skip to main content
10.1145/2245276.2231950acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

TAM2: automated threat analysis

Published: 26 March 2012 Publication History

Abstract

Identifying and resolving security problems as early as possible in the software development life cycle should by now be conventional wisdom. However, we observe that there is no threat modeling approach suitable for analysing initial software architecture. Our approach aims to fill this gap by adopting a threat modeling technique (STRIDE) that can be equally applied to software architecture diagrams. Accordingly, we claim and seek to validate that even little additional information on architecture diagrams can yield significant value in a lightweight automated security analysis. We implement and verify our approach by building a tool for automated threat analysis of software architecture diagrams. This is validated in the context of a large-scale industrial software development context providing some initial empirical analysis.

References

[1]
G. Hoglund and G. McGraw, Exploiting Software: How to break code. Pearson Higher Education, 2004.
[2]
S. Myagmar, A. J. Lee, and W. Yurcik, 'Threat modeling as a basis for security requirements,' in Symposium on Requirements Engineering for Information Security (SREIS'05), 2005.
[3]
J. P. Jesan, 'Threat Modeling Web-Applications using STRIDE Average Model,' Information Sciences, no. 2004, 2005.
[4]
Michael Howard, 'Threat Modeling,' Code Magazine, 2002. {http://www.codemagazine.com/Article.aspx?quickid=0211091}
[5]
P. Torr, 'Demystifying the Threat-Modeling Process,' IEEE Security & Privacy Magazine, vol. 3, no. 5, pp. 66--70, Sep. 2005.
[6]
J. Pauli and D. Xu, 'Threat-driven architectural design of secure information systems,' First International Workshop on Protection by Adaptation (PBA), in conjunction with ICEIS 2005
[7]
D. Verdon and G. McGraw, 'Risk analysis in software design,' Security & Privacy, IEEE, vol. 2, no. 4, pp. 79--84, 2004.
[8]
I. Alexander, 'Misuse Cases: Use Cases with Hostile Intent,' IEEE Software, vol. 20, pp. 58--66, 2003.
[9]
F. Braber, I. Hogganvik, M. S. Lund, K. Stølen, and F. Vraalsen, 'Model-based security analysis in seven steps --- a guided tour to the CORAS method,' BT Technology Journal, vol. 25, no. 1, pp. 101--117, Jan. 2007.
[10]
T. Lodderstedt and D. Basin, 'SecureUML: A UML-Based Modeling Language for Model-Driven Security,' in UML 2002, 2002, pp. 426--441.
[11]
J. Jurjens, 'Secure Systems Development with UML', 2005, Springer Academic Publishers
[12]
M. N. Johnstone, 'Threat Modelling with Stride and UML,' in 8th Australian Information Security Management Conference, 2010, no. November, p. 18.
[13]
R. Kissel, 'Glossary of Key Information Security Terms.,' Group. National Institute of Standards and Technology, 2007.
[14]
S. Hernan, S. Lambert, T. Ostwald, and A. Shostack, 'Uncover Security Design Flaws Using The STRIDE Approach,' MSDN Magazine, 2006.
[15]
Microsoft, 'SDL Threat Modeling Tool 2008 {http://go.microsoft.com/?linkid=9706808}
[16]
FMC Modeling, 'TAM - The SAP way combining FMC and UML {http://www.fmc-modeling.org/fmc-and-tam}
[17]
SAP, 'Standardized Technical Architecture Modeling http://www.fmc-modeling.org/download/fmc-and-tam/SAP-TAM_Standard.pdf,' no. March. 2007.
[18]
Common Vulnerabilities and Exposure http://cve.mitre.org/,' The Mitre Corporation.
[19]
NIST, 'National Vulnerability Database Version, {http://nvd.nist.gov/}
[20]
SAP, How to communicate architecture - Technical Architecture Modeling at SAP (part 2), http://www.sdn.sap.com/irj/scn/weblogs?blog=/pub/wlg/8684
[21]
Microsoft, Elevation of Privilege (EoP) Card Game, http://www.microsoft.com/security/sdl/adopt/eop.aspx

Cited By

View all

Index Terms

  1. TAM2: automated threat analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
    March 2012
    2179 pages
    ISBN:9781450308571
    DOI:10.1145/2245276
    • Conference Chairs:
    • Sascha Ossowski,
    • Paola Lecca
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 March 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. architecture
    2. process
    3. quality
    4. security
    5. threat analysis

    Qualifiers

    • Research-article

    Conference

    SAC 2012
    Sponsor:
    SAC 2012: ACM Symposium on Applied Computing
    March 26 - 30, 2012
    Trento, Italy

    Acceptance Rates

    SAC '12 Paper Acceptance Rate 270 of 1,056 submissions, 26%;
    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)37
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media