posted on 2011-12-21, 15:59authored byVirginia N.L. Franqueira, Thein Than Tun, Yijun Yu, Roel J. Wieringa, Bashar NuseibehBashar Nuseibeh
When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and the threats from potential attackers. In earlier work, Haley
et al. [4] showed structured argumentation could deal with such mixed descriptions. However, incomplete and uncertain
information, and limited resources force practitioners to settle for good-enough security. To deal with these conditions of practice, we extend the method of Haley et al. with risk assessment. The proposed method, RISA (RIsk assessment in Security Argumentation), uses public catalogs of security expertise to support the risk assessment, and to guide the security argumentation in identifying rebuttals and mitigations for security requirements
satisfaction. We illustrate RISA with a realistic example of PIN entry device.
History
Publication
19TH IEEE International Requirements Engineering Conference (RE'11);08/2011
Publisher
IEEE Computer Society
Note
non-peer-reviewed
Other Funding information
SFI, Secure Change Project Microsoft Software Engineering Innovative Foundation