2012
DOI: 10.1007/s00766-012-0153-4
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 53 publications
0
20
0
Order By: Relevance
“…Many researchers highlighted that reducing security issues has become important. They sug-gested the security must be integrated into the software development life cycle from the begin-ning phase and continue until the product is in use [4,5,1]. Misspecification in requirement anal-ysis is one of factors that contribute to unsecured system [6].…”
Section: Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Many researchers highlighted that reducing security issues has become important. They sug-gested the security must be integrated into the software development life cycle from the begin-ning phase and continue until the product is in use [4,5,1]. Misspecification in requirement anal-ysis is one of factors that contribute to unsecured system [6].…”
Section: Problem Statementmentioning
confidence: 99%
“…Security and privacy is a most essential concept for understanding level of secure software and also to guarantee user satisfaction. Security and privacy is a serious problem in software development, and may become much worse in the future [1]. This is due to millions of dollars in losses are the result of attacks on unsecured system.…”
Section: Introductionmentioning
confidence: 99%
“…To validate the analysis results, we compared them with a comprehensive security analysis performed on the same smart grid case [18], this study took a total of 16 person-months to identify threats, vulnerabilities and security requirements. We find out that our identified attack alternatives can cover all the threats to the integrity of energy consumption data that have been identified manually in the comparison case.…”
Section: B Operationalize Attack Strategiesmentioning
confidence: 99%
“…Beyond that, our results can discover additional detailed attacks that can be performed by attackers, particularly how such attacks can be composed to form multistage attacks. For example, the comparison study discovered a high-level threat "Tampering with SM's firmware" (Table 4, T.5 in [18]), while our results yield a corresponding multistage attack which first performs CAPEC-16: Dictionarybased Password Attack (consisting of four detailed attack steps) to defeat the password-based authorization and gains access to the smart meter firmware, and then performs CAPEC-186: Malicious Software Update to tamper with the smart meter firmware.…”
Section: B Operationalize Attack Strategiesmentioning
confidence: 99%
See 1 more Smart Citation