2018 IEEE International Conference on Software Architecture Companion (ICSA-C) 2018
DOI: 10.1109/icsa-c.2018.00032
|View full text |Cite
|
Sign up to set email alerts
|

SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment

Abstract: The development of secure and privacy-preserving software systems entails the continuous consideration of the security and privacy aspects of the system under development.While contemporary software development practices do support such a continuous approach towards software development, existing threat modeling activities are commonly executed as single-shot efforts leading to a single, historic, and quickly obsolete view on the security and privacy of the system. This disconnect leads to undetected new issue… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 31 publications
(29 citation statements)
references
References 10 publications
(15 reference statements)
0
29
0
Order By: Relevance
“…A second analysis of the WebRTC was performed using a different tool as a sanity-check of our results. We compared our results to the results obtained by an Eclipse plugin introduced by Sion et al [16]. The authors identify several threats as less critical.…”
Section: Webrtcmentioning
confidence: 95%
See 1 more Smart Citation
“…A second analysis of the WebRTC was performed using a different tool as a sanity-check of our results. We compared our results to the results obtained by an Eclipse plugin introduced by Sion et al [16]. The authors identify several threats as less critical.…”
Section: Webrtcmentioning
confidence: 95%
“…Sion et al [16] present an approach for a risk-centric threat analysis of DFDs, which enables threat elicitation and risk analysis. The ability to model security solutions in the form of architectural patterns is useful for a more comprehensive analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Some authors refer security debt as technical debt containing a security risk [7] or potential security implications [8]. Security engineering techniques (e.g., risk analysis) are used to identify the security debt [6], [8] and security risk in software can be described [7], [11] Technical debt can be a source of security debt [1], [3], [8] Tradeoffs of security and other quality attributes (e.g., performance) might force to assume security debt [5], [14] Organizational Organization policies should prioritize security debt [12], [19] Security awareness and skills are needed to avoid security debt [8], [13] Security debt involves different stakeholders requiring discussions and decision making among them [5], [14] Consequences Business damage: High interest of the debt [8], [9], [12], [14], [16], [21] Interest will be paid mainly when someone exploit the vulnerability [8], [9], [16], [21] Paying the principal of the security debt might require to change processes [16], [19] in terms of technical debt [8], e.g., including the probability attribute to the security debt item to measure the chances that the security-related defect can be actually exploited [5].…”
Section: B Characteristicsmentioning
confidence: 99%
“…Both methodologies act upon Data Flow Diagrams (DFDs) as system representation, which makes them complementary. The efficiency of their synergy in terms of security and privacy threat modelling is proven by the SPARTA tool introduced in [28]. Since STRIDE and LINDDUN miss on risk assessment [7], SPARTA tries to enrich them with FAIR [13] risk analysis, but it does not provide means for managing variability and providing scoring for system configurations.…”
Section: Identified Gap and Research Questionmentioning
confidence: 99%