In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis
Title | In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Vernotte, A., Johnson, P., Ekstedt, M., Lagerström, R. |
Conference Name | 2017 IEEE 21st International Enterprise Distributed Object Computing Workshop (EDOCW) |
Date Published | oct |
Keywords | Analytical models, Architectural Analysis, architectural cyber security analysis, Attack Graphs, composability, Computer architecture, computer security, cybersecurity analysis, Hardware, hardware components, ICT systems, integrated modelling language, invasive software, Metrics, Operating systems, pubcrawl, pwnPr3d modelling approach, resilience, Resiliency, self-replicating malware, Unix, UNIX operating system, UNIX operating systems |
Abstract | ICT systems have become an integral part of business and life. At the same time, these systems have become extremely complex. In such systems exist numerous vulnerabilities waiting to be exploited by potential threat actors. pwnPr3d is a novel modelling approach that performs automated architectural analysis with the objective of measuring the cyber security of the modeled architecture. Its integrated modelling language allows users to model software and hardware components with great level of details. To illustrate this capability, we present in this paper the metamodel of UNIX, operating systems being the core of every software and every IT system. After describing the main UNIX constituents and how they have been modelled, we illustrate how the modelled OS integrates within pwnPr3d's rationale by modelling the spreading of a self-replicating malware inspired by WannaCry. |
URL | https://ieeexplore.ieee.org/document/8089842/ |
DOI | 10.1109/EDOCW.2017.26 |
Citation Key | vernotte_-depth_2017 |
- integrated modelling language
- UNIX operating systems
- UNIX operating system
- Unix
- self-replicating malware
- Resiliency
- resilience
- pwnPr3d modelling approach
- pubcrawl
- operating systems
- Metrics
- invasive software
- Analytical models
- ICT systems
- hardware components
- Hardware
- cybersecurity analysis
- computer security
- computer architecture
- composability
- attack graphs
- architectural cyber security analysis
- Architectural Analysis