1 A Context Analysis Method for Developing Secure Embedded Naoyasu UbayashiKyushu University, Japan May 22, 2011 SESS’11.

Slides:



Advertisements
Similar presentations
Information Security of Embedded Systems : Embedded Systems Design Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Advertisements

Karolina Muszyńska Based on: S. Wrycza, B. Marcinkowski, K. Wyrzykowski „Język UML 2.0 w modelowaniu SI”

A Context Analysis Method for Embedded Systems --- Exploring a Requirement Boundary between a System and Its Context Naoyasu Ubayashi(Kyushu University,
Goal and Scenario Validation: a Fluent Combination Chin-Yi Tsai.
Practical Business Modeling in the Unified Process Tom Morgan Software Architect, Fidelity National Information Services
Effort is estimated using software size
1-1 ROPES Rapid Object-Oriented Process for Embedded Systems.
Hybrid Controller Reachability Reachability analysis can be useful to determine how the continuous state of a system evolves. Ideally, this process can.
Experimental Data. The Nature of data b Data is the outcome of observation and measurement b Data may be acquired ê In the field ê By experiment.
Unit 3a Industrial Control Systems
Chapter 5 – System Modeling
Practice Patterns to improve the Quality of Design Model in Embedded SoftWare Development Doo-Hwan Kim*, Jong-Phil Kim* and Jang-Eui Hong* *Chungbuk National.
1 A Modularity Assessment Framework for Context-dependent Formal Specifications Naoyasu Ubayashi (Kyushu University, Japan) September 14, 2010 ACoM 2010.
[ §3 : 1 ] 2. Life-Cycle Perspective Overview 2.1 Motivation 2.2 Waterfall Model 2.3 Requirements in Context.
The Web Wizard’s Guide to HTML Chapter Seven Frames.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
University of Toronto Department of Computer Science © Steve Easterbrook. This presentation is available free for non-commercial use with attribution.
POSL (Principles of Software Languages) Gr. Kyushu Institute of Technology, Japan An Extensible Aspect-Oriented Modeling.
Jeff Burke UCLA School of Theater, Film and Television Sensor networks in art and entertainment.
Object oriented classification Classification is the process of checking to see if an object belongs to a category or a class, is regarded as a basic attribute.
OBTAINING QUALITY MILL PERFORMANCE Dan Miller
Lecture on Introduction to Artificial Intelligence Chapter#10 Sec 10.1 and 10.3 (before Heuristics)
1 Context-dependent Product Line Practice for Constructing Reliable Embedded Systems Naoyasu UbayashiKyushu University, Japan Shin NakajimaNational Institute.
Computer Control.
BGP Attack Tree draft-convery-bgpattack-00.txt
Advanced Design Applications UNIT 4: MANUFACTURING
Paper written by Brian Berenbach Presentation by Matthew Merricks.
Architectural Point Mapping for Design Traceability Naoyasu Ubayashi and Yasutaka Kamei Kyushu University, Japan March 26, 2012 FOAL 2012 (AOSD Workshop)
1 A Context Analysis Method for Constructing Reliable Embedded Systems Naoyasu Ubayashi, Toshiki Seto, Hirotoshi Kanagawa, Susumu Taniguchi, and Jun Yoshida.
Unified Modelling Language (UML) Software Engineering Lab. Sharif University of Technology.
Introduction to OOAD and the UML
Embedded and Real Time Systems Lecture #2 David Andrews
Intel Machine Design Lab (EEL5666C) PRESENTATION #1 ROHAN PRAKASH.
Effectively Prioritising Key Outcomes for Tackling Poverty and Community Regeneration Thursday 25th November City Halls, Merchant City, Glasgow.
What do we mean by success in safeguarding work with children? Whose success? One or many forms of success? How is success constructed in safeguarding.
New and Smart Materials Mr P Mulholland St Joseph’s High School Crossmaglen.
Proximity Sensors. What are proximity sensors is a sensor able to detect the presence of nearby objects without any physical contact.sensor.
Do software agents know what they talk about? Agents and Ontology dr. Patrick De Causmaecker, Nottingham, March 7-11, 2005.
© Associate Professor Dr. Jamil Bojei, 2007 Questionnaire DesignSlide 1.
Brief FBA : A School Perspective Eau Claire Area School District Katie Marc-Special Education Teacher Katie Haugen-Special Education Teacher.
Learning Target I can explain how thermal energy impacts molecules Investigating the relationship between temperature and pressure Take out a piece of.
MAGNETRON SPUTTERING OF NI-TI THIN FILM SIMULATION BY USING EMBEDDED ATOM MODEL *Ajit Behera, M. Gupta, S. Aich and S. Ghosh Department of Metallurgical.
© 2010 IBM Corporation What’s New in RSA 8.0 Beta 1 – Visual Basic modeling March, 2010.
Chapter 4 – System Modeling Lecture 1 1Chapter 5 System modeling.
CompSci 280 S Introduction to Software Development
Strengths of Exergy Economics Research
Modular Software Development for Dealing with Uncertainty
Chapter 5 – System Modeling
Mark Tate Mechanical Engineer 4/18/2013 TESLA
Classic Career Theory: Part 3
State Machine Diagrams
Today: Classic & AI Control Wednesday: Image Processing/Vision
DT-Assessment Frame Work Term2
Analysis and Understanding
Intelligent Machines Design Lab
Codes of Conduct Usefulness
States of Consciousness
RULE OF LAW Unit 1.
Responsive Architecture
Object and class structuring
“My Comfortable and Smart Classroom”
When and how to best consider the provision of the Habitats directive
Literacy Planning a Unit Dominc Davis - ECaW.
Soft System Stakeholder Analysis
Session 26 INST 346 Technologies, Infrastructure and Architecture
Andrei G. Stoica and Csilla Farkas
Soft System Stakeholder Analysis
Understanding Behaviour
Skin-like soft driving system for wirelessly activated fully soft robots. Skin-like soft driving system for wirelessly activated fully soft robots. (A)
Presentation transcript:

1 A Context Analysis Method for Developing Secure Embedded Naoyasu UbayashiKyushu University, Japan May 22, 2011 SESS’11

Motivation  Security is one of the important issues in developing embedded systems.  Context such as physical phenomena implicitly may become a threat to the embedded systems. Temperature, air pressure, and light may make an alteration of sensed data. This can be considered as an another type of falsification.  It is important to provide a context analysis method for constructing secure embedded systems. 2

Problems to be tackled  It is difficult to decide the boundary of the context that should be taken into account: which context element, an object existing outside of the system, should be included as the targets of requirements analysis. 3 Embedded System Actuator Sensor Contexts Boundary ? Association ? Frame Problem !

Our approach  CAMEmb (Context Analysis Method for Embedded systems) UML Profile for Context Analysis Guide Words for Context Analysis  Only the value-context elements are extracted as the associated context elements because many embedded systems are abstracted as a sensor-and-actuator machine.  Other context elements can be ignored. 4

CAMEmb --- Context analysis using guide words 5 Guide Words for Context Analysis

Context modeling 6 UML profile for context analysis Steps for exploring boundary 1.Context elements (value object) observed or controlled directly by a sensor or an actuator are extracted. 2.Impact factors that affect the states (values) of these context elements are extracted using guide words. Initial Boundary Sensor cannot observe original data Factor related to a specific value Contexts that do not change the values are ignored ! The frame problem is avoided ! Contexts that do not change the values are ignored ! The frame problem is avoided ! Final Boundary Factor that determines the upper limit

Summary  Applying the guide words, we can explore only a sequence of context elements directly or indirectly affecting the data value observed or controlled by the system sensors and actuators.  We can explore the context boundary that guarantees the expected system behavior. 7 Naoyasu Ubayashi, Yasutaka Kamei, Masayuki Hirayama, and Tetsuo Tamai: A Context Analysis Method for Embedded Systems --- Exploring a Requirement Boundary between a System and Its Context, 19th IEEE International Requirements Engineering Conference (RE 2011), to appear.

Appendix 8