Font Size: a A A

Based On The Mic Theory Of Embedded System Security Model, Design And Research

Posted on:2011-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z H YeFull Text:PDF
GTID:2208360308470972Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
As the computer industry continues developing and evolving, research on embedded systems has become a more and more popular area, further more, with its success in taking part in every field in society, such as Manufacturing, Services, National defense, Internet, etc. Meanwhile, there is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Information leakage, Illegal rewrite, Vandalism, etc., cause enormous damages to society. We used to delete the vulnerability while it was found. However, up until the vulnerability is already causing significant losses. Therefore, the available method is to consider the security issues seriously in the early stages of system life cycle, before the system prior to deployment or implementation. In this point, to solve the problems that exist in the embedded systems networked application, this paper research a method on embedded system designing based on Model-integrated computing (MIC). This method uses a domain-oriented graphical language to establish security analysis model, and integrated into the process of embedded software system modeling. This paper including the following aspects:1. Research and method comparison about theory of this paper. Model Integrated Computing and domain modeling language analysis and comparison with the unified modeling language analysis, analysis showed that the use of model integration in embedded computing modeling, domain modeling language to better adapt to the complexity of embedded systems changing physical environment.2. Security analysis on embedded system and presents a security model based on strategy. Analyses the information security problems that exits in embedded system networked applications, Such as human error, intentional theft, sabotage, software attacks, and malicious code, denial of service attacks, etc., finally, based on the analysis of various attacks, combined and compare the reliability of the existing security model and put forward feasible security policy3. Security model designing. Establish security analysis model via Domain-specific modeling language(DSML), this security model contain dataflow model and threat model. Dataflow model is made up of BLP model and Biba model, mainly to solve the confidentiality and integrality of the dataflow while threat model allows analysis tools to identify the vulnerable channel and together with the encryption algorithm library to decide which encryption algorithm to encrypt the vulnerable channel in order to protect the data transmission;4. The application of security model. To analyses feasibility and practicability of security model via co-design with existing embedded system and the security model which is designed in this paper.After researching on the correlative filed shown that to integrated security model in the early stages of embedded software system designing via above aspects, can not only feedback system security information, but also modify the model thus to improve system development efficiency and shorten development cycles.
Keywords/Search Tags:Embedded system, Model integrated computing-MIC, Domain specific model language-DSML, Security model, Model Validation
PDF Full Text Request
Related items