2007
DOI: 10.1016/j.infsof.2006.06.002
|View full text |Cite
|
Sign up to set email alerts
|

On the design of more secure software-intensive systems by use of attack patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 18 publications
0
18
0
Order By: Relevance
“…In line with this argument many authors have argued that it is much better to find and fix flaws during the early phase of software development because it is more costly to fix the problem at a late stage of software development and much more costly when the software has been deployed (Spampinato et.al, 2008, Mockel and Abdallah, 2011, Gegick and Williams, 2007. To ensure that security is integrated during the design phase of SDLC, many techniques such as architectural risk analysis, threat modelling, attack trees, attack patterns, use of security tools and other approaches have been proposed (see chapter 2 for further discussion).…”
Section: Motivationmentioning
confidence: 98%
“…In line with this argument many authors have argued that it is much better to find and fix flaws during the early phase of software development because it is more costly to fix the problem at a late stage of software development and much more costly when the software has been deployed (Spampinato et.al, 2008, Mockel and Abdallah, 2011, Gegick and Williams, 2007. To ensure that security is integrated during the design phase of SDLC, many techniques such as architectural risk analysis, threat modelling, attack trees, attack patterns, use of security tools and other approaches have been proposed (see chapter 2 for further discussion).…”
Section: Motivationmentioning
confidence: 98%
“…Gegick and Williams [60] identify security vulnerabilities in code level by tailoring attack patterns based on software components. These patterns take the form of regular expressions that are generic representations of vulnerabilities.…”
Section: Modeling Of Attacksmentioning
confidence: 99%
“…If a match exists, then the vulnerability may exist in the application being analyzed. The attacks patterns given in [60] are mainly based on code-level vulnerabilities especially the buffer-over flow and the SQL injection attacks.…”
Section: Modeling Of Attacksmentioning
confidence: 99%
“…In this technique, attack against a system is represented in a tree structure in which the root of the tree represents the goal of an attacker. The nodes in the tree represent the different types of actions the attacker can take to accomplish his goal on the software system or outside the software system which may be in the form of bribe or threat [6], [23]. "Attack trees are used for risk analysis, to answer questions about the system's security, to capture security knowledge in a reusable way, and to design, implement, and test countermeasures to attacks" [24].…”
Section: Related Work On Security Assessment Of Software Designmentioning
confidence: 99%
“…Moreover, it requires great expertise to ascertain whether or not a software application has design-level flaws which makes it difficult to find and automate [9]. Many authors also argue that it is much better to find and fix flaws during the early phase of software development because it is more costly to fix the problem at a late stage of development and much more costly when the software has been deployed [6][29] [30]. Therefore, taking security into consideration at the design phase of SDLC will help greatly in producing secured software applications.…”
Section: Introductionmentioning
confidence: 99%