Existing Vulnerability Information in Security Requirements Elicitation

被引:1
|
作者
Amin, Rayhan [1 ]
Bhowmik, Tanmay [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
关键词
Requirements Engineering; Security Requirements Elicitation; Software Vulnerability; Information Reuse;
D O I
10.1109/REW56159.2022.00049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In software engineering, the aspect of addressing security requirements is considered to be of paramount importance. In most cases, however, security requirements for a system are considered as non-functional requirements (NERs) and are addressed at the very end of the software development life cycle. The increasing number of security incidents in software systems around the world has made researchers and developers rethink and consider this issue at an earlier stage. An important and essential step towards this process is the elicitation of relevant security requirements. In a recent work, Imtiaz et al. proposed a framework for creating a mapping between existing requirements and the vulnerabilities associated with them. The idea is that, this mapping can be used by developers to predict potential vulnerabilities associated with new functional requirements and capture security requirements to avoid these vulnerabilities. However, to what extent, such existing vulnerability information can be useful in security requirements elicitation is still an open question. In this paper, we design a human subject study to answer this question. We also present the results of a pilot study and discuss their implications. Preliminary results show that existing vulnerability information can be a useful resource in eliciting security requirements and lays ground work for a full scale study.
引用
收藏
页码:220 / 225
页数:6
相关论文
共 50 条
  • [1] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [2] Security Requirements Elicitation and Modeling Authorizations
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 239 - 250
  • [3] Requirements of practice in relation to the existing information technology and security management competencies
    Arbanas, K.
    Alagic, D.
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1411 - 1416
  • [4] Security Requirements Elicitation and Assessment Mechanism (SecREAM)
    Goel, Rajat
    Govil, M. C.
    Singh, Girdhari
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1862 - 1866
  • [5] Requirements Elicitation and Derivation of Security Policy Templates
    Rudolph, Manuel
    Feth, Denis
    Doerr, Joerg
    Spilker, Joerg
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 283 - 292
  • [6] Security requirements elicitation: a smart health case
    Rabii, Anass
    Assoul, Saliha
    Roudies, Ounsa
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781
  • [7] Security Requirements Elicitation from Business Processes
    Matulevicius, Raimundas
    BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
  • [8] Requirements Elicitation for Geo-information Solutions
    Sluter, Claudia Robbi
    van Elzakker, Corne P. J. M.
    Ivanova, Ivana
    CARTOGRAPHIC JOURNAL, 2017, 54 (01): : 77 - 90
  • [9] A Combined Process for Elicitation and Analysis of Safety and Security Requirements
    Raspotnig, Christian
    Karpati, Peter
    Katta, Vikash
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2012, 2012, 113 : 347 - 361
  • [10] Security Requirements Elicitation from Airline Turnaround Processes
    Matulevicius, Raimundas
    Norta, Alex
    Samarutel, Silver
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2018, 60 (01): : 3 - 20