Stressing Security Requirements: Exploiting the Flaw Hypothesis Method with Deviational Techniques

نویسندگان

  • Thitima Srivatanakul
  • John A. Clark
  • Fiona Polack
چکیده

The Flaw Hypothesis Method has been widely used in the security community to ‘stress’ test system security. However, the approach of flaw generation to date only identifies threats that are already known for the domain. Deviational techniques are one approach to improve the process of the flaw hypothesis generation. The approach systematically perturbs elements of the system. In this paper we explore a generalised technique illustrated with example applications. The worked examples show that the technique forces more rigorous consideration of the security aspects of the system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Deviational Analyses for Validating Regulations on Real Systems

Deviational analysis is a traditional way of exploring the safety of systems. The results of deviational analysis contribute to traditional safety cases and safety arguments. We extend deviational analysis to other aspects of dependability, notably security. We discuss how the evidence of deviational analysis can contribute to the validation of regulations, in the sense of their application of ...

متن کامل

Security Assessment of IP-based Networks: A Holistic Approach

This paper deals with network security assessment. We discuss currently available network security assessment tools and provide a categorization of their limitations. We revisit the methodology that the tools are based on, the flaw-hypothesis testing methodology. We then discuss the application of the methodology to network security assessment and discuss what is necessary to augment current ne...

متن کامل

Teaching Security Engineering Principles

The design and construction of secure systems cannot be entirely captured in textbooks or class notes, but must be taught as an art which is learned through apprenticeship and practice. This paper describes a course in Secure Systems that uses the Flaw Hypothesis Methodology for penetration testing as a vehicle for motivating and teaching students fundamental principles of security

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005