Mitigation Lost in Translation: Leveraging Threat Information to Improve Privacy Solution Selection

被引:2
作者
Al-Momani, Ala'a [1 ]
Boesch, Christoph [1 ]
Wuyts, Kim [2 ]
Sion, Laurens [2 ]
Joosen, Wouter [2 ]
Kargl, Frank [1 ]
机构
[1] Ulm Univ, Inst Distributed Syst, Ulm, Germany
[2] Katholieke Univ Leuven, Imec DistriNet, Leuven, Belgium
来源
37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING | 2022年
关键词
Privacy Threat Modeling; Privacy Engineering; Software Design; SECURITY;
D O I
10.1145/3477314.3507107
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The design and implementation of privacy-preserving software systems is supported by privacy threat modeling approaches such as LINDDUN to assist in the identification of privacy threats. Resolving the identified privacy threats requires the selection of appropriate countermeasures and solutions to apply to the system. However, there is limited support for non-expert users to determine which solutions are preferable given the identified privacy threats. In this paper, we present an approach for constructing solution guidance methods to guide these users from threats to appropriate privacy solutions. We focus on hard privacy threats such as identifiability, and apply our approach on the LINDDUN threat trees to construct selection-support in order to guide users from the threat tree nodes to the most appropriate mitigation countermeasures. In particular, we present 4 solution flowcharts that take privacy analysts from threat tree nodes through a set of questions to suitable privacy countermeasures. Our approach reuses substantial threat information in the solution selection, and thus, offers targeted counter measures toward specific threat causes.
引用
收藏
页码:1236 / 1245
页数:10
相关论文
共 29 条
[1]   Land of the Lost: Privacy Patterns' Forgotten Properties Enhancing Selection-Support for Privacy Patterns [J].
Al-Momani, Ala'a ;
Wuyts, Kim ;
Sion, Laurens ;
Kargl, Frank ;
Joosen, Wouter ;
Erb, Benjamin ;
Boesch, Christoph .
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, :1217-1225
[2]  
Al-Momani A, 2019, IEEE SEC PRIV WORKS, P100, DOI 10.1109/SPW.2019.00028
[3]  
Al-Momani Alaa, 2022, SOLUTION CHART REPOS
[4]  
[Anonymous], 2021, PRIVACY PATTERNS
[5]  
[Anonymous], Privacy Patterns
[6]   Engineering Privacy by Design: Are engineers ready to live up to the challenge? [J].
Bednar, Kathrin ;
Spiekermann, Sarah ;
Langheinrich, Marc .
INFORMATION SOCIETY, 2019, 35 (03) :122-142
[7]  
Boeckl K., 2020, NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, DOI [10.6028/NIST.CSWP.01162020, DOI 10.6028/NIST.CSWP.01162020]
[8]   Interfacial TADF Exciplex as a Tool to Localize Excitons, Improve Efficiency, and Increase OLED Lifetime [J].
Colella, Marco ;
Pander, Piotr ;
Pereira, Daniel de Sa ;
Monkman, Andrew P. .
ACS APPLIED MATERIALS & INTERFACES, 2018, 10 (46) :40001-40007
[9]   Helping Software Architects Familiarize with the General Data Protection Regulation [J].
Colesky, Michael ;
Demetzou, Katerina ;
Fritsch, Lothar ;
Herold, Sebastian .
2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2019), 2019, :226-229
[10]   A System of Privacy Patterns for User Control [J].
Colesky, Michael ;
Caiza, Julio C. ;
Del Alamo, Jose M. ;
Hoepman, Jaap-Henk ;
Martin, Yod-Samuel .
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, :1150-1156