2016
DOI: 10.1007/978-3-319-45931-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automatic Risk Analysis and Mitigation of Software Applications

Abstract: This paper proposes a novel semi-automatic risk analysis approach that not only identifies the threats against the assets in a software application, but it is also able to quantify their risks and to suggests the software protections to mitigate them. Built on a formal model of the software, attacks, protections and their relationships, our implementation has shown promising performance on real world applications. This work represents a first step towards a user-friendly expert system for the protection of sof… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…With the current state of the art, such human expert involvement is still necessary. Past research aimed to automate the attack discovery with abductive logic and Prolog [65]. That suffers from computational issues, since generating attack paths as sequences of attack steps causes a combinatorial explosion and requires massive pruning.…”
Section: 21mentioning
confidence: 99%
See 1 more Smart Citation
“…With the current state of the art, such human expert involvement is still necessary. Past research aimed to automate the attack discovery with abductive logic and Prolog [65]. That suffers from computational issues, since generating attack paths as sequences of attack steps causes a combinatorial explosion and requires massive pruning.…”
Section: 21mentioning
confidence: 99%
“…The attack paths are built via backward chaining, as proposed in earlier work [7,65], and implemented with SWI-Prolog. An attack step can be executed if its premises are satisfied, and produces conclusions, the results of the successful execution of that step.…”
Section: Risk Assessmentmentioning
confidence: 99%
“…We have developed a tool, written in Java, which infers various types of attack paths on application assets by using Prolog-based reasoning [30,31]. We have used the metamodel to instantiate a KB with various types of attack steps that include dynamic and static tampering attacks as well as network attacks, such as sniffing and spoofing the client-server communications.…”
Section: Deriving Attack Paths Against An Applicationmentioning
confidence: 99%
“…Then, for each AttackTarget instance, the tool tries to generate any possible AttackPath containing at least one AttackStep having a hasTarget relationship with the AttackTarget instance. Attack paths are generated by following a set of Prolog rules, contained in an external KB system, as described in [31]. Identified attacks may also be manually visualized and refined by the software developer with the Petri net tool described in Section 4.2.8.…”
Section: Software Protection Work Flowmentioning
confidence: 99%