security

SM-SIM: A Simulator for Analyzing Selfish Mining Attacks in Blockchain Systems

Selfish mining attacks threaten the tamper-resistance of blockchain systems with consensus mechanisms based on proof-of-work and probabilistic finality. Optimizing blockchain system configurations can mitigate these attacks. This, however, requires …

Analyzing Cyclic Data Flow Diagrams Regarding Information Security

Data flow diagrams are commonly used in system design to represent data processing and exchange. They are valuable in security analysis due to their applicability in assessing information security-related properties like confidentiality. However, …

Architecture-based Propagation Analyses Regarding Security

In our modern world, the ever-expanding exchange of data and the increased complexity of interconnected software systems make software security challenging. Ideally, security concerns are already addressed early, as discussed with security by design. …

Designing Automotive Case Studies for Architectural Security Analyses

Digitalization is one of the biggest drivers of advancements in the modern automotive domain. The resulting increase in communication is leading to a more intensive exchange of data and the opening up of for merly closed systems. This raises …