Risk-based Design Security Analysis

被引:0
|
作者
Sion, Laurens [1 ]
Yskout, Koen [1 ]
Van Landuyt, Dimitri [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Heverlee, Belgium
关键词
Security; design; threat modeling; risk analysis;
D O I
10.1145/3194707.3194710
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Implementing security by design in practice often involves the application of threat modeling to elicit security threats and to aid designers in focusing efforts on the most stringent problems first. Existing threat modeling methodologies are capable of generating lots of threats, yet they lack even basic support to triage these threats, except for relying on the expertise and manual assessment by the threat modeler. Since the essence of creating a secure design is to minimize associated risk (and countermeasure costs), risk analysis approaches offer a very compelling solution to this problem. By combining risk analysis and threat modeling, elicited threats in a design can be enriched with risk analysis information in order to provide support in triaging and prioritizing threats and focusing security efforts on the high-risk threats. It requires the following inputs: the asset values, the strengths of countermeasures, and an attacker model. In his paper, we provide an integrated threat elicitation and risk analysis approach, implemented in a threat modeling tool prototype, and evaluate it using a real-world application, namely the SecureDrop whistleblower submission system. We show that the security measures implemented in SecureDrop indeed correspond to the high-risk threats identified by our approach. Therefore, the risk-based security analysis provides useful guidance on focusing security efforts on the most important problems first.
引用
收藏
页码:11 / 18
页数:8
相关论文
共 50 条
  • [21] Risk-based security and economy tradeoff analysis for real-time operation
    Xiao, Fei
    McCalley, James D.
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2007, 22 (04) : 2287 - 2288
  • [22] Granular Risk-Based Design Optimization
    Hu, Hao
    Li, Gang
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2015, 23 (02) : 340 - 353
  • [23] Risk-based design of naval combatants
    Boulougouris, Evangelos
    Papanikolaou, Apostolos
    [J]. OCEAN ENGINEERING, 2013, 65 : 49 - 61
  • [24] Risk-based analysis tools
    Latcovich, J
    Michalopoulos, E
    Selig, B
    [J]. MECHANICAL ENGINEERING, 1998, 120 (11) : 72 - 75
  • [25] Risk-based in situ bioremediation design
    Smalley, JB
    Minsker, BS
    [J]. IN SITU AND ON-SITE BIOREMEDIATION, VOL 4, 1997, 4(4) (04): : 353 - 358
  • [26] RISK-BASED EVALUATION OF DESIGN CRITERIA
    ELLINGWOOD, BR
    ANG, AHS
    [J]. JOURNAL OF THE STRUCTURAL DIVISION-ASCE, 1974, 100 (NST9): : 1771 - 1788
  • [27] INITIATIVE FOR RISK-BASED FLOOD DESIGN
    DAWDY, DR
    LETTENMAIER, DP
    [J]. JOURNAL OF HYDRAULIC ENGINEERING-ASCE, 1987, 113 (08): : 1041 - 1051
  • [28] Risk-Based Approach in Geotechnical Design
    Kannan, Ramanujachari
    [J]. GEO-RISK 2017: RELIABILITY-BASED DESIGN AND CODE DEVELOPMENTS, 2017, (283): : 524 - 533
  • [29] RISK-BASED CRITICALITY ANALYSIS
    Theoharidou, Marianthi
    Kotzanikolaou, Panayiotis
    Gritzalis, Dimitris
    [J]. CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 35 - 49
  • [30] Risk-based security engineering through the eyes of the adversary
    Evans, S
    Wallner, J
    [J]. Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 158 - 165