Run-time threat models for systematic and continuous risk assessment

被引:0
|
作者
Verreydt, Stef [1 ]
Van Landuyt, Dimitri [1 ,2 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, DistriNet, Celestijnenlaan 200A, B-3001 Heverlee, Belgium
[2] Katholieke Univ Leuven, Fac Econ & Business FEB, LIRIS, Naamsestr 69, B-3000 Leuven, Belgium
基金
欧盟地平线“2020”;
关键词
Threat modeling; risk assessment; digital twin; security-by-design; SOFTWARE SYSTEMS; SECURITY;
D O I
10.1007/s10270-024-01242-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Threat modeling involves systematically assessing the likelihood and potential impact of diverse security threat scenarios. Existing threat modeling approaches and tools act at the level of a software architecture or design (e.g., a data flow diagram), at the level of abstract system elements. These approaches, however, do not allow more in-depth analysis that takes into account concrete instances and configurations of these elements. This lack of expressiveness-as threats that require articulation at the level of instances cannot be expressed nor managed properly-hinders systematic risk calculation-as risks cannot be expressed and estimated in terms of instance-level properties. In this paper, we present a novel threat modeling approach that supports modeling complex systems at two distinct levels: (i) the design model defines the classes and entity types in the system, and (ii) the instance model specifies concrete instances and their properties. This innovation allows systematically calculating broader risk estimates at the design level, yet also performing more refined analysis in terms of more precise risk values at the instance level. Moreover, the ability to assess instance-level risks serves as an enabler for run-time continuous threat and risk (re-)assessment, and risk-adaptive security in general. We evaluate this approach in a prototype and through simulation of the dynamics of a realistic IoT-based system, a smart traffic application that involves vehicles and other infrastructural elements such as smart traffic lights. In these efforts, we demonstrate the practical feasibility of the approach, and we quantify the performance cost of maintaining a threat model at run-time, taking into account the time to perform risk assessment.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles
    Benyahya, Meriem
    Lenard, Teri
    Collen, Anastasija
    Nijdam, Niels Alexander
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [22] Android Run-time Permission Exploitation User Awareness by Means of Formal Methods
    Fasano, Fausto
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 804 - 814
  • [23] RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection
    Wang, Jian
    Li, Ying
    INFORMATION, 2021, 12 (04)
  • [24] Chaining Digital Services: Challenges to Investigate Cyber-Attacks at Run-Time
    Repetto, Matteo
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (05) : 88 - 94
  • [25] A study of run-time behavioral evolution of benign versus malicious apps in android
    Cai, Haipeng
    Fu, Xiaoqin
    Hamou-Lhadj, Abdelwahab
    INFORMATION AND SOFTWARE TECHNOLOGY, 2020, 122
  • [26] Securing Industrial Cyber-Physical Systems: A Run-Time Multilayer Monitoring
    Khan, Muhammad Taimoor
    Tomic, Ivana
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (09) : 6251 - 6259
  • [27] Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security
    Oh, Mi-Kyung
    Lee, Sangjae
    Kang, Yousung
    Choi, Dooho
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2020, 66 (01) : 11 - 21
  • [28] Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection
    Mohd, Bassam J.
    Abed, Sa'ed
    Hayajneh, Thaier
    Alshayeji, Mohammad H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2689 - 2704
  • [29] Risk Identification: From Requirements to Threat Models
    Wirtz, Roman
    Heisel, Maritta
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 385 - 396
  • [30] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113