Automating Risk Analysis of Software Design Models

The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduc...

Full description

Saved in:
Bibliographic Details
Main Authors: Maxime Frydman, Guifré Ruiz, Elisa Heymann, Eduardo César, Barton P. Miller
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/805856
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558067476070400
author Maxime Frydman
Guifré Ruiz
Elisa Heymann
Eduardo César
Barton P. Miller
author_facet Maxime Frydman
Guifré Ruiz
Elisa Heymann
Eduardo César
Barton P. Miller
author_sort Maxime Frydman
collection DOAJ
description The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
format Article
id doaj-art-da566762c0694fd6bf3d566929df613d
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-da566762c0694fd6bf3d566929df613d2025-02-03T01:33:23ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/805856805856Automating Risk Analysis of Software Design ModelsMaxime Frydman0Guifré Ruiz1Elisa Heymann2Eduardo César3Barton P. Miller4Computer Architecture and Operating Systems Department, Universitat Autònoma de Barcelona, Campus UAB, Edifici Q, Bellaterra, 08193 Barcelona, SpainThe Open Web Application Security Project (OWASP), 1200-C Agora Drive, No. 232, Bel Air, MD 21014, USAComputer Architecture and Operating Systems Department, Universitat Autònoma de Barcelona, Campus UAB, Edifici Q, Bellaterra, 08193 Barcelona, SpainComputer Architecture and Operating Systems Department, Universitat Autònoma de Barcelona, Campus UAB, Edifici Q, Bellaterra, 08193 Barcelona, SpainComputer Sciences Department, University of Wisconsin, 1210 West Dayton Street, Madison, WI 53706-1685, USAThe growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.http://dx.doi.org/10.1155/2014/805856
spellingShingle Maxime Frydman
Guifré Ruiz
Elisa Heymann
Eduardo César
Barton P. Miller
Automating Risk Analysis of Software Design Models
The Scientific World Journal
title Automating Risk Analysis of Software Design Models
title_full Automating Risk Analysis of Software Design Models
title_fullStr Automating Risk Analysis of Software Design Models
title_full_unstemmed Automating Risk Analysis of Software Design Models
title_short Automating Risk Analysis of Software Design Models
title_sort automating risk analysis of software design models
url http://dx.doi.org/10.1155/2014/805856
work_keys_str_mv AT maximefrydman automatingriskanalysisofsoftwaredesignmodels
AT guifreruiz automatingriskanalysisofsoftwaredesignmodels
AT elisaheymann automatingriskanalysisofsoftwaredesignmodels
AT eduardocesar automatingriskanalysisofsoftwaredesignmodels
AT bartonpmiller automatingriskanalysisofsoftwaredesignmodels