A Systematic Process-Model-Based Approach for Synthesizing Attacks and Evaluating Them
Citation
H. Phan, G. Avrunin, M. Bishop, L. Clarke, and L. Osterweil, “A Systematic Process-Model-Based Approach for Synthesizing Attacks and Evaluating Them,” Proceedings of the 2012 USENIX/ACCURATE Electronic Voting Technology Workshop (Aug. 2012).
Paper
- Published version web page, free at USENIX EVT/WOTE 12 web site: [URL]
- Published version:
- Local: [PDF] [PS]
- UC Repository: [eScholarship]
Abstract
This paper describes a systematic approach for incrementally improving the security of election processes by using a model of the process to develop attack plans and then incorporating each plan into the process model to determine if it can complete successfully. More specifically, our approach first applies fault tree analysis to a detailed election process model to find process vulnerabilities that an adversary might be able to exploit, thus identifying potential attacks. Based on such a vulnerability, we then model an attack plan and formally evaluate the process's robustness against such a plan. If appropriate, we also propose modifications to the process and then reapply the approach to ensure that the attack will not succeed. Although the approach is described in the context of the election domain, it would also seem to be effective in analyzing process vulnerability in other domains.
Bibliographic Information: [BibTeX]
[RIS]
URI: https://www.usenix.org/conference/evtwote12/workshop-program/presentation/phan