Expressive and Systematic Risk Assessments with Instance-Centric Threat Models

被引:1
|
作者
Verreydt, Stef [1 ]
Van Landuyt, Dimitri [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, IMEC, DistriNet, Heverlee, Belgium
来源
38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023 | 2023年
关键词
Threat modeling; security-by-design; risk management;
D O I
10.1145/3555776.3577668
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A threat modeling exercise involves systematically assessing the likelihood and potential impact of diverse threat scenarios. As threat modeling approaches and tools act at the level of a software architecture or design (e.g., a data flow diagram), they consider threat scenarios at the level of classes or types of system elements. More fine-grained analyses in terms of concrete instances of these elements are typically not conducted explicitly nor rigorously. This hinders (i) expressiveness, as threats that require articulation at the level of instances can not be expressed nor managed properly, and (ii) systematic risk calculation, as risk cannot be expressed and estimated with respect to instance-level properties. In this paper, we present a novel threat modeling approach that acts on two layers: (i) the design layer defines the classes and entity types in the system, and (ii) the instance layer models concrete instances and their properties. This, in turn, allows both rough risk estimates at the design-level, and more precise ones at the instance-level. Motivated by a connected vehicles application, we present the key challenges, the modeling approach and a tool prototype. The presented approach is a key enabler for more continuous and frequent threat (re-)assessment, the integration of threat analysis models in CI/CD pipelines and agile development environments on the one hand (development perspective), and in risk management approaches at run-time (operations perspective).
引用
收藏
页码:1450 / 1457
页数:8
相关论文
共 12 条
  • [1] Run-time threat models for systematic and continuous risk assessment
    Verreydt, Stef
    Van Landuyt, Dimitri
    Joosen, Wouter
    SOFTWARE AND SYSTEMS MODELING, 2024,
  • [2] Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment
    Potteiger, Bradley
    Martins, Goncalo
    Koutsoukos, Xenofon
    SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 99 - 108
  • [3] Systematic literature review of threat modeling and risk assessment in ship cybersecurity
    Erbas, Muhammed
    Khalil, Shaymaa Mamdouh
    Tsiopoulos, Leonidas
    OCEAN ENGINEERING, 2024, 306
  • [4] Risk Identification: From Requirements to Threat Models
    Wirtz, Roman
    Heisel, Maritta
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 385 - 396
  • [5] The systematic risk estimation models: A different perspective
    Le Tan Phuoc
    Chinh Duc Pham
    HELIYON, 2020, 6 (02)
  • [6] Risk prediction models for breast cancer: a systematic review
    Zheng, Yadi
    Li, Jiang
    Wu, Zheng
    Li, He
    Cao, Maomao
    Li, Ni
    He, Jie
    BMJ OPEN, 2022, 12 (07):
  • [7] Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach
    Granata, Daniele
    Rak, Massimiliano
    Mallouli, Wissam
    IEEE ACCESS, 2023, 11 : 129788 - 129804
  • [8] Are In Vitro Cytotoxicity Assessments of Environmental Samples Useful for Characterizing the Risk of Exposure to Multiple Contaminants at the Workplace? A Systematic Review
    Viegas, Carla
    Pena, Pedro
    Gomes, Bianca
    Dias, Marta
    Aranha Caetano, Liliana
    Viegas, Susana
    TOXICS, 2022, 10 (02)
  • [9] Occupational health and safety risk assessment: A systematic literature review of models, methods, and applications
    Liu, Ran
    Liu, Hu-Chen
    Shi, Hua
    Gu, Xiuzhu
    SAFETY SCIENCE, 2023, 160
  • [10] A systematic literature review of multicriteria and multi-objective models applied in risk management
    Teixeira de Almeida, Adiel
    Hazin Alencar, Marcelo
    Vitelli Garcez, Thalles
    Jose Pires Ferreira, Rodrigo
    IMA JOURNAL OF MANAGEMENT MATHEMATICS, 2017, 28 (02) : 153 - 184