Skip to main content
Erschienen in: Electronic Commerce Research 3/2013

01.09.2013

Threat modeling of a mobile device management system for secure smart work

verfasst von: Keunwoo Rhee, Dongho Won, Sang-Woon Jang, Sooyoung Chae, Sangwoo Park

Erschienen in: Electronic Commerce Research | Ausgabe 3/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To enhance the security of mobile devices, enterprises are developing and adopting mobile device management systems. However, if a mobile device management system is exploited, mobile devices and the data they contain will be compromised. Therefore, it is important to perform extensive threat modeling to develop realistic and meaningful security requirements and functionalities. In this paper, we analyze some current threat modeling methodologies, propose a new threat modeling methodology and present all possible threats against a mobile device management system by analyzing and identifying threat agents, assets, and adverse actions. This work will be used for developing security requirements such as a protection profile and design a secure system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bickford, J., O’Hare, R., Baliga, A., Ganapathy, V., & Iftode, L. (2010). Rootkits on smartphones: attacks, implications and opportunities. In Proceedings of 11th workshop on mobile computing systems and applications (HotMobile’10) (pp. 49–54). Bickford, J., O’Hare, R., Baliga, A., Ganapathy, V., & Iftode, L. (2010). Rootkits on smartphones: attacks, implications and opportunities. In Proceedings of 11th workshop on mobile computing systems and applications (HotMobile’10) (pp. 49–54).
4.
Zurück zum Zitat CCMB (2009). Common criteria for information technology security evaluation. Part 1: Introduction and general model. Version 3.1, Revision 3, Final, CCMB-2009-07-001. CCMB (2009). Common criteria for information technology security evaluation. Part 1: Introduction and general model. Version 3.1, Revision 3, Final, CCMB-2009-07-001.
5.
Zurück zum Zitat Chen, Y., Boehm, B., & Sheppard, L. (2007). Value driven security threat modeling based on attack path analysis. In Proceedings of the 40th Hawaii international conference on system sciences (HICSS’07) (pp. 280a). Chen, Y., Boehm, B., & Sheppard, L. (2007). Value driven security threat modeling based on attack path analysis. In Proceedings of the 40th Hawaii international conference on system sciences (HICSS’07) (pp. 280a).
9.
Zurück zum Zitat Demchenko, Y., Gommans, L., Laat, C. D., & Oudenaarde, B. (2005). Web services and grid security vulnerabilities and threats analysis and model. In Proceedings of the 6th IEEE/ACM international workshop on grid computing (pp. 262–267). Demchenko, Y., Gommans, L., Laat, C. D., & Oudenaarde, B. (2005). Web services and grid security vulnerabilities and threats analysis and model. In Proceedings of the 6th IEEE/ACM international workshop on grid computing (pp. 262–267).
11.
Zurück zum Zitat Hasan, R., Myagmar, S., Lee, A. J., & Yurcik, W. (2005). Toward a threat model for storage systems. In Proceedings of the 2005 ACM workshop on storage security and survivability (StorageSS’05) (pp. 94–102). CrossRef Hasan, R., Myagmar, S., Lee, A. J., & Yurcik, W. (2005). Toward a threat model for storage systems. In Proceedings of the 2005 ACM workshop on storage security and survivability (StorageSS’05) (pp. 94–102). CrossRef
12.
Zurück zum Zitat Håvaldsrud, T., Ligaarden, O., Myrseth, P., Refsdal, A., Stølen, K., & Ølnes, J. (2010). Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement. Electronic Commerce Research, 10(3–4), 441–467. CrossRef Håvaldsrud, T., Ligaarden, O., Myrseth, P., Refsdal, A., Stølen, K., & Ølnes, J. (2010). Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement. Electronic Commerce Research, 10(3–4), 441–467. CrossRef
13.
Zurück zum Zitat Herrmann, P., & Herrmann, G. (2006). Security requirement analysis of business processes. Electronic Commerce Research, 6(3–4), 305–335. CrossRef Herrmann, P., & Herrmann, G. (2006). Security requirement analysis of business processes. Electronic Commerce Research, 6(3–4), 305–335. CrossRef
16.
Zurück zum Zitat Jeon, W., Kim, J., Lee, Y., & Won, D. (2011). A practical analysis of smartphone security. In M. J. Smith & G. Salvendy (Eds.), Lecture notes in computer science (Vol. 6771, pp. 311–320). Berlin: Springer. Jeon, W., Kim, J., Lee, Y., & Won, D. (2011). A practical analysis of smartphone security. In M. J. Smith & G. Salvendy (Eds.), Lecture notes in computer science (Vol. 6771, pp. 311–320). Berlin: Springer.
18.
Zurück zum Zitat Lee, K. (2011). A study on the design of secure multi function printer conforming to the Korea evaluation and certification scheme. Suwon: Sungkyunkwan University Lee, K. (2011). A study on the design of secure multi function printer conforming to the Korea evaluation and certification scheme. Suwon: Sungkyunkwan University
20.
Zurück zum Zitat Myagmar, S., Lee, A. J., & Yurcik, W. (2005). Threat modeling as a basis for security requirements. In Proceedings of the symposium on requirements engineering for information security (SREIS’05). Myagmar, S., Lee, A. J., & Yurcik, W. (2005). Threat modeling as a basis for security requirements. In Proceedings of the symposium on requirements engineering for information security (SREIS’05).
22.
Zurück zum Zitat Ni, J., Li, Z., Gao, Z., & Sun, J. (2007). Threat analysis and prevention for grid and web security. In Proceedings of the 8th ACIS international conference on software engineering, artificial intelligence, networking, and Parallel/Distributed computing (SNPD 2007) (pp. 526–531). Ni, J., Li, Z., Gao, Z., & Sun, J. (2007). Threat analysis and prevention for grid and web security. In Proceedings of the 8th ACIS international conference on software engineering, artificial intelligence, networking, and Parallel/Distributed computing (SNPD 2007) (pp. 526–531).
23.
Zurück zum Zitat Oladimeji, E. A., Suppakkul, S., & Chung, L. (2006). Security threat modeling and analysis: a goal-oriented approach. In Proceedings of the 10th IASTED international conference on software engineering and applications (SEA 2006). Oladimeji, E. A., Suppakkul, S., & Chung, L. (2006). Security threat modeling and analysis: a goal-oriented approach. In Proceedings of the 10th IASTED international conference on software engineering and applications (SEA 2006).
27.
Zurück zum Zitat Pauli, J., & Xu, D. (2005). Threat-driven architectural design of secure information systems. In Proceedings of the 7th international conference on enterprise information systems (ICEEIS 2005). Pauli, J., & Xu, D. (2005). Threat-driven architectural design of secure information systems. In Proceedings of the 7th international conference on enterprise information systems (ICEEIS 2005).
28.
Zurück zum Zitat Prasad, N. R. (2007). Threat model framework and methodology for personal networks (PNs). In Proceedings of the 2nd international conference on communication systems software and middleware (COMSWARE 2007) (pp. 1–6). CrossRef Prasad, N. R. (2007). Threat model framework and methodology for personal networks (PNs). In Proceedings of the 2nd international conference on communication systems software and middleware (COMSWARE 2007) (pp. 1–6). CrossRef
29.
Zurück zum Zitat Schmidt, A. D., Schmidt, H. G., Batyuk, L., Clausen, J. H., Camtepe, S. A., & Albayrak, S. (2009). Smartphone malware evolution revisited: android next target? In Proceedings of the 4th international conference on malicious and unwanted software (pp. 1–7). Schmidt, A. D., Schmidt, H. G., Batyuk, L., Clausen, J. H., Camtepe, S. A., & Albayrak, S. (2009). Smartphone malware evolution revisited: android next target? In Proceedings of the 4th international conference on malicious and unwanted software (pp. 1–7).
30.
Zurück zum Zitat Stango, A., Prasad, N. R., & Kyriazanos, D. M. (2009). A threat analysis methodology for security evaluation and enhancement planning. In Proceedings of 2009 third international conference on emerging security information, systems and technologies (SECURWARE 2009) (pp. 262–267). CrossRef Stango, A., Prasad, N. R., & Kyriazanos, D. M. (2009). A threat analysis methodology for security evaluation and enhancement planning. In Proceedings of 2009 third international conference on emerging security information, systems and technologies (SECURWARE 2009) (pp. 262–267). CrossRef
32.
Zurück zum Zitat Swamynathan, G., & Almeroth, K. (2010). The design of a reliable reputation system. Electronic Commerce Research, 10(3–4), 239–270. CrossRef Swamynathan, G., & Almeroth, K. (2010). The design of a reliable reputation system. Electronic Commerce Research, 10(3–4), 239–270. CrossRef
33.
Zurück zum Zitat Swiderski, F., & Snyder, W. (2004). Threat modeling, redmond. Washington: Microsoft Press. Swiderski, F., & Snyder, W. (2004). Threat modeling, redmond. Washington: Microsoft Press.
36.
Zurück zum Zitat Wang, Z., & Stavrou, A. (2010). Exploiting smart-phone USB connectivity for fun and profit. In Proceedings of the 26th annual computer security applications conference (ACSAC’10) (pp. 357–366). Wang, Z., & Stavrou, A. (2010). Exploiting smart-phone USB connectivity for fun and profit. In Proceedings of the 26th annual computer security applications conference (ACSAC’10) (pp. 357–366).
42.
Zurück zum Zitat You, D., & Noh, B. (2011). Android platform base Linux kernel rootkit. In Proceedings of 2011 6th international conference on malicious and unwanted software (pp. 79–87). CrossRef You, D., & Noh, B. (2011). Android platform base Linux kernel rootkit. In Proceedings of 2011 6th international conference on malicious and unwanted software (pp. 79–87). CrossRef
43.
Zurück zum Zitat Zarmpou, T., Saprikis, V., Markos, A., & Vlachopoulou, M. (2012). Modeling users’ acceptance of mobile services. Electronic Commerce Research, 12(2), 225–248. CrossRef Zarmpou, T., Saprikis, V., Markos, A., & Vlachopoulou, M. (2012). Modeling users’ acceptance of mobile services. Electronic Commerce Research, 12(2), 225–248. CrossRef
Metadaten
Titel
Threat modeling of a mobile device management system for secure smart work
verfasst von
Keunwoo Rhee
Dongho Won
Sang-Woon Jang
Sooyoung Chae
Sangwoo Park
Publikationsdatum
01.09.2013
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 3/2013
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-013-9121-4

Weitere Artikel der Ausgabe 3/2013

Electronic Commerce Research 3/2013 Zur Ausgabe