DocumentCode
3685982
Title
Holistic security requirements analysis: An attacker´s perspective
Author
Tong Li;Elda Paja;John Mylopoulos;Jennifer Horkoff;Kristian Beckers
Author_Institution
University of Trento, Italy
fYear
2015
Firstpage
282
Lastpage
283
Abstract
The ever-growing complexity of systems makes their protection more challenging, as a single vulnerability or exposure of any component of the system can lead to serious security breaches. This problem is exacerbated by the fact that the system development community has not kept up with advances in attack knowledge. In this demo paper, we propose a holistic attack analysis approach to identify and tackle both atomic and multistage attacks, taking into account not only software attacks but also attacks that are targeted at people and hardware. To bridge the knowledge gap between attackers and defenders, we systematically analyze and refine the malicious desires of attackers (i.e., anti-goals), and leverage a comprehensive attack pattern repository (CAPEC) to operationalize attacker goals into concrete attack actions. Based on the results of our attack analysis, appropriate security controls can be selected to effectively tackle potential attacks.
Keywords
"Security","Software","Analytical models","Smart meters","Energy consumption","Pattern matching","Hardware"
Publisher
ieee
Conference_Titel
Requirements Engineering Conference (RE), 2015 IEEE 23rd International
Type
conf
DOI
10.1109/RE.2015.7320439
Filename
7320439
Link To Document