2015
DOI: 10.17706/jsw.10.4.491-498
|View full text |Cite
|
Sign up to set email alerts
|

Developing Abuse Cases Based on Threat Modeling and Attack Patterns

Abstract: Developing abuse cases help software engineers to think from the perspective of attackers, and therefore allow them to decide and document how the software should react to illegitimate use. This paper describes a method for developing abuse cases based on threat modeling and attack patterns. First potential threats are analyzed by following Microsoft's threat modeling process. Based on the identified threats, initial abuse cases are generated. Attack pattern library is searched and attack patterns relevant to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…9) Rank the abuse cases according to their risks. In this method, the new elements that were introduced into the previous work [11] include steps 7 and 9. In this method, the abuse cases generated are ranked according to their risks.…”
Section: Journal Of Softwarementioning
confidence: 99%
See 2 more Smart Citations
“…9) Rank the abuse cases according to their risks. In this method, the new elements that were introduced into the previous work [11] include steps 7 and 9. In this method, the abuse cases generated are ranked according to their risks.…”
Section: Journal Of Softwarementioning
confidence: 99%
“…McGraw [8] suggested that abuse cases be developed based on a set of requirements and standard use cases, and a list of attack patterns. Our previous work proposed a specific process for developing abuse cases based on threat modeling and attack patterns [11]. Such a method intends to allow software developers who do not have high expertise and experience in security to be able to develop meaningful abuse cases.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, STRIDE considers that the main attacks could be Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege. The framework can be used to develop abuse stories by identifying potential threats and vulnerabilities in the software system [25].…”
mentioning
confidence: 99%