Finding Security Threats That Matter: An Industrial Case Study

10/08/2019
by   Katja Tuma, et al.
0

Recent trends in the software engineering (i.e., Agile, DevOps) have shortened the development life-cycle limiting resources spent on security analysis of software designs. In this context, architecture models are (often manually) analyzed for potential security threats. Risk-last threat analysis suggests identifying all security threats before prioritizing them. In contrast, risk-first threat analysis suggests identifying the risks before the threats, by-passing threat prioritization. This seems promising for organizations where developing speed is of great importance. Yet, little empirical evidence exists about the effect of sacrificing systematicity for high-priority threats on the performance and execution of threat analysis. To this aim, we conduct a case study with industrial experts from the automotive domain, where we empirically compare a risk-first technique to a risk-last technique. In this study, we consciously trade the amount of participants for a more realistic simulation of threat analysis sessions in practice. This allows us to closely observe industrial experts and gain deep insights into the industrial practice. This work contributes with: (i) a quantitative comparison of performance, (ii) a quantitative and qualitative comparison of execution, and (iii) a comparative discussion of the two techniques. We find no differences in the productivity and timeliness of discovering high-priority security threats. Yet, we find differences in analysis execution. In particular, participants using the risk-first technique found twice as many high-priority threats, developed detailed attack scenarios, and discussed threat feasibility in detail. On the other hand, participants using the risk-last technique found more medium and low-priority threats and finished early.

READ FULL TEXT
research
12/11/2018

Information Security Risks Assessment: A Case Study

Owing to recorded incidents of Information technology inclined organisat...
research
08/03/2022

The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan

Cybersecurity threat and risk analysis (RA) approaches are used to ident...
research
08/30/2021

On the Unimportance of Superintelligence

Humankind faces many existential threats, but has limited resources to m...
research
08/02/2022

A replication of a controlled experiment with two STRIDE variants

To avoid costly security patching after software deployment, security-by...
research
01/30/2023

Threat Modelling in Virtual Assistant Hub Devices Compared With User Risk Perceptions (2021)

Despite increasing uptake, there are still many concerns as to the secur...
research
10/06/2022

Threat Repair with Optimization Modulo Theories

We propose a model-based procedure for automatically preventing security...
research
06/07/2021

QFuzz: Quantitative Fuzzing for Side Channels

Side channels pose a significant threat to the confidentiality of softwa...

Please sign up or login with your details

Forgot password? Click here to reset