Abstract
Threat modeling plays a significant role in the design of the overall security model for a system because it can help to ensure that security is built into applications, rather than addressed as an afterthought. However, research in security threat modeling has yet to mature as there is paucity of established techniques and tools to aid the threat modeling and formal analysis process. Moreover, existing work do not integrate threat modeling notations with a formal threat analysis procedure to aid decision making during security requirements analysis. This paper proposes a goal-Scenario approach to security threat modeling and requirement analysis by using visual model elements to explicitly capture threat-related concepts. More specifically, we propose a goal-scenario approach for explicitly modeling and analyzing security threats during requirements analysis. The goal scenario will be analyzed using the threat requirement, and the creation of the threat model will be discussed by the analysis on the STRIDE and the scenario authoring rules.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- STRIDE:
-
Spoofing identity (S), Tampering with Data (T), Repudiation (R), Information Disclosure (I), Denial of Service (D) and Elevation of Privilege (E)
References
Crook R, Ince D, Lin L, Nuseibeh B (2002) Security requirements engineering: When anti-requirements hit the fan. In Proceedings of IEEE Int’l Requirements Engineering Conference (RE’02)
J. Rushby (2001) Security requirements specifications: How and what. In Proceedings of the IEEE Symposium on Requirements Engineering for Information Security (SREIS’01). In dianapolis, Mar 2001
Howard M, LeBlanc D (2002) Writing secure code, 2nd edition, Microsoft Press
Swiderski F, Snyder W (2004) Threat modeling. Microsoft Press
Moore AP, Ellison RJ, Linger RC (2001) Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-001, Software Engineering Institute, Carnegie Mellon University, Mar 2001
Acknowledgments
This work was supported by the Security Engineering Research Center, granted by the Korea Ministry of Knowledge Economy.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Baek, SJ., Han, JS., Song, YJ. (2012). Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario. In: Kim, K., Ahn, S. (eds) Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, vol 120. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2911-7_38
Download citation
DOI: https://doi.org/10.1007/978-94-007-2911-7_38
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2910-0
Online ISBN: 978-94-007-2911-7
eBook Packages: EngineeringEngineering (R0)