Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing

@inproceedings{Erdogan2016DesignDI,
  title={Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing},
  author={Gencer Erdogan and Ketil St{\o}len},
  booktitle={RISK},
  year={2016}
}
We have developed a domain-specific modeling language named CORAL that employs risk assessment to help security testers select and design test cases based on the available risk picture. In this paper, we present CORAL and then discuss why the language is designed the way it is, and what we could have done differently. 

An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case

TLDR
A Domain Specific Language for generically describing cyber attacks, agnostic to specific system-under-test(SUT), motivated by an automotive use case is presented.

A Systematic Literature Review of Applications of the Physics of Notations

TLDR
Assessment of PoN applications found major differences between applications evaluating existing notations and applications designing new notations, and found that most applications adopted the PoN with little critical thought towards it, rarely considered its suitability for a particular context, and typically treated and discussed thePoN with few, if any, verifiable details and data.

References

SHOWING 1-10 OF 22 REFERENCES

Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study

TLDR
Experiences from using CORAL in an industrial case indicate that CORAL supports security testers in producing risk models that are valid and threat scenarios that are directly testable.

CORAL: A Model-Based Approach to Risk-Driven Security Testing

TLDR
This thesis proposes a model-based approach to risk-driven security testing, named CORAL, which is specifically developed to help security testers select and design test cases based on the available risk picture, and results indicate that CORAL supports security testers in producing risk models that are valid and directly testable.

Software Security Testing

TLDR
By identifying risks in the system and creating tests driven by those risks, a software security tester can properly focus on areas of code in which an attack is likely to succeed and provide a higher level of software security assurance than is possible with classical black-box testing.

Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions

TLDR
It is argued that the resulting English prose is comprehensible by testers, is consistent with the semantics of UML interactions, and has a complexity that is linear to the complexity of CORAL diagrams in terms of size.

Eliciting security requirements with misuse cases

TLDR
This paper presents a systematic approach to eliciting security requirements based on use cases, with emphasis on description and method guidelines, and is potentially useful for several other types of extra-functional requirements beyond security.

A survey on model-based testing approaches: a systematic review

TLDR
A selection criterion was used to narrow the initially identified four hundred and six papers to focus on seventy-eight papers and detailed analysis of these papers shows where MBT approaches have been applied, the characteristics, and the limitations.

Preliminary Experiments on the Relative Comprehensibility of Tabular and Graphical Risk Models

TLDR
A preliminary study on the comprehensibility of two risk modeling notations, involving students from Trento and Oslo universities, shows no significant difference in actual comprehension of security risk models.

A graphical approach to risk identification, motivated by empirical investigations

TLDR
A graphical approach to identify, explain and document security threats and risk scenarios is proposed and guidelines for its use have been based on a combination of empirical investigations and experiences gathered from utilizing the approach in large scale industrial field trials.

Attack Trees with Sequential Conjunction

TLDR
This work provides the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees by introducing the sequential conjunctive operator that enables the modeling of ordered events.

Model-Driven Risk Analysis - The CORAS Approach

TLDR
This book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations, and is to support risk analysts in conducting structured and stepwise risk analysis.