Matching attack patterns to security vulnerabilities in software-intensive system designs

  • Authors:
  • Michael Gegick;Laurie Williams

  • Affiliations:
  • North Carolina State University;North Carolina State University

  • Venue:
  • SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Fortifying software applications from attack is often an effort that occurs late in the software development process. Applying patches to fix vulnerable applications in the field is a common approach to securing applications. Abstract representations of attacks such as attack trees and attack nets can be used for identifying potential threats before a system is released. We have constructed attack patterns that can illuminate security vulnerabilities in a software-intensive system design. Matching our attack patterns to vulnerabilities in the design phase may stimulate security efforts to start early and to become integrated with the software process. The intent is that our attack patterns can be used to effectively encode software vulnerabilities in vulnerability databases. A case study of our approach with undergraduate students in a security course indicated that our attack patterns can provide general descriptions of vulnerabilities. The students were able to accurately map the patterns to vulnerabilities in a system design.