Threat modeling at run time: the case for reflective and adaptive threat management (NIER track)

被引:1
作者
van Landuyt, Dimitri [1 ]
Pasquale, Liliana [2 ]
Sion, Laurens [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Dept Comp Sci, Heverlee, Belgium
[2] Univ Coll Dublin, Sch Comp Sci, Dublin, Ireland
来源
2021 INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2021) | 2021年
基金
欧盟地平线“2020”;
关键词
Threat modeling; threat analysis; threat management; security; privacy; run-time reflection; architecture-centric adaptation; SOFTWARE; SYSTEMS;
D O I
10.1109/SEAMS51251.2021.00034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threat modeling is an analysis activity aimed at eliciting viable and realistic security and privacy threats in the design of a software-intensive system. Threat modeling allows for a by-design approach, mitigating problems before they arise and avoiding later costly development efforts. However, it mainly pays off in software construction approaches that rely on planned architectures, in which sources of threats can be anticipated beforehand. These axiomatic assumptions are, however, increasingly untrue in contemporary software development practices in which software systems evolve drastically in later stages. In addition, software-intensive systems are increasingly faced with uncertainty in their operational contexts, and these are nearly impossible to enumerate in early development stages. In this article, we first present the idea of reflective threat modeling, which involves the automated derivation of architectural system models from run-time and operational system artifacts, providing the threat modeler with an accurate and workable run-time inspection view of the system. We then outline and motivate the potential of adopting threat analysis models as a basis for holistic and adaptive threat management through integration of adaptive security and privacy technologies. This will enable systems to autonomously respond to emerging threats by dynamically activating dedicated controls or via run-time reconfiguration.
引用
收藏
页码:203 / 209
页数:7
相关论文
共 69 条
[1]   Real-time multi-agent system for an adaptive intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
PATTERN RECOGNITION LETTERS, 2017, 85 :56-64
[2]   Threat modeling of a multi-UAV system [J].
Almulhem, Ahmad .
TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 2020, 142 :290-295
[3]  
Antignac T., 2016, PRIVACY AWARE CONCEP
[4]  
Bass L., 1997, SOFTWARE ARCHITECTUR
[5]   THE PRAGMATIC ARCHITECT The Software Architect and DevOps [J].
Bass, Len .
IEEE SOFTWARE, 2018, 35 (01) :8-10
[6]  
Braiterman Z., 2021, THREAT MODELING MANI
[7]   Engineering Self-Adaptive Systems through Feedback Loops [J].
Brun, Yuriy ;
Serugendo, Giovanna Di Marzo ;
Gacek, Cristina ;
Giese, Holger ;
Kienle, Holger ;
Litoiu, Marin ;
Mueller, Hausi ;
Pezze, Mauro ;
Shaw, Mary .
SOFTWARE ENGINEERING FOR SELF-ADAPTIVE SYSTEMS, 2009, 5525 :48-+
[8]  
Cagnazzo M, 2018, IEEE WIREL COMMUNN, P314, DOI 10.1109/WCNCW.2018.8369033
[9]   The state-of-the-art in container technologies: Application, orchestration and security [J].
Casalicchio, Emiliano ;
Iannucci, Stefano .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (17)
[10]  
Casalicchio E, 2019, EAI SPRINGER INNOVAT, P221, DOI 10.1007/978-3-319-92378-9_14