WP6 – Risk Analysis and Mitigation Strategies
Coordinated by
RES (M01-M16)
Objective
This work package researches and develops a methodology for continuous risk assessment process on the ICT supply chain, such that the system is continuously analyzed for potential weaknesses, and corresponding mitigation strategies can be enacted using BIECO solutions.
This WP has the following concrete objectives:
- To identify in an automated fashion main threats, including those that could also derive in a physical hazard in a cyber-physical system.
- To compute the severity of the consequences of threats and hazards.
- To make the link between systems’ internal security causes and their possible safety hazards explicit, e.g. in failure logic models such as Component Fault Trees.
- To define mitigation strategies.
- Out of both design time risk assessment models and mitigation strategies, runtime risk management models shall be synthesized systematically that are suitable to support runtime resilience mechanisms defined in WP4.
- Design and develop security, privacy and accountability measures for all the entities involved in the supply chain.
Envisioned mitigations range from process-based to architecture-based as well as related to the introduction of new patches and error detectors. The WP will ultimately produce a methodology and supporting tools for the systematic and automated i) analysis of risks, and ii) identification of mitigations that shall be equipped in the BIECO framework.
Deliverables
- D6.1 Blockly4SoS model and simulator WP6 (7 – RESILTECH) Report Public M10
- D6.2 Blockly4SoS user guide WP6 (7 – RESILTECH) Report Public M12
- D6.3 Risk Assessment and additional requirements WP6 (10 – 7BULLS) Report Public M24
- D6.4 Mitigations identification and their design WP6 (2 – Fraunhofer) Report Public M16
Outcomes
Defining the behavior of IoT devices through the MUD standard: review, challenges and research directions
Authors: José L. Hernández Ramos, Sara N. Matheu, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal Bernabe, Poonam Yadav, Antonio Skarmeta and Paolo Bellavista
BIECO Workshop – 2nd Day
M12 Workshop - day twoAgenda - Second day (08.09.2021) 09:00 – 09:05 Meeting Opening Review previous day agreements UNI/HS09:05 – 09:35 Video presentation - UTC09:35 – 11:00 BIECO Platform demo Common Platform Discussion: Design and Runtime Phase Tools’ Interaction...
The Challenges of Software Cybersecurity Certification
Authors: José L. Hernández-Ramos, Sara N. Matheu and Antonio Skarmeta
Basic aspects in redundancy-based intrusion tolerance
Authors: Felicita Di Giandomenico, Giulio Masetti (both ISTI-CNR Pisa)
A Survey on the State of the Art of Vulnerability Assessment Techniques
Authors: Eva Sotos Martínez, Nora M. Villanueva ,Lilian Adkinson Orellana
Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture
Authors: Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica