Model Checking of Security Patterns Combinations: Application to SCADA
Fadi Obeid  1, *@  , Philippe Dhaussy  2@  
1 : Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance  (Lab-STICC)  -  Site web
ENSTA Bretagne
Technopole Brest Iroise BP 832 29285 BREST CEDEX -  France
2 : Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance  (Lab-STICC)  -  Site web
PRES Université Européenne de Bretagne (UEB), ENSTA Bretagne
2 rue Francois Verny, 29200, Brest, France -  France
* : Auteur correspondant

From a security point of view, supervisory control and data acquisition (SCADA) systems have their own requirements and limitations, and these systems are hardly even secured.These are the systems that control many of our critical industrial infrastructures, such as nuclear and chemical plants.Many studies consider, in SCADA systems, the exploitation of protective mechanisms to improve their security and resistance to attacks.These reinforced architectures may then be the object of software component modeling composing the SCADA architectures and some chosen security patterns.This combination must then be validated in terms of safety and security requirements, taking into account the temporal and spatial complexity.Using model-checking to validate these architectures can help ensure the efficiency of the chosen patterns, their completeness, and their consistency.This paper reports on the first stage of work in this area.


Personnes connectées : 1