Automating risk analysis of software design models
Autor: | Barton P. Miller, Elisa Heymann, Maxime Frydman, Eduardo César, Guifré Ruiz |
---|---|
Rok vydání: | 2021 |
Předmět: |
Article Subject
Computer science lcsh:Medicine lcsh:Technology Risk Assessment General Biochemistry Genetics and Molecular Biology Software development process Software analytics Software Design lcsh:Science Computer Security General Environmental Science lcsh:T business.industry lcsh:R Software development General Medicine Models Theoretical Risk analysis (engineering) Software security assurance Software construction Threat model Package development process Software design lcsh:Q business Models Theoretical Research Article |
Zdroj: | Recercat: Dipósit de la Recerca de Catalunya Varias* (Consorci de Biblioteques Universitáries de Catalunya, Centre de Serveis Científics i Acadèmics de Catalunya) Recercat. Dipósit de la Recerca de Catalunya instname The Scientific World Journal Dipòsit Digital de Documents de la UAB Universitat Autònoma de Barcelona The Scientific World Journal, Vol 2014 (2014) |
Popis: | The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. |
Databáze: | OpenAIRE |
Externí odkaz: |