Skip to main content

2016 | OriginalPaper | Buchkapitel

Automatically Extracting Threats from Extended Data Flow Diagrams

verfasst von : Bernhard J. Berger, Karsten Sohr, Rainer Koschke

Erschienen in: Engineering Secure Software and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Architectural risk analysis is an important aspect of developing software that is free of security flaws. Knowledge on architectural flaws, however, is sparse, in particular in small or medium-sized enterprises. In this paper, we propose a practical approach to architectural risk analysis that leverages Microsoft’s threat modeling. Our technique decouples the creation of a system’s architecture from the process of detecting and collecting architectural flaws. This way, our approach allows an software architect to automatically detect vulnerabilities in software architectures by using a security knowledge base. We evaluated our approach with real-world case studies, focusing on logistics applications. The evaluation uncovered several flaws with a major impact on the security of the software.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
For the sake of presentation, we only give the complete names of CWE as well as CAPEC entries in the appendix.
 
Literatur
1.
Zurück zum Zitat Almorsy, M., Grundy, J., Ibrahim, A.S.: Automated software architecture security risk analysis using formalized signatures. In: 35th International Conference on Software Engineering (ICSE), pp. 100–109 (2013) Almorsy, M., Grundy, J., Ibrahim, A.S.: Automated software architecture security risk analysis using formalized signatures. In: 35th International Conference on Software Engineering (ICSE), pp. 100–109 (2013)
2.
Zurück zum Zitat Basin, D., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Inf. Softw. Technol. 51, 815–831 (2009)CrossRef Basin, D., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Inf. Softw. Technol. 51, 815–831 (2009)CrossRef
3.
Zurück zum Zitat Berger, B., Sohr, K., Koschke, R.: Extracting and analyzing the implemented security architecture of business applications. In: 2013 17th European Conference on Software Maintenance and Reengineering (CSMR), pp. 285–294 (2013) Berger, B., Sohr, K., Koschke, R.: Extracting and analyzing the implemented security architecture of business applications. In: 2013 17th European Conference on Software Maintenance and Reengineering (CSMR), pp. 285–294 (2013)
4.
Zurück zum Zitat Bunke, M., Sohr, K.: An architecture-centric approach to detecting security patterns in software. In: Erlingsson, Ú., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 156–166. Springer, Heidelberg (2011)CrossRef Bunke, M., Sohr, K.: An architecture-centric approach to detecting security patterns in software. In: Erlingsson, Ú., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 156–166. Springer, Heidelberg (2011)CrossRef
5.
Zurück zum Zitat Chess, B., West, J.: Secure Programming with Static Analysis. Addison-Wesley, Reading (2007) Chess, B., West, J.: Secure Programming with Static Analysis. Addison-Wesley, Reading (2007)
6.
Zurück zum Zitat Clavel, M., da Silva, V., Braga, C., Egea, M.: Model-driven security in practice: an industrial experience. In: Schieferdecker, I., Hartman, A. (eds.) ECMDA-FA 2008. LNCS, vol. 5095, pp. 326–337. Springer, Heidelberg (2008)CrossRef Clavel, M., da Silva, V., Braga, C., Egea, M.: Model-driven security in practice: an industrial experience. In: Schieferdecker, I., Hartman, A. (eds.) ECMDA-FA 2008. LNCS, vol. 5095, pp. 326–337. Springer, Heidelberg (2008)CrossRef
8.
Zurück zum Zitat Dhillon, D.: Developer-driven threat modeling: lessons learned in the trenches. IEEE Secur. Priv. 9(4), 41–47 (2011)CrossRef Dhillon, D.: Developer-driven threat modeling: lessons learned in the trenches. IEEE Secur. Priv. 9(4), 41–47 (2011)CrossRef
10.
11.
Zurück zum Zitat Jung, C., Rudolph, M., Schwarz, R.: Security evaluation of service-oriented systems with an extensible knowledge base. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 698–703 (2011) Jung, C., Rudolph, M., Schwarz, R.: Security evaluation of service-oriented systems with an extensible knowledge base. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 698–703 (2011)
12.
Zurück zum Zitat Jürjens, J., Shabalin, P.: Automated verification of UMLsec models forsecurity requirements. In: Baar, T., Strohmeier, A., Moreira, A., Moreira, S.J. (eds.) UML 2004 - The Unified ModelingLanguage: Modeling Languages and Applications. LNCS, vol. 3273. Springer, Heidelberg (2004) Jürjens, J., Shabalin, P.: Automated verification of UMLsec models forsecurity requirements. In: Baar, T., Strohmeier, A., Moreira, A., Moreira, S.J. (eds.) UML 2004 - The Unified ModelingLanguage: Modeling Languages and Applications. LNCS, vol. 3273. Springer, Heidelberg (2004)
13.
Zurück zum Zitat Kuhlmann, M., Sohr, K., Gogolla, M.: Comprehensive two-level analysis of static and dynamic rbac constraints with uml and ocl. In: Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 108–117. IEEE Computer Society, Washington, DC (2011) Kuhlmann, M., Sohr, K., Gogolla, M.: Comprehensive two-level analysis of static and dynamic rbac constraints with uml and ocl. In: Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, pp. 108–117. IEEE Computer Society, Washington, DC (2011)
14.
Zurück zum Zitat Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371–386 (2011)CrossRef Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371–386 (2011)CrossRef
16.
Zurück zum Zitat McGraw, G.: Software Security: Building Security In. Addison-Wesley, Reading (2006) McGraw, G.: Software Security: Building Security In. Addison-Wesley, Reading (2006)
19.
Zurück zum Zitat Peine, H., Jawurek, M., Mandel, S.: Security goal indicator trees: a model of software features that supports efficient security inspection. In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, pp. 9–18 (2008) Peine, H., Jawurek, M., Mandel, S.: Security goal indicator trees: a model of software features that supports efficient security inspection. In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, pp. 9–18 (2008)
20.
Zurück zum Zitat Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5–19 (2003)CrossRef Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5–19 (2003)CrossRef
21.
Zurück zum Zitat Schaad, A., Borozdin, M.: Tam2: Automated threat analysis. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1103–1108 (2012) Schaad, A., Borozdin, M.: Tam2: Automated threat analysis. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1103–1108 (2012)
22.
Zurück zum Zitat Schrettner, L., Fülöp, L.J., Ferenc, R., Gyimóthy, T.: Visualization of software architecture graphs of java systems: managing propagated low level dependencies. In: Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java, PPPJ 2010, pp. 148–157. ACM, New York (2010). http://doi.acm.org/10.1145/1852761.1852783 Schrettner, L., Fülöp, L.J., Ferenc, R., Gyimóthy, T.: Visualization of software architecture graphs of java systems: managing propagated low level dependencies. In: Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java, PPPJ 2010, pp. 148–157. ACM, New York (2010). http://​doi.​acm.​org/​10.​1145/​1852761.​1852783
23.
Zurück zum Zitat Schumacher, M.: Security Engineering with Patterns - Origins, Theoretical Models, and New Applications. LNCS, vol. 2754. Springer, Heidelberg (2003)CrossRefMATH Schumacher, M.: Security Engineering with Patterns - Origins, Theoretical Models, and New Applications. LNCS, vol. 2754. Springer, Heidelberg (2003)CrossRefMATH
24.
Zurück zum Zitat Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press, Redmond (2004) Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press, Redmond (2004)
Metadaten
Titel
Automatically Extracting Threats from Extended Data Flow Diagrams
verfasst von
Bernhard J. Berger
Karsten Sohr
Rainer Koschke
Copyright-Jahr
2016
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-30806-7_4