Experimental threat model reuse with misuse case diagrams

  • Authors:
  • Jostein Jensen;Inger Anne Tøndel;Per Håkon Meland

  • Affiliations:
  • SINTEF ICT, Trondheim, Norway;SINTEF ICT, Trondheim, Norway;SINTEF ICT, Trondheim, Norway

  • Venue:
  • ICICS'10 Proceedings of the 12th international conference on Information and communications security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents an experiment on the reusability of threat models, specifically misuse case diagrams. The objective was to investigate the produced and perceived differences when modelling with or without the aid of existing models. 30 participants worked with two case studies using a Latin-squares experimental design. Results show that reuse is the preferred alternative. However, the existing models must be of high quality, otherwise a security risk would arise due to false confidence. Also, reuse of misuse case diagrams is perceived to improve the quality of the new models as well as improve productivity compared to modelling from scratch.