Knowledge-enriched Security and Privacy Threat Modeling

被引:1
作者
Sion, Laurens [1 ]
Yskout, Koen [1 ]
Van Landuyt, Dimitri [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Heverlee, Belgium
来源
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION | 2018年
关键词
Security; design; threat modeling; model enrichment;
D O I
10.1145/3183440.3194975
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Creating secure and privacy-protecting systems entails the simultaneous coordination of development activities along three different yet mutually influencing dimensions: translating (security and privacy) goals to design choices, analyzing the design for threats, and performing a risk analysis of these threats in light of the goals. These activities are often executed in isolation, and such a disconnect impedes the prioritization of elicited threats, assessment which threats are sufficiently mitigated, and decision-making in terms of which risks can be accepted. In the proposed TMaRA approach, we facilitate the simultaneous consideration of these dimensions by integrating support for threat modeling, risk analysis, and design decisions. Key risk assessment inputs are systematically modeled and threat modeling efforts are fed back into the risk management process. This enables prioritizing threats based on their estimated risk, thereby providing decision support in the mitigation, acceptance, or transferral of risk for the system under design.
引用
收藏
页码:290 / 291
页数:2
相关论文
共 21 条
  • [1] Alshammari M., 2016, PRINCIPLED APPROACH
  • [2] [Anonymous], 2004, Threat modeling
  • [3] [Anonymous], 1999, ATTACK TREES
  • [4] A Privacy-Aware Conceptual Model for Handling Personal Data
    Antignac, Thibaud
    Scandariato, Riccardo
    Schneider, Gerardo
    [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: FOUNDATIONAL TECHNIQUES, PT I, 2016, 9952 : 942 - 957
  • [5] Berger Bernhard J., 2016, Engineering Secure Software and Systems. 8th International Symposium, ESSoS 2016. Proceedings: LNCS 9639, P56, DOI 10.1007/978-3-319-30806-7_4
  • [6] DeMarco T., 1979, STRUCTURED ANAL SYST, DOI 10.1007/978-3-642-48354-7_9
  • [7] A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Deng, Mina
    Wuyts, Kim
    Scandariato, Riccardo
    Preneel, Bart
    Joosen, Wouter
    [J]. REQUIREMENTS ENGINEERING, 2011, 16 (01) : 3 - 32
  • [8] Developer-Driven Threat Modeling Lessons Learned in the Trenches
    Dhillon, Danny
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (04) : 41 - 47
  • [9] Freund J., 2014, MEASURING MANAGING I
  • [10] Hernan S., 2006, MSDN MAGAZINE, V6