Run-time threat models for systematic and continuous risk assessment

被引:0
|
作者
Verreydt, Stef [1 ]
Van Landuyt, Dimitri [1 ,2 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, DistriNet, Celestijnenlaan 200A, B-3001 Heverlee, Belgium
[2] Katholieke Univ Leuven, Fac Econ & Business FEB, LIRIS, Naamsestr 69, B-3000 Leuven, Belgium
基金
欧盟地平线“2020”;
关键词
Threat modeling; risk assessment; digital twin; security-by-design; SOFTWARE SYSTEMS; SECURITY;
D O I
10.1007/s10270-024-01242-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Threat modeling involves systematically assessing the likelihood and potential impact of diverse security threat scenarios. Existing threat modeling approaches and tools act at the level of a software architecture or design (e.g., a data flow diagram), at the level of abstract system elements. These approaches, however, do not allow more in-depth analysis that takes into account concrete instances and configurations of these elements. This lack of expressiveness-as threats that require articulation at the level of instances cannot be expressed nor managed properly-hinders systematic risk calculation-as risks cannot be expressed and estimated in terms of instance-level properties. In this paper, we present a novel threat modeling approach that supports modeling complex systems at two distinct levels: (i) the design model defines the classes and entity types in the system, and (ii) the instance model specifies concrete instances and their properties. This innovation allows systematically calculating broader risk estimates at the design level, yet also performing more refined analysis in terms of more precise risk values at the instance level. Moreover, the ability to assess instance-level risks serves as an enabler for run-time continuous threat and risk (re-)assessment, and risk-adaptive security in general. We evaluate this approach in a prototype and through simulation of the dynamics of a realistic IoT-based system, a smart traffic application that involves vehicles and other infrastructural elements such as smart traffic lights. In these efforts, we demonstrate the practical feasibility of the approach, and we quantify the performance cost of maintaining a threat model at run-time, taking into account the time to perform risk assessment.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Run-Time Enforcement of Nonsafety Policies
    Ligatti, Jay
    Bauer, Lujo
    Walker, David
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
  • [2] Expressive and Systematic Risk Assessments with Instance-Centric Threat Models
    Verreydt, Stef
    Van Landuyt, Dimitri
    Joosen, Wouter
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1450 - 1457
  • [3] Systematic literature review of threat modeling and risk assessment in ship cybersecurity
    Erbas, Muhammed
    Khalil, Shaymaa Mamdouh
    Tsiopoulos, Leonidas
    OCEAN ENGINEERING, 2024, 306
  • [4] Assessing Run-time Overhead of Securing Kepler
    Kim, Donghoon
    Vouk, Mladen A.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2016 (ICCS 2016), 2016, 80 : 2281 - 2286
  • [5] Run-time Attack Detection in Cryptographic APIs
    Focardi, Riccardo
    Squarcina, Marco
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 176 - 188
  • [6] Predicting Performance Anomalies in Software Systems at Run-time
    Zhao, Guoliang
    Hassan, Safwat
    Zou, Ying
    Truong, Derek
    Corbin, Toby
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (03)
  • [7] Threat modeling at run time: the case for reflective and adaptive threat management (NIER track)
    van Landuyt, Dimitri
    Pasquale, Liliana
    Sion, Laurens
    Joosen, Wouter
    2021 INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2021), 2021, : 203 - 209
  • [8] Risk Assessment Tool for Operation: from Threat Models to Risk Indicators
    Vefsnmo, Hanne
    Kjolle, Gerd
    Jakobsen, Sigurd H.
    Ciapessoni, Emanuele
    Cirio, Diego
    Pitto, Andrea
    2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [9] Run-time Selection of Security Algorithms For Networked Devices
    Taddeo, Antonio Vincenzo
    Ferrante, Alberto
    Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 92 - 96
  • [10] Run-time principals in information-flow type systems
    Tse, Stephen
    Zdancewic, Steve
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 30 (01):