Traditional Cyber-physical Systems(CPSs) were not built with cybersecurity in mind. They operated on separate Operational Technology (OT) networks. As these systems now become more integrated with Information Technology (IT) networks based on IP, they expose vulnerabilities that can be exploited by the attackers through these IT networks. The attackers can control such systems and cause behavior that jeopardizes the performance and safety measures that were originally designed into the system. In this paper, we explore the approaches to identify threats to CPSs and ensure the quality of the created threat models. The study involves interviews with eleven security experts working in security consultation companies, software engineering companies, an Original Equipment Manufacturer (OEM),and ground and areal vehicles integrators. We found through these interviews that the practitioners use a combination of various threat modeling methods, approaches, and standards together when they perform threat modeling of given CPSs. key challenges practitioners face are: they cannot transfer the threat modeling knowledge that they acquire in a cyber-physical domain to other domains, threat models of modified systems are often not updated, and the reliance on mostly peer-evaluation and quality checklists to ensure the quality of threat models. The study warns about the difficulty to develop secure CPSs and calls for research on developing practical threat modeling methods for CPSs, techniques for continuous threat modeling, and techniques to ensure the quality of threat models.
翻译:传统的网络-物理系统并不是以网络安全为思想而建立的,而是在不同的操作技术网络上运行。这些系统现在与基于IP的信息技术网络更加融合,因此暴露出袭击者可以通过这些信息技术网络加以利用的脆弱性。攻击者可以控制这些系统,并造成危害最初设计进入该系统的性能和安全措施的行为。在本文中,我们探讨了查明对计算机-物理系统的威胁并确保所创造的威胁模型质量的方法。研究涉及与在安全咨询公司、软件工程公司、原始设备制造商、地面和轻型车辆整合器等11个安全专家的访谈。我们通过这些访谈发现,当这些系统实施者使用各种威胁模型方法、方法和标准相结合时,他们可以同时使用各种威胁模型、方法、方法和标准来对最初在系统中设计的威胁进行模拟时,攻击者面临的主要挑战是:他们无法将他们在网络-物理领域获得的威胁模型知识转让给其他领域,修改后系统的威胁模型往往没有更新,而且多数情况下依赖同行评价和质量清单来确保威胁模型的质量。我们通过这些访谈发现,在威胁模型上,研究持续威胁技术的难度是C。