eBiltegia

    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Mondragon Unibertsitatea's Institutional Policy on Open Access to scientific documents and teaching materials
    •   Mondragon Unibertsitatea's Institutional Open Access Policy for Research Data
    •   eBiltegia Digital Preservation Guidelines
    •   The Library compiles and disseminates your publications
    • Euskara
    • Español
    • English

xmlui.dri2xhtml.structural.fecyt

  • Contact Us
  • English 
    • Euskara
    • Español
    • English
  • About eBiltegia  
    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Mondragon Unibertsitatea's Institutional Policy on Open Access to scientific documents and teaching materials
    •   Mondragon Unibertsitatea's Institutional Open Access Policy for Research Data
    •   eBiltegia Digital Preservation Guidelines
    •   The Library compiles and disseminates your publications
  • Login
View Item 
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-Kongresuak
  • Kongresuak-Ingeniaritza
  • View Item
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-Kongresuak
  • Kongresuak-Ingeniaritza
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
Thumbnail
View/Open
How_to_Quantify_the_Security_Level_of_Embedded_Systems.pdf (613.8Kb)
Full record
Impact

Web of Science   

Google Scholar
Share
EmailLinkedinFacebookTwitter
Save the reference
Mendely

Zotero

untranslated

Mets

Mods

Rdf

Marc

Exportar a BibTeX
Title
How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics
Author
Garitano, Iñaki
Author (from another institution)
Longueira-Romerc, Angel
Iglesias, Rosa
González, David
Research Group
Análisis de datos y ciberseguridad
Other institutions
Ikerlan
Version
Postprint
Rights
© 2020 IEEE
Access
Open access
URI
https://hdl.handle.net/20.500.11984/5560
Publisher’s version
https://doi.org/10.1109/INDIN45582.2020.9442219
Published at
IEEE International Conference on Industrial Informatics (INDIN).  Vol. 2020-July. N. artículo. 9442219. Pp. 153-158, 2020
Publisher
IEEE
Keywords
Measurement
Embedded Systems
Conferences
Taxonomy ... [+]
Measurement
Embedded Systems
Conferences
Taxonomy
Software
Hardware
security [-]
Abstract
Embedded Systems (ES) development has been historically focused on functionality rather than security, and today it still applies in many sectors and applications. However, there is an increasing numb ... [+]
Embedded Systems (ES) development has been historically focused on functionality rather than security, and today it still applies in many sectors and applications. However, there is an increasing number of security threats over ES, and a successful attack could have economical, physical or even human consequences, since many of them are used to control critical applications. A standardized and general accepted security testing framework is needed to provide guidance, common reporting forms and the possibility to compare the results along the time. This can be achieved by introducing security metrics into the evaluation or assessment process. If carefully designed and chosen, metrics could provide a quantitative, repeatable and reproducible value that would reflect the level of security protection of the ES. This paper analyzes the features that a good security metric should exhibit, introduces a taxonomy for classifying them, and finally, it carries out a literature survey on security metrics for the security evaluation of ES. In this review, more than 500 metrics were collected and analyzed. Then, they were reduced to 169 metrics that have the potential to be applied to ES security evaluation. As expected, the 77.5% of them is related exclusively to software, and only the 0.6% of them addresses exclusively hardware security. This work aims to lay the foundations for constructing a security evaluation methodology that uses metrics so as to quantify the security level of an ES. [-]
Collections
  • Conferences - Engineering [423]

Browse

All of eBiltegiaCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished atThis CollectionBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished at

My Account

LoginRegister

Statistics

View Usage Statistics

Harvested by:

OpenAIREBASERecolecta

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace
 

 

Harvested by:

OpenAIREBASERecolecta

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace