Enabling Model-Based Security Engineering - Automated Attack Tree Generation in ThreatGet

Research output: Chapter in Book or Conference ProceedingsConference Proceedings with Oral Presentationpeer-review

Abstract

Security analysis as the initial step of security engineering is of utmost importance. Current approaches are mostly manual and neither connected to system engineering nor following established model-based approaches. We present here a novel approach to automatically derive Attack Trees based on a system model, enhanced with security-related information. The approach is based on STRIDE Threat Modeling, but utilizes a set of novel features to identify potential attack paths. With this, new regulations, requiring security analysis for more domains can be addressed and we enable system engineers to evaluate the security during design time and follow a risk-based security-by-design approach.
Original languageEnglish
Title of host publicationProceedings of IEEE/IFIP Network Operations and Management Symposium 2023
EditorsKemal Akkaya, Olivier Festor, Carol Fung, Mohammad Ashiqur Rahman, Lisandro Zambenedetti Granville, Carlos Raniery Paula dos Santos
Pages1-5
ISBN (Electronic) 978-1-6654 -7716-1
Publication statusPublished - 2023
Event2ND IEEE/IFIP INTERNATIONAL WORKSHOP ON TECHNOLOGIES FOR NETWORK TWINS (TNT 2023) & 4TH WORKSHOP ON MANAGEMENT FOR INDUSTRY 5.0 (MFI5.0 2023) - Miami, Miami, United States
Duration: 8 May 2023 → …
https://noms2023.ieee-noms.org/program/workshops/2nd-ieeeifip-international-workshop-technologies-network-twins-tnt-2023-4th

Workshop

Workshop2ND IEEE/IFIP INTERNATIONAL WORKSHOP ON TECHNOLOGIES FOR NETWORK TWINS (TNT 2023) & 4TH WORKSHOP ON MANAGEMENT FOR INDUSTRY 5.0 (MFI5.0 2023)
Abbreviated titleMFI5.0
Country/TerritoryUnited States
CityMiami
Period8/05/23 → …
Internet address

Research Field

  • Dependable Systems Engineering

Fingerprint

Dive into the research topics of 'Enabling Model-Based Security Engineering - Automated Attack Tree Generation in ThreatGet'. Together they form a unique fingerprint.

Cite this