2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.101
|View full text |Cite
|
Sign up to set email alerts
|

Combining Misuse Cases with Attack Trees and Security Activity Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(26 citation statements)
references
References 18 publications
0
26
0
Order By: Relevance
“…They have also been researched intensively, and examples can be found in [179,190,109,106,99] where reusability of attack models has been considered. Other forms of modelling threats include activity diagrams, sequence diagrams [196], Petri-nets [195] and attack graphs [139].…”
Section: Architecture and Design For Security: Development And Evaluatimentioning
confidence: 99%
See 1 more Smart Citation
“…They have also been researched intensively, and examples can be found in [179,190,109,106,99] where reusability of attack models has been considered. Other forms of modelling threats include activity diagrams, sequence diagrams [196], Petri-nets [195] and attack graphs [139].…”
Section: Architecture and Design For Security: Development And Evaluatimentioning
confidence: 99%
“…Other researchers [123] looked at using these requirement-level modelling techniques to derive injection test scenarios in order to test the security properties of the protocol under evaluation. Tondel et al [179] looked into linking misuse cases and attack trees to obtain a high-level view of the threats towards a system through misuse case diagrams, and established a more detailed view on each threat through the employment of attack trees. The work produced by Karpati et al [93] and [137] took the application of misuse cases further by integrating security threats into the architecture, supporting the transition from requirement specifications to high-level design, and vice versa.…”
Section: Functional Testing Chapter 2 Literature Reviewmentioning
confidence: 99%
“…Abuse cases threaten use cases and serve as a support for developers to elicit security requirements. Developing abuse cases allow software engineers to think from the perspective of attackers, and decide and document a priori how the software should react to illegitimate use [6]. Countermeasures can be developed to mitigate misuse cases in the form of security use cases [7].…”
Section: Introductionmentioning
confidence: 99%
“…However, high expertise and experience in security is required to produce meaningful and useful abuse cases using brainstorming method. It has also been suggested that abuse cases be developed based on a set of requirements and standard use cases, and a list of attack patterns [6]. However, specific processes for developing abuse cases are lacking.…”
Section: Introductionmentioning
confidence: 99%
“…An abuse case is a use case from an attacker's perspective with the intent to harm the system, an actor of the system, or a stakeholder [6], [7]. Creating abuse cases allows developers to elicit security requirements, decide and document how the software should react to illegitimate use, and develop countermeasures and mitigations of the abuse cases [8], [9].…”
Section: Introductionmentioning
confidence: 99%