2011 Sixth International Conference on Availability, Reliability and Security 2011
DOI: 10.1109/ares.2011.115
|View full text |Cite
|
Sign up to set email alerts
|

Here's Johnny: A Methodology for Developing Attacker Personas

Abstract: Abstract-The adversarial element is an intrinsic part of the design of secure systems, but our assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying User-Centered Design on Persona development to build personas for possible attackers, such work is only speculative and fails to build upon recent research. This paper presents an approach for developing Attacker Personas which is both grounded and validated by structured data about attackers. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 37 publications
(36 citation statements)
references
References 12 publications
0
33
0
Order By: Relevance
“…However, they do have parallels in other aspects of software engineering. Brainstormed Attacker Profiles relates to the HCI concept of 'personas'; Atzeni et al [4], describe an analytic (rather than brainstorm) approach to generating attacker personas. Cross-team Security Discussion relates to the large amount of work available on collaboration between distributed teams [10].…”
Section: A Relationship To Existing Workmentioning
confidence: 99%
“…However, they do have parallels in other aspects of software engineering. Brainstormed Attacker Profiles relates to the HCI concept of 'personas'; Atzeni et al [4], describe an analytic (rather than brainstorm) approach to generating attacker personas. Cross-team Security Discussion relates to the large amount of work available on collaboration between distributed teams [10].…”
Section: A Relationship To Existing Workmentioning
confidence: 99%
“…This introduces problems as we cannot interview actual attackers. In [8] this has been dealt with by developing personas by using assumptions of their character. In this paper we introduce the concept of narratives, or storytelling, which puts personas in a general context where motives and goals are based on the situation and surrounding, rather than solely on individual goals.…”
Section: Personas As a Way To Present Users To Security Designersmentioning
confidence: 99%
“…Still, such criminal actors are hard to find, harder to interview, and even harder to reveal. In this paper we follow-up on recent work [8] and propose a solution based on a methodology being highly appreciated within the practical user-centered design community-the persona methodology.…”
Section: Introductionmentioning
confidence: 99%
“…Attack trees [26] were created to visually and systematically represent how these personas might launch certain attacks. More information on how attacker personas were created and used can be found in [1].…”
Section: ) Attackersmentioning
confidence: 99%
“…This allows developers to carry out their own risk analysis on later versions of webinos specifications, to determine whether webinos meets their own security and privacy expectations, as well as those of the personas in the context of use description. 1 These are downloadable from http://webinos.org IV. DIFFICULTIES While the approach taken was largely successful, it was not entirely problem-free.…”
Section: E Releasing Webinos Design Datamentioning
confidence: 99%