Risk-based Design Security Analysis

被引:0
|
作者
Sion, Laurens [1 ]
Yskout, Koen [1 ]
Van Landuyt, Dimitri [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Heverlee, Belgium
关键词
Security; design; threat modeling; risk analysis;
D O I
10.1145/3194707.3194710
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Implementing security by design in practice often involves the application of threat modeling to elicit security threats and to aid designers in focusing efforts on the most stringent problems first. Existing threat modeling methodologies are capable of generating lots of threats, yet they lack even basic support to triage these threats, except for relying on the expertise and manual assessment by the threat modeler. Since the essence of creating a secure design is to minimize associated risk (and countermeasure costs), risk analysis approaches offer a very compelling solution to this problem. By combining risk analysis and threat modeling, elicited threats in a design can be enriched with risk analysis information in order to provide support in triaging and prioritizing threats and focusing security efforts on the high-risk threats. It requires the following inputs: the asset values, the strengths of countermeasures, and an attacker model. In his paper, we provide an integrated threat elicitation and risk analysis approach, implemented in a threat modeling tool prototype, and evaluate it using a real-world application, namely the SecureDrop whistleblower submission system. We show that the security measures implemented in SecureDrop indeed correspond to the high-risk threats identified by our approach. Therefore, the risk-based security analysis provides useful guidance on focusing security efforts on the most important problems first.
引用
收藏
页码:11 / 18
页数:8
相关论文
共 50 条
  • [1] Risks of risk-based security
    Parker, Donn B.
    [J]. COMMUNICATIONS OF THE ACM, 2007, 50 (03) : 120 - 120
  • [2] SMART: security model adversarial risk-based tool for systems security design evaluation
    Wortman, Paul A.
    Chandy, John A.
    [J]. JOURNAL OF CYBERSECURITY, 2020, 6 (01): : 1 - 8
  • [3] Automated analysis of security requirements through risk-based argumentation
    Yu, Yijun
    Franqueira, Virginia N. L.
    Tun, Thein Than
    Wieringa, Roel J.
    Nuseibeh, Bashar
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 106 : 102 - 116
  • [4] An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design
    Wortman, Paul A.
    Tehranipoor, Fatemeh
    Chandy, John A.
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [5] Online risk-based security assessment
    Ni, M
    McCalley, JD
    Vittal, V
    Tayyib, T
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2003, 18 (01) : 258 - 265
  • [6] Risk-Based Dynamic Security Assessment
    Dissanayaka, Anuradha
    Annakkage, Udaya D.
    Jayasekara, Bathiya
    Bagen, Bagen
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2011, 26 (03) : 1302 - 1308
  • [7] Risk-based nonstationary design flood and uncertainty analysis
    Du, Tao
    Xiong, Lihua
    Li, Shuai
    Shao, Jun
    Xu, Chongyu
    Yan, Lei
    [J]. Shuili Xuebao/Journal of Hydraulic Engineering, 2018, 49 (02): : 241 - 253
  • [8] Sensitivity analysis of risk-based conceptual ship design
    Garbatov, Y.
    Sisci, F.
    [J]. PROGRESS IN MARITIME TECHNOLOGY AND ENGINEERING, 2018, : 499 - 508
  • [9] Risk attitudes in risk-based design: Considering risk attitude using utility theory in risk-based design
    Van Bossuyt, Douglas
    Hoyle, Chris
    Tumer, Irem Y.
    Dong, Andy
    [J]. AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2012, 26 (04): : 393 - 406
  • [10] Risk-Based Cost-Benefit Analysis for Security Assessment Problems
    Wyss, Gregory D.
    Clem, John F.
    Darby, John L.
    Dunphy-Guzman, Katherine
    Hinton, John P.
    Mitchiner, Kim W.
    [J]. 44TH ANNUAL 2010 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2010, : 286 - 295