Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Security Verification of Third Party Design Files in Manufacturing

Sichere Verifikation von Konstruktionsdaten dritter Parteien in der Produktion
: Giehl, Alexander; Wiedermann, Norbert

Postprint urn:nbn:de:0011-n-5251084 (875 KByte PDF)
MD5 Fingerprint: 6e97644c600ce317ff793be843ee1671
© ACM This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution.
Created on: 21.12.2018

Association for Computing Machinery -ACM-:
ICCAE 2018, Proceedings of the 10th International Conference on Computer and Automation Engineering : Brisbane, Australia, February 24 - 26, 2018
New York: ACM, 2018
ISBN: 978-1-4503-6410-2
International Conference on Computer and Automation Engineering (ICCAE) <10, 2018, Brisbane>
Bundesministerium für Bildung und Forschung BMBF
16KIS0324; IUNO
Conference Paper, Electronic Publication
Fraunhofer AISEC ()
Security; Manufacturing; Modeling; Graph-Based Analysis; Production Planning; Industrie 4.0

Customer-individual production in manufacturing is a current trend related to the Industrie 4.0 paradigm. Creation of design files by the customers is becoming more frequent. These design files are typically generated outside the company boundaries and then transferred to the organization where they are eventually processed and scheduled for production. From a security perspective, this introduces new attack vectors targeting producing companies. Design files with malicious configuration parameters can threaten the availability of the manufacturing plant resulting in financial risks and can even cause harm to humans. Human verification of design files is error-prone why an automated solution is required. A graph-theoretic modeling framework for machine tools capable of verifying the sec urity of product designs is proposed. This framework is used to model an exemplary production process implemented in a wood processing plant based on the experiences of a real-world case study. Simulation of the modeled scenario shows the feasibility of the framework. Apart from security verification, the approach can be adopted to decide if a product design can be manufactured with a given set of machine tools.