Run-time threat models for systematic and continuous risk assessment

被引:0
作者
Verreydt, Stef [1 ]
Van Landuyt, Dimitri [1 ,2 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, DistriNet, Celestijnenlaan 200A, B-3001 Heverlee, Belgium
[2] Katholieke Univ Leuven, Fac Econ & Business FEB, LIRIS, Naamsestr 69, B-3000 Leuven, Belgium
基金
欧盟地平线“2020”;
关键词
Threat modeling; risk assessment; digital twin; security-by-design; SOFTWARE SYSTEMS; SECURITY;
D O I
10.1007/s10270-024-01242-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Threat modeling involves systematically assessing the likelihood and potential impact of diverse security threat scenarios. Existing threat modeling approaches and tools act at the level of a software architecture or design (e.g., a data flow diagram), at the level of abstract system elements. These approaches, however, do not allow more in-depth analysis that takes into account concrete instances and configurations of these elements. This lack of expressiveness-as threats that require articulation at the level of instances cannot be expressed nor managed properly-hinders systematic risk calculation-as risks cannot be expressed and estimated in terms of instance-level properties. In this paper, we present a novel threat modeling approach that supports modeling complex systems at two distinct levels: (i) the design model defines the classes and entity types in the system, and (ii) the instance model specifies concrete instances and their properties. This innovation allows systematically calculating broader risk estimates at the design level, yet also performing more refined analysis in terms of more precise risk values at the instance level. Moreover, the ability to assess instance-level risks serves as an enabler for run-time continuous threat and risk (re-)assessment, and risk-adaptive security in general. We evaluate this approach in a prototype and through simulation of the dynamics of a realistic IoT-based system, a smart traffic application that involves vehicles and other infrastructural elements such as smart traffic lights. In these efforts, we demonstrate the practical feasibility of the approach, and we quantify the performance cost of maintaining a threat model at run-time, taking into account the time to perform risk assessment.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] Risk assessment for asteroid impact threat scenarios
    Wheeler, Lorien
    Dotson, Jessie
    Aftosmis, Michael
    Coates, Ashley
    Chomette, Gregoire
    Mathias, Donovan
    ACTA ASTRONAUTICA, 2024, 216 : 468 - 487
  • [32] Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies
    Zografopoulos, Ioannis
    Ospina, Juan
    Liu, Xiaorui
    Konstantinou, Charalambos
    IEEE ACCESS, 2021, 9 : 29775 - 29818
  • [33] Dynamically Partitioning Workflow over Federated Clouds for Optimising the Monetary Cost and Handling Run-Time Failures
    Wen, Zhenyu
    Qasha, Rawaa
    Li, Zequn
    Ranjan, Rajiv
    Watson, Paul
    Romanovsky, Alexander
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1093 - 1107
  • [34] Towards Automated Threat-Based Risk Assessment for Cyber Security in Smarthomes
    Pandey, Pankaj
    Collen, Anastasija
    Nijdam, Niels
    Anagnostopoulos, Marios
    Katsikas, Sokratis
    Konstantas, Dimitri
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 839 - 844
  • [35] SPARTA: Security & Privacy Architecture through Risk-driven Threat Assessment
    Sion, Laurens
    Van Landuyt, Dimitri
    Yskout, Koen
    Joosen, Wouter
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2018), 2018, : 89 - 92
  • [36] A Case Study of Performance Degradation Attributable to Run-Time Bounds Checks on C++ Vector Access
    Flater, David
    Guthrie, William F.
    JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2013, 118 : 260 - 279
  • [37] A Run-Time Framework for Ensuring Zero-Trust State of Client's Machines in Cloud Environment
    Jha, Devki Nandan
    Lenton, Graham
    Asker, James
    Blundell, David
    Higgins, Martin
    Wallom, David C. H.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2025, 13 (01) : 61 - 74
  • [38] Studying users' adaptation to Android's run-time fine-grained access control system
    Andriotis, Panagiotis
    Stringhini, Gianluca
    Sasse, Martina Angela
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 31 - 43
  • [39] CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment
    Davis, Brooks
    Watson, Robert N. M.
    Richardson, Alexander
    Neumann, Peter G.
    Moore, Simon W.
    Baldwin, John
    Chisnall, David
    Clarke, James
    Filardo, Nathaniel Wesley
    Gudka, Khilan
    Joannou, Alexandre
    Laurie, Ben
    Markettos, A. Theodore
    Maste, J. Edward
    Mazzinghi, Alfredo
    Napierala, Edward Tomasz
    Norton, Robert M.
    Roe, Michael
    Sewell, Peter
    Son, Stacey
    Woodruff, Jonathan
    TWENTY-FOURTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXIV), 2019, : 379 - 393
  • [40] Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
    Granata, Daniele
    Rak, Massimiliano
    Mallouli, Wissam
    IEEE ACCESS, 2023, 11 : 129788 - 129804