Evaluating system security using Transaction Level Modelling
Evaluating system security using Transaction Level Modelling
The design of secure systems requires the use of security analysis techniques. Security objectives have to be considered during the early stages of system development and design; an executable model will give the designer the advantage of exploring the vulnerabilities early, and therefore enhancing the system security. In this work we create an executable model of a smart card system using SystemC with the Transaction Level Modelling (TLM) extensions. The model includes the security protocols and transactions. The model is used to compare a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks, including theft of a private key and denial of service were modelled to examine the vulnerabilities. The executable model shows that security protocols and transactions can be effectively simulated in order to design improvements to withstand different types of security attacks.
137-151
Bushager, Aisha
a2594e87-349b-4fbf-b7fe-834974a51dfb
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
2014
Bushager, Aisha
a2594e87-349b-4fbf-b7fe-834974a51dfb
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
Bushager, Aisha and Zwolinski, Mark
(2014)
Evaluating system security using Transaction Level Modelling.
Facta Universitatis-Series Electronics and Energetics, 27 (1), .
(doi:10.2298/FUEE1401137B).
Abstract
The design of secure systems requires the use of security analysis techniques. Security objectives have to be considered during the early stages of system development and design; an executable model will give the designer the advantage of exploring the vulnerabilities early, and therefore enhancing the system security. In this work we create an executable model of a smart card system using SystemC with the Transaction Level Modelling (TLM) extensions. The model includes the security protocols and transactions. The model is used to compare a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks, including theft of a private key and denial of service were modelled to examine the vulnerabilities. The executable model shows that security protocols and transactions can be effectively simulated in order to design improvements to withstand different types of security attacks.
This record has no associated files available for download.
More information
Published date: 2014
Identifiers
Local EPrints ID: 479159
URI: http://eprints.soton.ac.uk/id/eprint/479159
PURE UUID: e2649730-3af7-4e3e-9f84-11cc7e41dc91
Catalogue record
Date deposited: 20 Jul 2023 16:40
Last modified: 18 Mar 2024 02:36
Export record
Altmetrics
Contributors
Author:
Aisha Bushager
Author:
Mark Zwolinski
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics