ogy and associated tools in the context of cyber threat
analysis. The proposed modeling language satisfies
the intention of highlighting the attack surfaces in a
system model. The framework includes a methodol-
ogy for the development of Pimca models. The asso-
ciated tools in the framework allow developing Pimca
models and integrating then with other security analy-
sis artifacts for the development of a security solu-
tion. The approach was evaluated using two use cases,
which emphasized the system modeling along with
the attack surface deduction and refinement enabled
by the Pimca DSL and workbench. In future, we plan
to extend the Pimca DSL with behavioral primitives
which will enable dynamic attack scenario enactment
based on vulnerability databases and realistic system
configurations.
ACKNOWLEDGMENTS
We thank the French ministry of the armed forces and
the DGA for funding this research.
REFERENCES
Dolev, D. and Yao, A. C. (1981). On the security of public
key protocols. In 22nd Annual Symposium on Founda-
tions of Computer Science, SFCS ’81, pages 350–357.
IEEE Computer Society.
Drouot, B. and Champeau, J. (2019). Model federation
based on role modeling. In 7th International Con-
ference on Model-Driven Engineering and Software
Development, MODELSWARD 2019, pages 72–83.
Farrell, M., Bradbury, M., Fisher, M., Dennis, L., Dixon,
C., Yuan, H., and Maple, C. (2019). Using Threat
Analysis Techniques to Guide Formal Verification:
A Case Study of Cooperative Awareness Messages,
pages 471–490. Springer.
Golra, F. R., Beugnard, A., Dagnat, F., Guerin, S., and
Guychard, C. (2016). Addressing modularity for het-
erogeneous multi-model systems using model feder-
ation. In Companion Proceedings of the 15th Inter-
national Conference on Modularity, MODULARITY
Companion 2016, pages 206–211. ACM.
Jajodia, S., Ghosh, A. K., Swarup, V., Wang, C., and
Wang, X. S. (2011). Moving target defense: creating
asymmetric uncertainty for cyber threats, volume 54.
Springer Science & Business Media.
Khan, R., McLaughlin, K., Laverty, D., and Sezer, S.
(2017). STRIDE-based threat modeling for cyber-
physical systems. In 2017 IEEE PES Innovative
Smart Grid Technologies Conference Europe (ISGT-
Europe), pages 1–6.
Kohnfelder, L. and Garg, P. (1999). The threats to our
products. Microsoft Interface, Microsoft Corporation,
page 33.
Lee, J., Bagheri, B., and Kao, H.-A. (2015). A cyber-
physical systems architecture for industry 4.0-based
manufacturing systems. Manufacturing letters, 3:18–
23.
Manadhata, P. K. and Wing, J. M. (2011). An attack surface
metric. IEEE Transactions on Software Engineering,
37(3):371–386.
Peterson, E. (2016). Dagger: Modeling and visualization
for mission impact situation awareness. In MILCOM
2016-2016 IEEE Military Communications Confer-
ence, pages 25–30. IEEE.
Rocchetto, M. and Tippenhauer, N. O. (2016). CPDY: Ex-
tending the Dolev-Yao attacker with physical-layer in-
teractions. Lecture Notes in Computer Science, pages
175––192.
Schaller, P., Schmidt, B., Basin, D., and Capkun, S. (2009).
Modeling and verifying physical properties of security
protocols for wireless networks. In 22nd IEEE Com-
puter Security Foundations Symposium, pages 109–
123.
Siponen, M. and Willison, R. (2009). Information security
management standards: Problems and solutions. In-
formation & Management, 46(5):267 – 270.
Steinmetzer, D., Schulz, M., and Hollick, M. (2015). Lock-
picking physical layer key exchange: Weak adversary
models invite the thief. In 8th ACM Conference on
Security & Privacy in Wireless and Mobile Networks,
WiSec ’15, pages 1:1–1:11. ACM.
Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J. C., Me-
neely, A., and Williams, L. (2018). Attack surface
definitions: A systematic literature review. Informa-
tion and Software Technology, 104:94–103.
Xu, J., Guo, P., Zhao, M., Erbacher, R. F., Zhu, M., and Liu,
P. (2014). Comparing different moving target defense
techniques. In First ACM Workshop on Moving Target
Defense, pages 97–107. ACM.
Zhuang, R., DeLoach, S. A., and Ou, X. (2014). Towards a
theory of moving target defense. In First ACM Work-
shop on Moving Target Defense, pages 31–40. ACM.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
348