80 likes | 196 Views
SESS’ 11. A Context Analysis Method for Developing Secure Embedded. Naoyasu Ubayashi Kyushu University, Japan May 22, 2011. Motivation. Security is one of the important issues in developing embedded systems.
E N D
SESS’11 A Context Analysis Methodfor Developing Secure Embedded NaoyasuUbayashi Kyushu University, Japan May 22, 2011
Motivation • Security is one of the important issues in developing embedded systems. • Context such as physical phenomena implicitly may become a threat to the embedded systems. • Temperature, air pressure, and light may make an alteration of sensed data. This can be considered as an another type of falsification. • It is important to provide a context analysis method for constructing secure embedded systems.
Problems to be tackled • It is difficult to decide the boundary of the contextthat should be taken into account: which context element, an object existing outside of the system, should be included as the targets of requirements analysis. Association ? Boundary ? Embedded System Actuator Sensor Contexts Frame Problem !
Our approach • CAMEmb (Context Analysis Method for Embedded systems) • UML Profile for Context Analysis • Guide Words for Context Analysis • Only the value-context elements are extracted as the associated context elements because many embedded systems are abstracted as a sensor-and-actuator machine. • Other context elements can be ignored.
CAMEmb--- Context analysis using guide words Guide Words for Context Analysis
Context modeling UML profile for context analysis Steps for exploring boundary Contexts that do not change the values are ignored ! The frame problem is avoided ! Context elements (value object) observed or controlled directly by a sensor or an actuator are extracted. Impact factors that affect the states (values) of these context elements are extracted using guide words. Factor that determines the upper limit Sensor cannot observe original data Factor related to a specific value Initial Boundary Final Boundary
Summary • Applying the guide words, we can explore only a sequence of context elements directly or indirectly affecting the data value observed or controlled by the system sensors and actuators. • We can explore the context boundary that guarantees the expected system behavior. NaoyasuUbayashi, Yasutaka Kamei, Masayuki Hirayama, and Tetsuo Tamai: A Context Analysis Method for Embedded Systems --- Exploring a Requirement Boundary between a System and Its Context, 19th IEEE International Requirements Engineering Conference (RE 2011), to appear.