Gesellschaft für Informatik e.V.

Lecture Notes in Informatics


ARCS 2004 - Organic and Pervasive Computing, Workshops Proceedings, March 26, 2004, Augsburg, Germany. P-41, 19-33 (2004).

GI, Gesellschaft für Informatik, Bonn
2004


Editors

Uwe Brinkschulte (ed.), Jürgen Becker (ed.), Dietmar Fey (ed.), Karl-Erwin Großpietsch (ed.), Christian Hochberger (ed.), Erik Maehle (ed.), Thomas A. Runkler (ed.)


Copyright © GI, Gesellschaft für Informatik, Bonn

Contents

Finite-state modeling, analysis and testing of system vulnerabilities

Fevzi Belli , Christof J. Budnik and Nimal Nissanke

Abstract


Man-machine systems have several desirable properties, as to user friendliness, reliability, safety, security or other global system attributes. The potential for the lack, or breaches, of any such property constitutes a system vulnerability, which can lead to a situation that is undesirable from user's point of view. This undesired situation could be triggered by special events in the form of intended, or unintended, attacks from the system's environment. We view the undesirable system features as the sum of the situations, which are, mathematically speaking, complementary to the desirable ones that must be taken into account from the very beginning of the system development to achieve a stable system behavior and a robust operation. This work is about the modeling, analysis and testing of both desirable and undesirable system features which can be viewed as relations between the system and its operation.


Full Text: PDF

GI, Gesellschaft für Informatik, Bonn
ISBN 3-88579-370-9


Last changed 04.10.2013 18:00:22