• DocumentCode
    3685982
  • Title

    Holistic security requirements analysis: An attacker´s perspective

  • Author

    Tong Li;Elda Paja;John Mylopoulos;Jennifer Horkoff;Kristian Beckers

  • Author_Institution
    University of Trento, Italy
  • fYear
    2015
  • Firstpage
    282
  • Lastpage
    283
  • Abstract
    The ever-growing complexity of systems makes their protection more challenging, as a single vulnerability or exposure of any component of the system can lead to serious security breaches. This problem is exacerbated by the fact that the system development community has not kept up with advances in attack knowledge. In this demo paper, we propose a holistic attack analysis approach to identify and tackle both atomic and multistage attacks, taking into account not only software attacks but also attacks that are targeted at people and hardware. To bridge the knowledge gap between attackers and defenders, we systematically analyze and refine the malicious desires of attackers (i.e., anti-goals), and leverage a comprehensive attack pattern repository (CAPEC) to operationalize attacker goals into concrete attack actions. Based on the results of our attack analysis, appropriate security controls can be selected to effectively tackle potential attacks.
  • Keywords
    "Security","Software","Analytical models","Smart meters","Energy consumption","Pattern matching","Hardware"
  • Publisher
    ieee
  • Conference_Titel
    Requirements Engineering Conference (RE), 2015 IEEE 23rd International
  • Type

    conf

  • DOI
    10.1109/RE.2015.7320439
  • Filename
    7320439