Proceedings of the Twenty-Second IEEE/ACM International Conference on Automated Software Engineering 2007
DOI: 10.1145/1321631.1321692
|View full text |Cite
|
Sign up to set email alerts
|

Checking threat modeling data flow diagrams for implementation conformance and security

Abstract: Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe how data moves through a system. Today, DFDs are represented informally, reviewed manually with security domain experts and may not reflect all the entry points in the implementation. We designed an approach to check the conformance of an implementation with its security architecture. We extended Reflexion Models to compare as-built … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…Threats in a system have been modeled by several approaches, which include attack trees [2], data flow diagrams [3], and UML-based modeling [4,5,6]. Attack trees in [2] provide an approach to modeling and analyzing the threats of systems, and the threats are analyzed in terms of attacker's capabilities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Threats in a system have been modeled by several approaches, which include attack trees [2], data flow diagrams [3], and UML-based modeling [4,5,6]. Attack trees in [2] provide an approach to modeling and analyzing the threats of systems, and the threats are analyzed in terms of attacker's capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Attack trees in [2] provide an approach to modeling and analyzing the threats of systems, and the threats are analyzed in terms of attacker's capabilities. The design models in [3] are specified with data flow diagram, and the threats to the models are identified and analyzed using scenarios of each function in a system. Several threat modeling approaches, such as misuse cases [4], abuse cases [5], and HAZOP (Hazard and Operability Analysis) [6], have been developed for object-oriented software systems.…”
Section: Related Workmentioning
confidence: 99%
“…Also in earlier work [5], Abi-Antoun, Wang and Torr defined a model for reasoning about security at the architectural-level, following the STRIDE methodology commonly used in threat modeling. The previous security model and checker were implemented using custom code.…”
Section: Related Workmentioning
confidence: 99%
“…When a security expert asks a developer to build a security architecture for a system under study, the developer typically produces a diagram mostly from his recollection of how the system works, with little tool support to extract such an architecture from the code. Then, during the security review, the experts study the architecture, assign to the components different architectural properties such as trustLevel [2] or privacyLevel, and enumerate all possible communication between the more trusted and the less trusted components of the system. But if the architecture does not show all the communication that is present in the system, the results of an architectural-level analysis may be incorrect.…”
Section: Performing Organization Name(s) and Address(es)mentioning
confidence: 99%
“…Architectural properties In previous work, we defined element-level properties, such as trustLevel, to support an architectural-level analysis to identify spoofing or tampering [2].…”
Section: Architectural Constraintsmentioning
confidence: 99%