IEE Ptrones de Seguridad
IEE Ptrones de Seguridad
IEE Ptrones de Seguridad
Ninth Ninth
IEEE International Conference on Dependable, Autonomic and Secure Computing
Mohammad Zulkernine
School of Computing
Queens University
Kingston, Canada
[email protected]
School of Computing
Queens University
Kingston, Canada
[email protected]
I.
INTRODUCTION
II.
RELATED WORK
OVERVIEW
114
Security Pattern
Classification
Security Patterns
for Requirement
Phase
Security Patterns
for Design
Phase
Security Patterns
for Implementation
Phase
Using Security
Flaws and Security
Objectives
Using Security
Flaws and Security
Properties
Using Security
Flaws and Attack
Patterns
1.
2.
3.
4.
5.
6.
7.
IV.
8.
9.
10.
11.
12.
13.
14.
15.
16.
115
http://cwe.mitre.org/index.html
RP
APT
[3]
[39]
[40]
[34]
[32]
[18]
DPT
[17]
[41]
[20]
[9]
[33]
[27]
SPT
C
[12]
[26]
[2]
[45]
Legends:
Name
Another name
Intent
Motivation
Context
Problem
A
B
C
D
E
F
G
H
I
J
K
L
Resulting Context
Example Resolved
Constraints
Known Uses
Consequences
Feasibility and Risk
M
N
O
P
Q
R
Forces
Applicability
Rationale
Solution
Detail parts of solution
Implementations
P
M
S
T
U
APT
DPT
SPT
Very Detail
Intermediate Detail
Less Detail
Pattern Elements
Research Papers
PE
RP
116
Important missing
and inaccurate
requirements.
Improper privacy
requirements or
privacy related
software flaws.
Any software flaw
violating security
requirements.
Confidentiality,
Integrity,
Availability, and
Accountability.
Confidentiality,
Integrity, and
Accountability.
Confidentiality,
Integrity,
Availability, and
Accountability.
Security Properties
Security Patterns
Unsafe exception.
117
VI.
http://capec.mitre.org/
118
TABLE V. EXAMPLES OF SECURITY FLAWS MAPPING TO SECURITY PATTERNS IN THE IMPLEMENTAIONS PHASE
Security Flaws
Attack patterns
Security Patterns
ACKNOWLEDGMENT
[12]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
119
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
120