...
首页> 外文期刊>Journal of software >Developing Abuse Cases Based on Threat Modeling and Attack Patterns
【24h】

Developing Abuse Cases Based on Threat Modeling and Attack Patterns

机译:基于威胁建模和攻击模式开发滥用案例

获取原文
           

摘要

Developing abuse cases help software engineers to think from the perspective of attackers, and therefore allow them to decide and document how the software should react to illegitimate use. This paper describes a method for developing abuse cases based on threat modeling and attack patterns. First potential threats are analyzed by following Microsoft’s threat modeling process. Based on the identified threats, initial abuse cases are generated. Attack pattern library is searched and attack patterns relevant to the abuse cases are retrieved. The information retrieved from the attack patterns are used to extend the initial abuse cases and suggest mitigation method. Such a method has the potential to assist software engineers without high expertise in computer security to develop meaningful and useful abuse cases, and therefore reduce the security vulnerabilities in the software systems they develop.
机译:制定滥用案例有助于软件工程师从攻击者的角度进行思考,从而使他们能够决定并记录软件应对非法使用的方式。本文介绍了一种基于威胁建模和攻击模式的滥用案例开发方法。通过遵循Microsoft的威胁建模过程来分析第一个潜在威胁。根据已识别的威胁,生成初始滥用案例。搜索攻击模式库,并检索与滥用案例相关的攻击模式。从攻击模式中检索到的信息用于扩展最初的滥用案例并提出缓解措施。这种方法有可能帮助在计算机安全方面没有专门知识的软件工程师开发有意义且有用的滥用案例,从而减少他们开发的软件系统中的安全漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号