Changes
On August 4, 2023 at 8:53:43 AM UTC, admin:
-
No fields were updated. See the metadata diff for more details.
f | 1 | { | f | 1 | { |
2 | "author": "Walter, Maximilian", | 2 | "author": "Walter, Maximilian", | ||
3 | "author_email": "", | 3 | "author_email": "", | ||
4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
5 | "doi": "10.35097/1529", | 5 | "doi": "10.35097/1529", | ||
6 | "doi_date_published": "2023", | 6 | "doi_date_published": "2023", | ||
7 | "doi_publisher": "", | 7 | "doi_publisher": "", | ||
8 | "doi_status": "True", | 8 | "doi_status": "True", | ||
9 | "extra_authors": [ | 9 | "extra_authors": [ | ||
10 | { | 10 | { | ||
11 | "extra_author": "Heinrich, Robert", | 11 | "extra_author": "Heinrich, Robert", | ||
12 | "orcid": "" | 12 | "orcid": "" | ||
13 | }, | 13 | }, | ||
14 | { | 14 | { | ||
15 | "extra_author": "Reussner, Ralf", | 15 | "extra_author": "Reussner, Ralf", | ||
16 | "orcid": "" | 16 | "orcid": "" | ||
17 | } | 17 | } | ||
18 | ], | 18 | ], | ||
19 | "groups": [], | 19 | "groups": [], | ||
20 | "id": "2070b125-cfec-4cb0-8f38-5967abc3d918", | 20 | "id": "2070b125-cfec-4cb0-8f38-5967abc3d918", | ||
21 | "isopen": false, | 21 | "isopen": false, | ||
22 | "license_id": "Other", | 22 | "license_id": "Other", | ||
23 | "license_title": "Other", | 23 | "license_title": "Other", | ||
24 | "metadata_created": "2023-08-04T08:51:00.372459", | 24 | "metadata_created": "2023-08-04T08:51:00.372459", | ||
t | 25 | "metadata_modified": "2023-08-04T08:52:09.450442", | t | 25 | "metadata_modified": "2023-08-04T08:53:43.062021", |
26 | "name": "rdr-doi-10-35097-1529", | 26 | "name": "rdr-doi-10-35097-1529", | ||
27 | "notes": "TechnicalRemarks: # Dataset for Attacker Propagation\r\n## | 27 | "notes": "TechnicalRemarks: # Dataset for Attacker Propagation\r\n## | ||
28 | Content\r\nThere are 4 folders:\r\n* **binary** for an excutable | 28 | Content\r\nThere are 4 folders:\r\n* **binary** for an excutable | ||
29 | version\r\n* **effort_reduction** data-sheet for the effort | 29 | version\r\n* **effort_reduction** data-sheet for the effort | ||
30 | calculation\r\n* **evaluationmodel** PCM models of the 3 case studies | 30 | calculation\r\n* **evaluationmodel** PCM models of the 3 case studies | ||
31 | and expected results\r\n* **source** source for the analysis and the | 31 | and expected results\r\n* **source** source for the analysis and the | ||
32 | metamodel\r\n\r\n## Executing with the binary\r\nWe bundled a eclipse | 32 | metamodel\r\n\r\n## Executing with the binary\r\nWe bundled a eclipse | ||
33 | product, which can be used to start our analysis and view the models. | 33 | product, which can be used to start our analysis and view the models. | ||
34 | It should be configured that it automatically opens a workspace with | 34 | It should be configured that it automatically opens a workspace with | ||
35 | the necessary projects loaded. In case that won't happen, the projects | 35 | the necessary projects loaded. In case that won't happen, the projects | ||
36 | can be manually loaded over the source folder and there | 36 | can be manually loaded over the source folder and there | ||
37 | rg.palladiosimulator.pcm.confidentiality.context.analysis.testmodels/* | 37 | rg.palladiosimulator.pcm.confidentiality.context.analysis.testmodels/* | ||
38 | or for the automatic test | 38 | or for the automatic test | ||
39 | identiality-Analysis/tests/edu.kit.ipd.sdq.kamp4attack.tests/*\r\nHere | 39 | identiality-Analysis/tests/edu.kit.ipd.sdq.kamp4attack.tests/*\r\nHere | ||
40 | we describe the step to execute the binary:\r\n* Unzip the version of | 40 | we describe the step to execute the binary:\r\n* Unzip the version of | ||
41 | your Operating System\r\n * **Attention:** The MAC-Version might | 41 | your Operating System\r\n * **Attention:** The MAC-Version might | ||
42 | not work, because of MACOS security features. In that case | 42 | not work, because of MACOS security features. In that case | ||
43 | [this](https://sdqweb.ipd.kit.edu/wiki/PCM_Installation#Mac_OS_X) | 43 | [this](https://sdqweb.ipd.kit.edu/wiki/PCM_Installation#Mac_OS_X) | ||
44 | might help. If not, you can still use the update site or manually | 44 | might help. If not, you can still use the update site or manually | ||
45 | install the tooling, but you are required to solve the dependencies | 45 | install the tooling, but you are required to solve the dependencies | ||
46 | manually.\r\n * We also provide an vm image for the tooling in the | 46 | manually.\r\n * We also provide an vm image for the tooling in the | ||
47 | binary folder and there the vm folder\r\n * In the VM the Procuct | 47 | binary folder and there the vm folder\r\n * In the VM the Procuct | ||
48 | is in the home directory under AttackerPropagation\r\n * The | 48 | is in the home directory under AttackerPropagation\r\n * The | ||
49 | credentials for the vm are:\r\n * User: icsa\r\n * | 49 | credentials for the vm are:\r\n * User: icsa\r\n * | ||
50 | Password: icsa\r\n * Root-Password: icsa\r\n* Start the | 50 | Password: icsa\r\n * Root-Password: icsa\r\n* Start the | ||
51 | Application by executing the *PalladioBench* binary (not the eclipse | 51 | Application by executing the *PalladioBench* binary (not the eclipse | ||
52 | one!)\r\n* After the load screen you should see 3 Projects in the | 52 | one!)\r\n* After the load screen you should see 3 Projects in the | ||
53 | Modelviewer on the left side:\r\n * | 53 | Modelviewer on the left side:\r\n * | ||
54 | edu.kit.ipd.sdq.kamp4attack.tests\r\n * | 54 | edu.kit.ipd.sdq.kamp4attack.tests\r\n * | ||
55 | lladiosimulator.pcm.confidentiality.context.analysis.testframework\r\n | 55 | lladiosimulator.pcm.confidentiality.context.analysis.testframework\r\n | ||
56 | * | 56 | * | ||
57 | palladiosimulator.pcm.confidentiality.context.analysis.testmodels\r\n* | 57 | palladiosimulator.pcm.confidentiality.context.analysis.testmodels\r\n* | ||
58 | The models are stored in | 58 | The models are stored in | ||
59 | alladiosimulator.pcm.confidentiality.context.analysis.testmodels*.\r\n | 59 | alladiosimulator.pcm.confidentiality.context.analysis.testmodels*.\r\n | ||
60 | * By clicking on the arrow before the project you can see the | 60 | * By clicking on the arrow before the project you can see the | ||
61 | content.\r\n * The evaluation models are stored in the following | 61 | content.\r\n * The evaluation models are stored in the following | ||
62 | folders:\r\n * models/powerGrid\r\n * | 62 | folders:\r\n * models/powerGrid\r\n * | ||
63 | models/targetBreach\r\n * models/travelplanner\r\n * Each | 63 | models/targetBreach\r\n * models/travelplanner\r\n * Each | ||
64 | folder contains the pcm models (allocation, reposity, | 64 | folder contains the pcm models (allocation, reposity, | ||
65 | resourceenvironment, system, usagemodel), the attackermodel | 65 | resourceenvironment, system, usagemodel), the attackermodel | ||
66 | (*.attacker), the access control model (*.context), the result model | 66 | (*.attacker), the access control model (*.context), the result model | ||
67 | (*.kamp4attackmodificationmarks) and eclipse launchconfig | 67 | (*.kamp4attackmodificationmarks) and eclipse launchconfig | ||
68 | (*.launch)\r\n * with the launch config the scenario can be | 68 | (*.launch)\r\n * with the launch config the scenario can be | ||
69 | executed, by opening the context menu (normally right clock) and | 69 | executed, by opening the context menu (normally right clock) and | ||
70 | clicking \"Run as\"\r\n * for a description of the models see Model | 70 | clicking \"Run as\"\r\n * for a description of the models see Model | ||
71 | Description\r\n* Additionally the accuracy tests can be executed | 71 | Description\r\n* Additionally the accuracy tests can be executed | ||
72 | automatically as Junit-Plugin-Test (only in the Linux binary):\r\n | 72 | automatically as Junit-Plugin-Test (only in the Linux binary):\r\n | ||
73 | * Open edu.kit.ipd.sdq.kamp4attack.tests project\r\n * Navigate in | 73 | * Open edu.kit.ipd.sdq.kamp4attack.tests project\r\n * Navigate in | ||
74 | the src folder to *edu.kit.ipd.sdq.kamp4attack.tests.casestudies* and | 74 | the src folder to *edu.kit.ipd.sdq.kamp4attack.tests.casestudies* and | ||
75 | *edu.kit.ipd.sdq.kamp4attack.tests.casestudies.travelplanner*.\r\n | 75 | *edu.kit.ipd.sdq.kamp4attack.tests.casestudies.travelplanner*.\r\n | ||
76 | * By opening the context menu (right click usually) and \"Run as\" | 76 | * By opening the context menu (right click usually) and \"Run as\" | ||
77 | Junit-**Plugin**-Test\r\n * It is important to execute the tests as | 77 | Junit-**Plugin**-Test\r\n * It is important to execute the tests as | ||
78 | Plugin Tests since otherwise the dependencies can't be solved\r\n * | 78 | Plugin Tests since otherwise the dependencies can't be solved\r\n * | ||
79 | For Windows and Mac-User they can run the test by executing `mvn clean | 79 | For Windows and Mac-User they can run the test by executing `mvn clean | ||
80 | verify` in *source/Palladio-Addons-ContextConfidentiality-Analysis/* | 80 | verify` in *source/Palladio-Addons-ContextConfidentiality-Analysis/* | ||
81 | or use the vm image in case maven does not work\r\n\r\n\r\n## | 81 | or use the vm image in case maven does not work\r\n\r\n\r\n## | ||
82 | Executing without the binaries\r\n* Build each source project with | 82 | Executing without the binaries\r\n* Build each source project with | ||
83 | maven\r\n* Projects generates an updatesite usually in the releng | 83 | maven\r\n* Projects generates an updatesite usually in the releng | ||
84 | folder in an folder ending with .updatesite\r\n* These updatesites | 84 | folder in an folder ending with .updatesite\r\n* These updatesites | ||
85 | need to be installed in an eclipse installation. An README can be find | 85 | need to be installed in an eclipse installation. An README can be find | ||
86 | in the source analysis source folder for the necessary | 86 | in the source analysis source folder for the necessary | ||
87 | dependencies\r\n\r\n## Model Descripton\r\n* Target Breach\r\n * in | 87 | dependencies\r\n\r\n## Model Descripton\r\n* Target Breach\r\n * in | ||
88 | folder targetBreach\r\n* Ukrainian Power Grid\r\n * in folder | 88 | folder targetBreach\r\n* Ukrainian Power Grid\r\n * in folder | ||
89 | powerGrid\r\n* TravelPlanner\r\n * in folder travelplanner\r\n * | 89 | powerGrid\r\n* TravelPlanner\r\n * in folder travelplanner\r\n * | ||
90 | Scenarios in folder *Attacker_Propagation_Accuracy*: \r\n 1. | 90 | Scenarios in folder *Attacker_Propagation_Accuracy*: \r\n 1. | ||
91 | An Empty Attacker model. The analysis has no attacker, therefore no | 91 | An Empty Attacker model. The analysis has no attacker, therefore no | ||
92 | propagation should happen\r\n 2. The attacker has no attack | 92 | propagation should happen\r\n 2. The attacker has no attack | ||
93 | therefore only the initial component is affected\r\n 3. The | 93 | therefore only the initial component is affected\r\n 3. The | ||
94 | attacker has no specific attack but has some stolen credential. | 94 | attacker has no specific attack but has some stolen credential. | ||
95 | Therefore, only the credentials are allowed for the propagation\r\n | 95 | Therefore, only the credentials are allowed for the propagation\r\n | ||
96 | 4. Propagations based on vulnerabilites. The attacker has attacks for | 96 | 4. Propagations based on vulnerabilites. The attacker has attacks for | ||
97 | mainly one attack step. To verify that each propagation types work\r\n | 97 | mainly one attack step. To verify that each propagation types work\r\n | ||
98 | 1. A Component to a Seff Propagation\r\n 2. A Component to | 98 | 1. A Component to a Seff Propagation\r\n 2. A Component to | ||
99 | Component Propagtion\r\n 3. The component compromises the | 99 | Component Propagtion\r\n 3. The component compromises the | ||
100 | resource it is deployed on\r\n 4. The component compromises | 100 | resource it is deployed on\r\n 4. The component compromises | ||
101 | a remote resource (not the one it is deployed on)\r\n 5. A | 101 | a remote resource (not the one it is deployed on)\r\n 5. A | ||
102 | linking Resource compromises a connected Resource container\r\n | 102 | linking Resource compromises a connected Resource container\r\n | ||
103 | 6. A linking Resource compromises a connected component\r\n | 103 | 6. A linking Resource compromises a connected component\r\n | ||
104 | 7. A resource compromises a connected component\r\n 8. A | 104 | 7. A resource compromises a connected component\r\n 8. A | ||
105 | resource compromises another connected resource\r\n 5. The | 105 | resource compromises another connected resource\r\n 5. The | ||
106 | attacker gains a new credential based on an attack, but can't take | 106 | attacker gains a new credential based on an attack, but can't take | ||
107 | full control of the Linking Resource\r\n 6. Tests whether the | 107 | full control of the Linking Resource\r\n 6. Tests whether the | ||
108 | AttackVector option is considered in the analysis\r\n 7. Tests | 108 | AttackVector option is considered in the analysis\r\n 7. Tests | ||
109 | whether the Privilege option is considered in the analysis\r\n\r\n## | 109 | whether the Privilege option is considered in the analysis\r\n\r\n## | ||
110 | Resultsmodel\r\nThe ids of the non pcm elements (ServiceRestrictions | 110 | Resultsmodel\r\nThe ids of the non pcm elements (ServiceRestrictions | ||
111 | and CompromisedData) might change for every run, since they are | 111 | and CompromisedData) might change for every run, since they are | ||
112 | dynamically calculated for each analysis step. However, this is not | 112 | dynamically calculated for each analysis step. However, this is not | ||
113 | problematic since they can identified by their other properties. | 113 | problematic since they can identified by their other properties. | ||
114 | \r\n\r\n## Further Information\r\nAdditional information and the | 114 | \r\n\r\n## Further Information\r\nAdditional information and the | ||
115 | current source code can be found at our Github repositories:\r\n* | 115 | current source code can be found at our Github repositories:\r\n* | ||
116 | .com/FluidTrust/Palladio-Addons-ContextConfidentiality-Metamodel)\r\n* | 116 | .com/FluidTrust/Palladio-Addons-ContextConfidentiality-Metamodel)\r\n* | ||
117 | b.com/FluidTrust/Palladio-Addons-ContextConfidentiality-Analysis)\r\n* | 117 | b.com/FluidTrust/Palladio-Addons-ContextConfidentiality-Analysis)\r\n* | ||
118 | ://github.com/FluidTrust/Palladio-Bench-Product-AttackerPropagation)", | 118 | ://github.com/FluidTrust/Palladio-Bench-Product-AttackerPropagation)", | ||
119 | "num_resources": 0, | 119 | "num_resources": 0, | ||
120 | "num_tags": 0, | 120 | "num_tags": 0, | ||
121 | "orcid": "0000-0003-0358-6644", | 121 | "orcid": "0000-0003-0358-6644", | ||
122 | "organization": { | 122 | "organization": { | ||
123 | "approval_status": "approved", | 123 | "approval_status": "approved", | ||
124 | "created": "2023-01-12T13:30:23.238233", | 124 | "created": "2023-01-12T13:30:23.238233", | ||
125 | "description": "RADAR (Research Data Repository) is a | 125 | "description": "RADAR (Research Data Repository) is a | ||
126 | cross-disciplinary repository for archiving and publishing research | 126 | cross-disciplinary repository for archiving and publishing research | ||
127 | data from completed scientific studies and projects. The focus is on | 127 | data from completed scientific studies and projects. The focus is on | ||
128 | research data from subjects that do not yet have their own | 128 | research data from subjects that do not yet have their own | ||
129 | discipline-specific infrastructures for research data management. ", | 129 | discipline-specific infrastructures for research data management. ", | ||
130 | "id": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | 130 | "id": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | ||
131 | "image_url": "radar-logo.svg", | 131 | "image_url": "radar-logo.svg", | ||
132 | "is_organization": true, | 132 | "is_organization": true, | ||
133 | "name": "radar", | 133 | "name": "radar", | ||
134 | "state": "active", | 134 | "state": "active", | ||
135 | "title": "RADAR", | 135 | "title": "RADAR", | ||
136 | "type": "organization" | 136 | "type": "organization" | ||
137 | }, | 137 | }, | ||
138 | "owner_org": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | 138 | "owner_org": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | ||
139 | "private": false, | 139 | "private": false, | ||
140 | "production_year": "2022", | 140 | "production_year": "2022", | ||
141 | "publication_year": "2023", | 141 | "publication_year": "2023", | ||
142 | "publishers": [ | 142 | "publishers": [ | ||
143 | { | 143 | { | ||
144 | "publisher": "Karlsruhe Institute of Technology" | 144 | "publisher": "Karlsruhe Institute of Technology" | ||
145 | } | 145 | } | ||
146 | ], | 146 | ], | ||
147 | "relationships_as_object": [], | 147 | "relationships_as_object": [], | ||
148 | "relationships_as_subject": [], | 148 | "relationships_as_subject": [], | ||
149 | "repository_name": "RADAR (Research Data Repository)", | 149 | "repository_name": "RADAR (Research Data Repository)", | ||
150 | "resources": [], | 150 | "resources": [], | ||
151 | "services_used_list": "", | 151 | "services_used_list": "", | ||
152 | "source_metadata_created": "2023", | 152 | "source_metadata_created": "2023", | ||
153 | "source_metadata_modified": "", | 153 | "source_metadata_modified": "", | ||
154 | "state": "active", | 154 | "state": "active", | ||
155 | "subject_areas": [ | 155 | "subject_areas": [ | ||
156 | { | 156 | { | ||
157 | "subject_area_additional": "", | 157 | "subject_area_additional": "", | ||
158 | "subject_area_name": "Computer Science" | 158 | "subject_area_name": "Computer Science" | ||
159 | } | 159 | } | ||
160 | ], | 160 | ], | ||
161 | "tags": [], | 161 | "tags": [], | ||
162 | "title": "Dataset - architectural attack propagation analysis for | 162 | "title": "Dataset - architectural attack propagation analysis for | ||
163 | identifying confidentiality issues", | 163 | identifying confidentiality issues", | ||
164 | "type": "vdataset", | 164 | "type": "vdataset", | ||
165 | "url": "https://doi.org/10.35097/1529" | 165 | "url": "https://doi.org/10.35097/1529" | ||
166 | } | 166 | } |