The University of Southampton
University of Southampton Institutional Repository

Evaluating system security using Transaction Level Modelling

Evaluating system security using Transaction Level Modelling
Evaluating system security using Transaction Level Modelling
The design of secure systems requires the use of security analysis techniques. Security objectives have to be considered during the early stages of system development and design; an executable model will give the designer the advantage of exploring the vulnerabilities early, and therefore enhancing the system security. In this work we create an executable model of a smart card system using SystemC with the Transaction Level Modelling (TLM) extensions. The model includes the security protocols and transactions. The model is used to compare a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks, including theft of a private key and denial of service were modelled to examine the vulnerabilities. The executable model shows that security protocols and transactions can be effectively simulated in order to design improvements to withstand different types of security attacks.
137-151
Bushager, Aisha
a2594e87-349b-4fbf-b7fe-834974a51dfb
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0
Bushager, Aisha
a2594e87-349b-4fbf-b7fe-834974a51dfb
Zwolinski, Mark
adfcb8e7-877f-4bd7-9b55-7553b6cb3ea0

Bushager, Aisha and Zwolinski, Mark (2014) Evaluating system security using Transaction Level Modelling. Facta Universitatis-Series Electronics and Energetics, 27 (1), 137-151. (doi:10.2298/FUEE1401137B).

Record type: Article

Abstract

The design of secure systems requires the use of security analysis techniques. Security objectives have to be considered during the early stages of system development and design; an executable model will give the designer the advantage of exploring the vulnerabilities early, and therefore enhancing the system security. In this work we create an executable model of a smart card system using SystemC with the Transaction Level Modelling (TLM) extensions. The model includes the security protocols and transactions. The model is used to compare a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks, including theft of a private key and denial of service were modelled to examine the vulnerabilities. The executable model shows that security protocols and transactions can be effectively simulated in order to design improvements to withstand different types of security attacks.

This record has no associated files available for download.

More information

Published date: 2014

Identifiers

Local EPrints ID: 479159
URI: http://eprints.soton.ac.uk/id/eprint/479159
PURE UUID: e2649730-3af7-4e3e-9f84-11cc7e41dc91
ORCID for Mark Zwolinski: ORCID iD orcid.org/0000-0002-2230-625X

Catalogue record

Date deposited: 20 Jul 2023 16:40
Last modified: 18 Mar 2024 02:36

Export record

Altmetrics

Contributors

Author: Aisha Bushager
Author: Mark Zwolinski ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×