Finding Security Threats That Matter: An Industrial Case Study
Recent trends in the software engineering (i.e., Agile, DevOps) have shortened the development life-cycle limiting resources spent on security analysis of software designs. In this context, architecture models are (often manually) analyzed for potential security threats. Risk-last threat analysis su...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Recent trends in the software engineering (i.e., Agile, DevOps) have
shortened the development life-cycle limiting resources spent on security
analysis of software designs. In this context, architecture models are (often
manually) analyzed for potential security threats. Risk-last threat analysis
suggests identifying all security threats before prioritizing them. In
contrast, risk-first threat analysis suggests identifying the risks before the
threats, by-passing threat prioritization. This seems promising for
organizations where developing speed is of great importance. Yet, little
empirical evidence exists about the effect of sacrificing systematicity for
high-priority threats on the performance and execution of threat analysis. To
this aim, we conduct a case study with industrial experts from the automotive
domain, where we empirically compare a risk-first technique to a risk-last
technique. In this study, we consciously trade the amount of participants for a
more realistic simulation of threat analysis sessions in practice. This allows
us to closely observe industrial experts and gain deep insights into the
industrial practice. This work contributes with: (i) a quantitative comparison
of performance, (ii) a quantitative and qualitative comparison of execution,
and (iii) a comparative discussion of the two techniques. We find no
differences in the productivity and timeliness of discovering high-priority
security threats. Yet, we find differences in analysis execution. In
particular, participants using the risk-first technique found twice as many
high-priority threats, developed detailed attack scenarios, and discussed
threat feasibility in detail. On the other hand, participants using the
risk-last technique found more medium and low-priority threats and finished
early. |
---|---|
DOI: | 10.48550/arxiv.1910.03422 |