A descriptive study of assumptions in STRIDE security threat modeling

被引:14
|
作者
Van Landuyt, Dimitri [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, Imec DistriNet, Heverlee, Belgium
来源
SOFTWARE AND SYSTEMS MODELING | 2022年 / 21卷 / 06期
关键词
Threat modeling; Security architecture; Secure development life-cycle (SDLC); STRIDE; Security assumptions; Architecture knowledge management;
D O I
10.1007/s10270-021-00941-7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security threat modeling involves the systematic elicitation of plausible threat scenarios, and leads to the identification and articulation of the security requirements in the early stages of software development. Although they are an important source of architectural knowledge, assumptions made in this context are in practice left implicit or at best, documented informally in an unstructured textual format. As guidelines and best practices are lacking, the nature, purpose and impact of assumptions made in this context is generally not well understood. We present a descriptive study of in total 640 textual assumptions made in 96 STRIDE threat models of the same system. The study mainly focuses on the diversity in how assumptions are used in practice, in terms of (i) the role or function of these assumptions in the threat modeling process, (ii) the degree of coupling between the assumptions and the system under analysis, and (iii) the extent to which these assumptions are exclusively specific to security. We observe large differences on all three investigated aspects: practitioners use the mechanism of assumption-making for diverse purposes, but predominantly to exclude certain threats from further analysis, i.e. to scope the analysis effort by steering it away from threat scenarios that are considered less relevant up front. Based on our findings, we argue against the exclusive use of Data Flow Diagrams as the main basis for threat analysis, and in favor of integrating more expressive attacker and trust models which can co-evolve with the threat model and the system.
引用
收藏
页码:2311 / 2328
页数:18
相关论文
共 50 条
  • [41] THREAT MODELING FRAMEWORK FOR SECURITY OF UNIFIED STORAGES IN PRIVATE DATA CENTERS
    Hussain, Syed Muzammil
    Islam, M. Hasan
    Ali, Atif
    Nazir, Muhammad Usama
    2020 IEEE 22ND CONFERENCE ON BUSINESS INFORMATICS (CBI 2020), VOL 2: RESEARCH-IN-PROGRESS AND WORKSHOP PAPERS, 2020, : 111 - 120
  • [42] Security Evaluation of an Airbag-ECU by Reusing Threat Modeling Artefacts
    Duerrwang, Juergen
    Braun, Johannes
    Rumez, Marcel
    Kriesten, Reiner
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 37 - 43
  • [43] A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking
    Eom, Taehoon
    Hong, Jin B.
    An, Seongmo
    Park, Jong Sou
    Kim, Dong Seong
    IEEE ACCESS, 2019, 7 : 137432 - 137445
  • [44] Tool-assisted Threat Modeling for Smart Grid Cyber Security
    Fla, Lars Halvdan
    Borgaonkar, Ravishankar
    Tondel, Inger Anne
    Jaatun, Martin Gilje
    2021 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2021), 2021,
  • [45] Solution-aware Data Flow Diagrams for Security Threat Modeling
    Sion, Laurens
    Yskout, Koen
    Van Landuyt, Dimitri
    Joosen, Wouter
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1425 - 1432
  • [46] Enhancing C4I Security using Threat Modeling
    Alghamdi, Abdullah Sharaf
    Hussain, Tazar
    Khan, Gul Faraz
    2010 12TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2010, : 131 - 136
  • [47] Vision: Security-Usability Threat Modeling for Industrial Control Systems
    Li, Karen
    Roudaut, Anne
    Rashid, Awais
    PROCEEDINGS OF THE 2021 EUROPEAN SYMPOSIUM ON USABLE SECURITY, EUROUSEC 2021, 2021, : 83 - 88
  • [48] Threat Modeling for Communication Security of IoT-Enabled Digital Logistics
    Junejo, Aisha Kanwal
    Breza, Michael
    Mccann, Julie A.
    SENSORS, 2023, 23 (23)
  • [49] Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments
    Hollerer, Siegfried
    Kastner, Wolfgang
    Sauter, Thilo
    17TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS 2021 (WFCS 2021), 2021, : 37 - 40
  • [50] Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System
    Javaid, Ahmad Y.
    Sun, Weiqing
    Devabhaktuni, Vijay K.
    Alam, Mansoor
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 585 - 590