Threat Analysis

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 143367 Experts worldwide ranked by ideXlab platform

Kenji Taguchi - One of the best experts on this subject based on the ideXlab platform.

  • SAFECOMP - Threat Analysis Framework for Safety Architectures in SCDL
    Lecture Notes in Computer Science, 2020
    Co-Authors: Kenji Taguchi, Ryo Kurachi, Kiyoshi Sasaki, Nobuhiko Nakamura, Kazuki Tomonaga, Shuhei Yamashita
    Abstract:

    Cybersecurity Threats have become a reality for safety critical systems such as automobiles, railways and avionics witnessing cybersecurity incidents and research reports from white hackers. Threat Analysis plays an important role to identify potential Threats in early stages of the system development and it is a common understanding that the Threat Analysis for safety critical systems need to assess an effect caused by Threats against safety. In this paper, we propose a Threat Analysis framework on safety concepts required by ISO 26262 in an architecture description language SCDL (Safety Concept Description Language) specifically designed for safety concepts modeling in ISO 26262 and demonstrate the effectiveness of our framework on a case study. Our research result shows the potential usage of SCDL for Threat Analysis and effect Analysis between functional safety and cybersecurity.

  • SAFECOMP Workshops - Comparing Risk Identification in Hazard Analysis and Threat Analysis
    Developments in Language Theory, 2018
    Co-Authors: Hideaki Nishihara, Kenji Taguchi
    Abstract:

    In the context of cyber-physical systems, safety and security have been discussed and dealt with separately in the past, since security was not a critical issue of safety and vice versa. They are similar in some points, and it is natural to try dealing with them in parallel or in a unified manner. This paper considers symmetrical treatment of safety and security, especially in identifying possible harms. We compare the result of hazard Analysis and Threat Analysis for a single model of a small IoT system. It shows that identified harms have much overlaps, which indicates the two analyses can be unified.

Shuhei Yamashita - One of the best experts on this subject based on the ideXlab platform.

  • SAFECOMP - Threat Analysis Framework for Safety Architectures in SCDL
    Lecture Notes in Computer Science, 2020
    Co-Authors: Kenji Taguchi, Ryo Kurachi, Kiyoshi Sasaki, Nobuhiko Nakamura, Kazuki Tomonaga, Shuhei Yamashita
    Abstract:

    Cybersecurity Threats have become a reality for safety critical systems such as automobiles, railways and avionics witnessing cybersecurity incidents and research reports from white hackers. Threat Analysis plays an important role to identify potential Threats in early stages of the system development and it is a common understanding that the Threat Analysis for safety critical systems need to assess an effect caused by Threats against safety. In this paper, we propose a Threat Analysis framework on safety concepts required by ISO 26262 in an architecture description language SCDL (Safety Concept Description Language) specifically designed for safety concepts modeling in ISO 26262 and demonstrate the effectiveness of our framework on a case study. Our research result shows the potential usage of SCDL for Threat Analysis and effect Analysis between functional safety and cybersecurity.

Riccardo Scandariato - One of the best experts on this subject based on the ideXlab platform.

  • ECSA - Two architectural Threat Analysis techniques compared
    Software Architecture, 2018
    Co-Authors: Katja Tuma, Riccardo Scandariato
    Abstract:

    In an initial attempt to systematize the research field of architectural Threat Analysis, this paper presents a comparative study of two Threat Analysis techniques. In particular, the controlled experiment presented here compares two variants of Microsoft’s STRIDE. The two variants differ in the way the Analysis is performed. In one case, each component of the software system is considered in isolation and scrutinized for potential security Threats. In the other case, the Analysis has a wider scope and considers the security Threats that might occur in a pair of interacting software components. The study compares the techniques with respect to their effectiveness in finding security Threats (benefits) as well as the time that it takes to perform the Analysis (cost). We also look into other human aspects which are important for industrial adoption, like, for instance, the perceived difficulty in learning and applying the techniques as well as the overall preference of our experimental participants.

  • Threat Analysis of software systems: A systematic literature review
    Journal of Systems and Software, 2018
    Co-Authors: Katja Tuma, Gul Calikli, Riccardo Scandariato
    Abstract:

    Architectural Threat Analysis has become an important cornerstone for organizations concerned with developing secure software. Due to the large number of existing techniques it is becoming more challenging for practitioners to select an appropriate Threat Analysis technique. Therefore, we conducted a systematic literature review (SLR) of the existing techniques for Threat Analysis. In our study we compare 26 methodologies for what concerns their applicability, characteristics of the required input for Analysis, characteristics of Analysis procedure, characteristics of Analysis outcomes and ease of adoption. We also provide insight into the obstacles for adopting the existing approaches and discuss the current state of their adoption in software engineering trends (e.g. Agile, DevOps, etc.). As a summary of our findings we have observed that: the Analysis procedure is not precisely defined, there is a lack of quality assurance of Analysis outcomes and tool support and validation are limited.

  • A privacy Threat Analysis framework: supporting the elicitation and fulfillment of privacy requirements
    Requirements Engineering, 2011
    Co-Authors: Mina Deng, Bart Preneel, Riccardo Scandariato, Kim Wuyts, Wouter Joosen
    Abstract:

    Ready or not, the digitalization of information has come, and privacy is standing out there, possibly at stake. Although digital privacy is an identified priority in our society, few systematic, effective methodologies exist that deal with privacy Threats thoroughly. This paper presents a comprehensive framework to model privacy Threats in software-based systems. First, this work provides a systematic methodology to model privacy-specific Threats. Analogous to STRIDE, an information flow–oriented model of the system is leveraged to guide the Analysis and to provide broad coverage. The methodology instructs the analyst on what issues should be investigated, and where in the model those issues could emerge. This is achieved by (i) defining a list of privacy Threat types and (ii) providing the mappings between Threat types and the elements in the system model. Second, this work provides an extensive catalog of privacy-specific Threat tree patterns that can be used to detail the Threat Analysis outlined above. Finally, this work provides the means to map the existing privacy-enhancing technologies (PETs) to the identified privacy Threats. Therefore, the selection of sound privacy countermeasures is simplified.

Dimitris Gritzalis - One of the best experts on this subject based on the ideXlab platform.

  • Threat Analysis of the session initiation protocol regarding spam
    International Performance Computing and Communications Conference, 2007
    Co-Authors: Stelios Dritsas, J Mallios, Marianthi Theoharidou, Giannis F Marias, Dimitris Gritzalis
    Abstract:

    Voice over Internet protocol (VoIP) is becoming increasingly popular due to its significant advantages regarding cost and support of enhanced multimedia services. Despite of the substantial advantages of using the Internet as the transmission medium for voice calls, we can foresee many undesirable uses, especially in terms of spam. VoIP technology may provide new means for the transmission of bulk unsolicited messages and calls (spam over Internet telephony - SPIT), mainly due to the reduced cost compared to traditional telephony. Therefore, mechanisms are essential to address the SPIT problem, while maintaining the advantages of VoIP technology. In this paper we conduct a comprehensive Threat Analysis that addresses the ascendant VoIP protocol, the session initiation protocol, in terms of its vulnerability regarding SPIT deliverance. Our Analysis introduces the requirements that the mechanisms dealing with the SPIT phenomenon should take into account, in order to be feasible and efficient.

  • IPCCC - Threat Analysis of the Session Initiation Protocol Regarding Spam
    2007 IEEE International Performance Computing and Communications Conference, 2007
    Co-Authors: Stelios Dritsas, J Mallios, Marianthi Theoharidou, Giannis F Marias, Dimitris Gritzalis
    Abstract:

    Voice over Internet protocol (VoIP) is becoming increasingly popular due to its significant advantages regarding cost and support of enhanced multimedia services. Despite of the substantial advantages of using the Internet as the transmission medium for voice calls, we can foresee many undesirable uses, especially in terms of spam. VoIP technology may provide new means for the transmission of bulk unsolicited messages and calls (spam over Internet telephony - SPIT), mainly due to the reduced cost compared to traditional telephony. Therefore, mechanisms are essential to address the SPIT problem, while maintaining the advantages of VoIP technology. In this paper we conduct a comprehensive Threat Analysis that addresses the ascendant VoIP protocol, the session initiation protocol, in terms of its vulnerability regarding SPIT deliverance. Our Analysis introduces the requirements that the mechanisms dealing with the SPIT phenomenon should take into account, in order to be feasible and efficient.

Toshihiro Yamauchi - One of the best experts on this subject based on the ideXlab platform.

  • Web access monitoring mechanism via Android WebView for Threat Analysis
    International Journal of Information Security, 2021
    Co-Authors: Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Hiroyuki Uekawa, Toshihiro Yamauchi
    Abstract:

    Many Android apps employ WebView, a component that enables the display of web content in the apps without redirecting users to web browser apps. However, WebView might also be used for cyberattacks. Moreover, to the best of our knowledge, although some countermeasures based on access control have been reported for attacks exploiting WebView, no mechanism for monitoring web access via WebView has been proposed and no Analysis results focusing on web access via WebView are available. In consideration of this limitation, we propose a web access monitoring mechanism for Android WebView to analyze web access via WebView and clarify attacks exploiting WebView. In this paper, we present the design and implementation of this mechanism by modifying Chromium WebView without any modifications to the Android framework or Linux kernel. The evaluation results of the performance achieved on introducing the proposed mechanism are also presented here. Moreover, the result of Threat Analysis of displaying a fake virus alert while browsing websites on Android is discussed to demonstrate the effectiveness of the proposed mechanism.

  • Threat Analysis of fake virus alerts using webview monitor
    International Symposium on Computing and Networking, 2019
    Co-Authors: Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Celia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi
    Abstract:

    As mobile devices have become more popular, mobile web browsing has surpassed desktop browser use and the number of mobile malware cases has increased. The methods of infiltrating Android devices with malware include malvertising and scams. Android users can access websites via web browsers and Android apps using WebView, which displays web content inside an app without redirecting users to web browsers. However, WebView is vulnerable to cyberattacks and the security mechanisms are not sufficient to prevent all attacks. In this study, to analyze web access Threats via WebView, we investigated web access to malicious websites against Android mobile devices. In particular, we focused on fake virus alerts. To monitor web access for Threat Analysis, we improved the WebView Monitor [1] to capture all web access via Android WebView. In particular, we analyzed the mechanism of displaying a fake virus alert while browsing websites on Android.