Dynamic Policies for Shared Cyber-Physical Infrastructures under Attack (DYPOSIT)
DYPOSIT investigates the problem of large, shared cyber physical systems under attack. The project considers the challenge of dynamically formulating and adapting security controls, rapidly and on-demand, in the face of unfolding attacks on a shared cyber physical system fabric integrating multiple applications run by a variety of stakeholders. This Chist-ERA project is being undertaken in collaboration with Bristol University, Lancaster University, Katholieke Universiteit Leuven, University College Cork and IMT Atlantique.
Publications
- Hallett, J., Foley, S. N., Manda, D., Gardiner, J., Jonckers, D., Joosen, W., & Rashid, A. (2022). Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures. In Critical Information Infrastructures Security - 17th International Conference, CRITIS 2022, Munich, Germany, September 14-16, 2022, Revised Selected Papers (Vol. 13723, pp. 9–26). Springer. Retrieved from https://simonnfoley.github.io/pubs/critis2022.pdf [link]
- Neville, U. M., & Foley, S. N. (2018). Reasoning About Firewall Policies Through Refinement and Composition. Journal of Computer Security, 26(2), 207–254. Retrieved from https://simonnfoley.github.io/pubs/jcs2018.pdf [link]
- Pieczul, O., Foley, S. N., & Zurko, M. E. (2017). Developer-centered security and the symmetry of ignorance. In New Security Paradigms Workshop (NSPW 2017). Retrieved from https://simonnfoley.github.io/pubs/nspw2017.pdf [link]
- Foley, S. N. (2017). Getting security objectives wrong: a cautionary tale of an Industrial Control System. In International Workshop on Security Protocols. Retrieved from https://simonnfoley.github.io/pubs/spw2017.pdf [link]
- Neville, U., & Foley, S. N. (2016). Reasoning About Firewall Policies Through Refinement and Composition. In IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec2016). Retrieved from https://simonnfoley.github.io/pubs/dbsec2016-FW.pdf [link]
- Pieczul, O., & Foley, S. N. (2016). The evolution of a security control. In International Workshop on Security Protocols, to appear. Retrieved from https://simonnfoley.github.io/pubs/secprot2016.pdf [link]