Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (2): 50-57.doi: 10.11959/j.issn.2096-109x.2019016

• Papers • Previous Articles     Next Articles

Information flow integrity measurement method using integrity threat tree

Qixuan WU1,2,Jianfeng MA1,Cong SUN1()   

  1. 1 School of Cyber Engineering,Xidian University,Xi’an 710071,China
    2 Tencent Technology (Shenzhen) Company Limited,Shenzhen 518057,China
  • Revised:2019-01-20 Online:2019-04-15 Published:2019-04-16
  • Supported by:
    The National Science Foundation of China(61872279)

Abstract:

In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed.

Key words: integrity, information flow, satisfiability modulo theories, attack tree

CLC Number: 

No Suggested Reading articles found!