首页    期刊浏览 2025年02月22日 星期六
登录注册

文章基本信息

  • 标题:Developing Abuse Cases Based on Threat Modeling and Attack Patterns
  • 其他标题:Developing Abuse Cases Based on Threat Modeling and Attack Patterns
  • 本地全文:下载
  • 作者:Xiaohong Yuan ; Emmanuel Borkor Nuakoh ; Imano Williams
  • 期刊名称:Journal of Software
  • 印刷版ISSN:1796-217X
  • 出版年度:2015
  • 卷号:10
  • 期号:4
  • 页码:491-498
  • DOI:10.17706/jsw.10.4.491-498
  • 出版社:Academy Publisher
  • 摘要:Developing abuse cases help software engineers to think from the perspective of attackers, and therefore allow them to decide and document how the software should react to illegitimate use. This paper describes a method for developing abuse cases based on threat modeling and attack patterns. First potential threats are analyzed by following Microsoft’s threat modeling process. Based on the identified threats, initial abuse cases are generated. Attack pattern library is searched and attack patterns relevant to the abuse cases are retrieved. The information retrieved from the attack patterns are used to extend the initial abuse cases and suggest mitigation method. Such a method has the potential to assist software engineers without high expertise in computer security to develop meaningful and useful abuse cases, and therefore reduce the security vulnerabilities in the software systems they develop.
  • 其他关键词:Abuse case, threat modeling, attack patterns, secure software development.
国家哲学社会科学文献中心版权所有