2013 20th Asia-Pacific Software Engineering Conference (APSEC) 2013
DOI: 10.1109/apsec.2013.19
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Security Threat Patterns to Derive Negative Scenarios

Abstract: The elicitation of security requirements is a crucial issue to develop secure business processes and information systems of higher quality. Although we have several methods to elicit security requirements, most of them do not provide sufficient supports to identify security threats. Since threats do not occur so frequently, like exceptional events, it is much more difficult to determine the potentials of threats exhaustively rather than identifying normal behavior of a business process. To reduce this difficul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Empirical evidence of threat analysis performance indicators is a crucial piece of the puzzle. First, such evidence supports security experts in understanding the trade-offs between the myriad of existing threat analysis techniques (e.g., STRIDE [42], CORAS [28], attack trees [35], threat patterns [1], PASTA [52], etc.). Second, favourable performance indicators would result in cost saving for organizations where security experts are scarce.…”
mentioning
confidence: 70%
“…Empirical evidence of threat analysis performance indicators is a crucial piece of the puzzle. First, such evidence supports security experts in understanding the trade-offs between the myriad of existing threat analysis techniques (e.g., STRIDE [42], CORAS [28], attack trees [35], threat patterns [1], PASTA [52], etc.). Second, favourable performance indicators would result in cost saving for organizations where security experts are scarce.…”
mentioning
confidence: 70%
“…Finally, the work of [114] presents a technique to model threat patterns which can be used for threat identification in business process models. The technique is based on the transformation of normal scenarios, captured by UML sequence diagrams, to negative scenarios where a threat can be realised by a mis-actor using a threat pattern rule.…”
Section: Risk Management At Business Process Modelsmentioning
confidence: 99%
“…Therefore, we consider existing literature that makes use of knowledge base (threat catalogs, vulnerability data bases, etc.) [1,2,4,7,18] to perform such analysis as related work. We refer the interested reader to a systematic literature review [20] for a more detailed list of knowledge-based threat analysis techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Knowledge reuse is an important factor that can help raise the efficiency. For instance, previous work ( [2,4,22], to cite a few) has made use of publicly available records of low-level security vulnerabilities, such as CAPEC 1 , CVE 2 , CWE 3 to semi-automate the security analysis of systems. On the level of software architecture, Garcia et al [9] introduce a catalog of architectural bad smells specified with UML diagrams.…”
mentioning
confidence: 99%