A descriptive study of assumptions in STRIDE security threat modeling

被引:14
|
作者
Van Landuyt, Dimitri [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, Imec DistriNet, Heverlee, Belgium
来源
SOFTWARE AND SYSTEMS MODELING | 2022年 / 21卷 / 06期
关键词
Threat modeling; Security architecture; Secure development life-cycle (SDLC); STRIDE; Security assumptions; Architecture knowledge management;
D O I
10.1007/s10270-021-00941-7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the security requirements in the early stages of software development. Although they are an important source of architectural knowledge, assumptions made in this context are in practice left implicit or at best, documented informally in an unstructured textual format. As guidelines and best practices are lacking, the nature, purpose and impact of assumptions made in this context is generally not well understood. We present a descriptive study of in total 640 textual assumptions made in 96 STRIDE threat models of the same system. The study mainly focuses on the diversity in how assumptions are used in practice, in terms of (i) the role or function of these assumptions in the threat modeling process, (ii) the degree of coupling between the assumptions and the system under analysis, and (iii) the extent to which these assumptions are exclusively specific to security. We observe large differences on all three investigated aspects: practitioners use the mechanism of assumption-making for diverse purposes, but predominantly to exclude certain threats from further analysis, i.e. to scope the analysis effort by steering it away from threat scenarios that are considered less relevant up front. Based on our findings, we argue against the exclusive use of Data Flow Diagrams as the main basis for threat analysis, and in favor of integrating more expressive attacker and trust models which can co-evolve with the threat model and the system.
引用
收藏
页码:2311 / 2328
页数:18
相关论文
共 50 条
  • [1] A descriptive study of assumptions in STRIDE security threat modeling
    Dimitri Van Landuyt
    Wouter Joosen
    Software and Systems Modeling, 2022, 21 (6): : 2311 - 2328
  • [2] Enhancing Security in Ambient Intelligence: A STRIDE Threat Modeling Perspective
    Hossain, Md Ismail
    Hasan, Ragib
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [3] Improving Security Practices in Health Information Systems with STRIDE threat modeling
    Hossain, Md Ismail
    Hasan, Ragib
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [4] A descriptive study of assumptions made in LINDDUN privacy threat elicitation
    Van Landuyt, Dimitri
    Joosen, Wouter
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1280 - 1287
  • [5] A descriptive study of Microsoft's threat modeling technique
    Scandariato, Riccardo
    Wuyts, Kim
    Joosen, Wouter
    REQUIREMENTS ENGINEERING, 2015, 20 (02) : 163 - 180
  • [6] A descriptive study of Microsoft’s threat modeling technique
    Riccardo Scandariato
    Kim Wuyts
    Wouter Joosen
    Requirements Engineering, 2015, 20 : 163 - 180
  • [7] The study on resolutions of STRIDE threat model
    Yang, Zhimin
    Zhang, Zengguang
    PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 271 - 273
  • [8] STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems
    Al Asif, Md Rashid
    Hasan, Khondokar Fida
    Islam, Md Zahidul
    Khondoker, Rahamatullah
    2021 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2021,
  • [9] Online Banking Security Analysis based on STRIDE Threat Model
    Tong Xin
    Ban Xiaofang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 271 - 282
  • [10] STRIDE-Based Threat Modeling for MySQL Databases
    Sanfilippo, James
    Abegaz, Tamirat
    Payne, Bryson
    Salimi, Abi
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 2, 2020, 1070 : 368 - 378