User-Centric Security Assessment of Software Configurations: A Case Study
@inproceedings{Ghani2014UserCentricSA, title={User-Centric Security Assessment of Software Configurations: A Case Study}, author={Hamza Ghani and Jesus Luna and Ivaylo Petkov and Neeraj Suri}, booktitle={ESSoS}, year={2014} }
Software systems are invariably vulnerable to exploits, thus the need to assess their security in order to quantify the associated risk their usage entails. However, existing vulnerability assessment approaches e.g., vulnerability analyzers, have two major constraints: (a) they need the system to be already deployed to perform the analysis and, (b) they do not consider the criticality of the system within the business processes of the organization. As a result, many users, in particular small…
3 Citations
Refinement-Aware Generation of Attack Trees
- Computer ScienceSTM
- 2017
This paper forms the attack-tree generation problem and proposes a methodology to, given a system model, generate attack trees with meaningful levels of abstraction.
New Directions in Attack Tree Research: Catching up with Industrial Needs
- Computer ScienceGraMSec@CSF
- 2017
A systematic way of characterizing diverse system threats through the use of attack trees and the availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner is provided.
References
SHOWING 1-10 OF 44 REFERENCES
Quantitative assessment of software vulnerabilities based on economic-driven security metrics
- Computer Science, Economics2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)
- 2013
A novel approach for a systematic consideration of the relevant cost units (associated costs) for the economic damage estimation of vulnerability exploits and supports managers and decision makers in the process of prioritizing security investments to mitigate the discovered vulnerabilities.
Improving CVSS-based vulnerability prioritization and response with context information
- Computer Science2009 3rd International Symposium on Empirical Software Engineering and Measurement
- 2009
Adding context information significantly improved the prioritization and selection of vulnerability response process in the National Vulnerability Database and contributed to the discourse on returns on security investment, measurement of security processes and quantitative security management.
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
- Computer ScienceCRITIS
- 2006
An integrated framework for model-based symbolic interpretation, simulation and analysis with a comprehensive approach focussing on the validation of network security policies, that abstract representations of these graphs can be computed that allow comparison of focussed views on the behaviour of the system.
Common Vulnerability Scoring System
- Computer ScienceIEEE Security & Privacy
- 2006
The Common Vulnerability Scoring System is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities.
Benchmarking cloud security level agreements using quantitative policy trees
- Computer ScienceCCSW '12
- 2012
This paper proposes a method to benchmark -- both quantitatively and qualitatively -- the Cloud SecLAs of one or more CSPs with respect to a user-defined requirement, also in the form of a SecLA.
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
- Computer Science29th International Conference on Software Engineering (ICSE'07 Companion)
- 2007
As the trend of the usage of third party commercial-off-the-shelf (COTS) and open source software continuously increases, COTS security has become a major concern for many organizations whose daily…
Predictive vulnerability scoring in the context of insufficient information availability
- Computer Science2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)
- 2013
A novel approach for the predictive assessment of security vulnerabilities, taking into consideration the relevant scenarios, e.g., zero day vulnerabilities, is proposed, which is inspired by the Linear Discriminant Analysis and uses publicly available vulnerability databases such as the National Vulnerability Database (NVD) as a training data set.
An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents
- Computer Science2009 International Conference on Availability, Reliability and Security
- 2009
A preliminary taxonomy of losses related to security incidents is developed, a validation of the enterprise model used as a frame for the analysis and different paths of propagation of causes of incidents are identified.
Using the vulnerability information of computer systems to improve the network security
- Computer ScienceComput. Commun.
- 2007
Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM
- Computer ScienceIEEE Transactions on Power Delivery
- 2010
The attack graph and multiple criteria decision-making (MCDM) are introduced to deal with the difficulties of security assessment of power control process, and the security degree of each control step.