A haptic interface is a force reflecting device which allows.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Engineering Secure Software. Uses of Risk Thus Far  Start with the functionality Use cases  abuse/misuse cases p(exploit), p(vulnerability)  Start.
CSA 223 network and web security Chapter one
April 1, 2004ECS 235Slide #1 Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Distributed Control Systems Emad Ali Chemical Engineering Department King SAUD University.
Networking Components Chad Benedict – LTEC
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Chapter 10: Authentication Guide to Computer Network Security.
Input/OUTPUT [I/O Module structure].
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
CSE 403 Lecture 14 Safety and Security Requirements.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
SEC835 Practical aspects of security implementation Part 1.
© Copyright 2014 Rockwell Collins, Inc. All rights reserved. Resolute: An Assurance Case Language for Architecture Models Andrew Gacek, John Backes, Darren.
HARDWARE INTERFACE FOR A 3-DOF SURGICAL ROBOT ARM Ahmet Atasoy 1, Mehmed Ozkan 2, Duygun Erol Barkana 3 1 Institute of Biomedical Engineering, Bogazici.
Cohesion and Coupling CS 4311
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Information Security What is Information Security?
1 ITGD 2202 Supervision:- Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-SayeghStudent: Anwaar Ahmed Abu-AlQumboz.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Module 11: Designing Security for Network Perimeters.
CPSC 875 John D. McGregor Robotic Surgery. references p=&arnumber= &userType=inst.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Access Security IS3230.
Architecture Analysis and Design Language: An Overview Drew Gardner.
CSE 403, Software Engineering Lecture 6
UML - Development Process 1 Software Development Process Using UML.
1 Prof. Dr. Nizamettin AYDIN
Chapter 1: Security Governance Through Principles and Policies
Systems Development Lifecycle
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Cryptography and Network Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Module 5: Designing Physical Security for Network Resources
Getting started with Accurately Storing Data
John D. McGregor C10 – Error architecture
Information Security, Theory and Practice.
Threat Modeling - An Overview All Your Data is Mine
Voice Manipulator Department of Electrical & Computer Engineering
Configuring Windows Firewall with Advanced Security
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Evaluating Existing Systems
Threat modeling Aalto University, autumn 2013.
Introduction to Information Security
Evaluating Existing Systems
A Data Focussed Approach to Mapping Security Issues to Safety Impacts Dr Robert Oates Private – Rolls-Royce Proprietary Information.
High Secured Inter-Cloud Connectivity via Public Networks
Computer Security Network Security
Chapter 1: Introduction
John D. McGregor C15.1 – Process/AUTOSAR
触发器 Flip-Flops 刘鹏 浙江大学信息与电子工程学院 March 27, 2018
GROUP MEMBERS NAME ROLL NO SHAUBAN ALI 17-ARID-5650 UMAIR MUSHTAQ 17-ARID-5656 TARIQ SAEED 17-ARID-5657 MUSKAN WADOOD 17-ARID-5641.
CSE 370 – Winter Sequential Logic - 1
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
Analysis models and design models
CS 465 Terminology Slides by Kent Seamons Last Updated: Sep 7, 2017.
An Introduction to Software Architecture
Security Risanuri Hidayat 21 February 2019 security.
Engineering Secure Software
Security.
Instructor Materials Chapter 5: Ensuring Integrity
Engineering Secure Software
Presentation transcript:

CPSC 875 John D. McGregor C24

Master/Slave Master initiates interaction Slave returns results such as errors or signals from successful completion Master Slave

Master

Slave

Master The master console, often referred to as the medical workstation, offers doctors the ability to operate the system via two PHANToMR Premium 1.5 devices from Sensable Inc. A customized handle snap-on, which is similar to handling a pair of tweezers, replaces the original switch in order to replace the digital behavior of the micro-grippers at the distal end of the surgical tools with a continuous input option. The forefinger has to be fixed at a rocker, which is connected to a small DC motor with an integrated position sensor. The force-feedback capabilities of the employed haptic devices are used to display force information that is derived at the instrument tip. Feedback in all translational part is possible, but no torques can be fed back. Forces acting on the instruments are directly measured at the instrument tip by means of sensitive strain gauges sensors.

Slave The slave part of our system is composed of four ceiling mounted industrial robots with 6 degrees of freedom. Either surgical tools or the camera can be attached via a magnetic clutch with the manipulators. The coupling system includes a hot-plug show that identifies the instrument and bridges all necessary electrical connections. The surgical tools are the EndoWristTM instruments, originally deployed with the da VinciR system. All instruments are operated by means of trocar kinematics, which ensures the observance of the fulcrum.

Architecture

New attribute Understand the attribute Define a property set Define resolute set

Security Attack surface calculation Threat modeling Concepts Trust Inside/outside Flow Time

Dataflow diagram for CC

Hazards and risks Hazards Health Risks Software Environmental   Hazards Health Risks Software Environmental Overdose Trauma Operational Mechanical Air embolism Exsanguination Electrical Hardware Infection Electric shock Biological and chemical Use Allergic response Underdose All Delay of therapy

◊ Element Interactors Data Flows Data Stores Software Processes Spoofing ◊ Information disclosure Tampering with data Repudiation Denial of service Elevation of privilege

STRIDE Spoofing Authentication: the process of determining whether someone or something is, in fact, who or what it is declared to be Tampering Integrity: maintaining the consistency, accuracy, and trustworthiness of data over its entire lifecycle Repudiation Non-repudiation: Users can’t perform an action and later deny performing it. Information disclosure Confidentiality: Data access is restricted to those authorized to view the data in question. Denial of service Availability: Systems are ready when needed and perform acceptably. Elevation of privilege Authorization: the process of adding or denying individual user access to a computer network and its resource

Activities Create information flows for use cases. Gather a list of external dependencies. Define the security assumptions. Determine the threat types. Identify the threats to the system. Determine risk. Plan mitigations. Create external security notes.

Resolute only_receive_decrypt(x : component) <= ** "The component " x " only receives messages that pass Decrypt" ** forall (c : connection). (parent(destination(c)) = x) => is_sensor_data(c) or only_receive_decrypt_connection(c) only_receive_decrypt_connection(c : connection) <= ** "The connection " c " only carries messages that pass Decrypt" ** let src : component = parent(source(c)); unalterable_connection(c) and (is_decrypt(src) or only_receive_decrypt(src))

system CompleteSystem end CompleteSystem; system implementation CompleteSystem.Impl subcomponents WheelSpeed: device WheelRotationSensor; CruiseControlApp: system CruiseControl; connections c1: port WheelRotationSensor.WheelRotationSpeed -> CruiseControlApp.CruiseControl; annex Resolute {** prove (SC1c(this)) –- Prove the complete TrustLevel Rule prove (SC1(this)) -- For illustrative purposes, prove each subrule prove (SC1a(this)) **}; end CompleteSystem.Impl;

-- -- Rule SC1 checks that the data component on sending side of a logical connection has a trustlevel equal to or greater than that of the data component of the receiving component. SC1(self:component) <= ** "Confidentality security level is met on " self ** forall (c1 : component) (conn : connection) (c2 : component) . (connected (c1, conn, c2)) and (has_property (c1, Security_Trust::TrustLevel)) and (has_property (c2, Security_Trust::TrustLevel)) => property (c1, Security_Trust::TrustLevel) <= property (c2, Security_Trust::TrustLevel)

-- Rule SC1a checks if the components on either side of the logical ----connection have the same Group Membership SC1a(self:component) <= ** "Group membership criteria is met " self ** forall (c1 : component) (conn : connection) (c2 : component) . (connected (c1, conn, c2)) and (has_property (c1, Security_Trust::GroupMembership)) and (has_property (c2, Security_Trust::GroupMembership)) => property (c1, Security_Trust::GroupMembership) = property (c2, Security_Trust::GroupMembership)

-- Rule SC1s is the logical and of security rules SC1 and SC1a e. g -- Rule SC1s is the logical and of security rules SC1 and SC1a e.g. that each component belongs to the same group and the data confidentiality is maintained between the components. SC1c(self:component) <= ** "Composite Check_ " self ** SC1(self) and SC1a(self)