Proceedings of the 13th European Conference on Software Architecture - Volume 2 2019
DOI: 10.1145/3344948.3344995
|View full text |Cite
|
Sign up to set email alerts
|

Inspection guidelines to identify security design flaws

Abstract: Recent trends in the software development practices (Agile, De-vOps, CI) have shortened the development life-cycle causing the need for efficient security-by-design approaches. In this context, software architectures are analyzed for potential vulnerabilities and design flaws. Yet, design flaws are often documented with natural language and require a manual analysis, which is inefficient. Besides low-level vulnerability databases (e.g., CWE, CAPEC) there is little systematized knowledge on security design flaw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 19 publications
(32 reference statements)
0
4
0
Order By: Relevance
“…Four case studies are discussed in [10] using a strategic, system-wide architectural approach, implemented as a security framework. Guidelines are proposed to detect security design flaws in [31]. Both of them lack an automatic process as well.…”
Section: Related Workmentioning
confidence: 99%
“…Four case studies are discussed in [10] using a strategic, system-wide architectural approach, implemented as a security framework. Guidelines are proposed to detect security design flaws in [31]. Both of them lack an automatic process as well.…”
Section: Related Workmentioning
confidence: 99%
“…This work is based on the catalog of security design flaws proposed by Malamas and Hosseini [6] (and later re-evaluated by Tuma et al [14]). We briefly summarize the contents and origin of this catalog, and zoom into a single security design flaw, namely "Insecure Data Exposure", which is used extensively throughout this paper.…”
Section: Security Design Flawsmentioning
confidence: 99%
“…Another resource from MITRE is CAPEC [5] which provides this information from an attacker perspective. Finally, the issues of similar flaws (Section V-B) have led Tuma et al [14] to do a re-evaluation of the security catalog and they suggest several improvements to reduce overlap between the flaws. While the above catalogs provide an extensive set of issues to identify, applying that knowledge a concrete application's design model requires translating this knowledge to practical detection rules, linked to a suitable system description that supports automatic assessment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation