Threat and security modeling for secure software requirements and architecture

Michael Shin, Don Pathirage, Dongsoo Jang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Most of the threat modeling approaches do not stipulate when and what types of threats should be identified and modeled in each software development phase. This paper addresses a threat and security modeling approach in software requirements and architecture. The threats to software systems are classified and modeled as input and output, class and message threats in software requirements, and message communication threats in software architecture so that the security countermeasures are modeled and designed against the threats. The modeling of threats and security countermeasures is described by means of the underlying meta-models of software requirements and software architecture models. An online shopping system is used to demonstrate the approach.

Original languageEnglish
Title of host publicationSEKE 2020 - Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering
PublisherKnowledge Systems Institute Graduate School
Pages117-120
Number of pages4
ISBN (Electronic)1891706500
DOIs
StatePublished - 2020
Event32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020 - Pittsburgh, Virtual, United States
Duration: Jul 9 2020Jul 19 2020

Publication series

NameProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
VolumePartF162440
ISSN (Print)2325-9000
ISSN (Electronic)2325-9086

Conference

Conference32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020
Country/TerritoryUnited States
CityPittsburgh, Virtual
Period07/9/2007/19/20

Keywords

  • Meta-Model
  • Security Modeling
  • Software Architecture
  • Software Requirements
  • Threat

Fingerprint

Dive into the research topics of 'Threat and security modeling for secure software requirements and architecture'. Together they form a unique fingerprint.

Cite this