Security risk management and mitigation are two of the most important items on several companies’ agendas. In this scenario, software attacks pose a major threat to the reliable execution of services, thus bringing negative effects on businesses. This paper presents a formal model that allows the identification of all the attacks against the assets embedded in a software application. Our approach can be used to perform the identification of the threats that loom over the assets and help to determine the potential countermeasures, that is the protections to deploy for mitigating the risks. The proposed model uses a Knowledge Base to represent the software assets, the steps that can be executed to mount an attack and their relationships. Inference rules permit the automatic discovery of attack step combinations towards the compromised assets that are discovered using a backward programming methodology. This approach is very usable as the attack discovery is fully automatic, once the Knowledge Base is populated with the information regarding the application to protect. In addition, it has been proven highly efficient and exhaustive.
Automatic discovery of software attacks via backward reasoning / Basile, Cataldo; Canavese, Daniele; D’Annoville, Jerome; De Sutter, Bjorn; Valenza, Fulvio. - ELETTRONICO. - ICSE 2015 International Workshop on Software Protection (SPRO 2015):(2015). (Intervento presentato al convegno ICSE International Workshop on Software Protection (SPRO 2015) tenutosi a Firenze nel 19 Maggio 2015) [10.1109/SPRO.2015.17].
Automatic discovery of software attacks via backward reasoning
BASILE, CATALDO;CANAVESE, DANIELE;VALENZA, FULVIO
2015
Abstract
Security risk management and mitigation are two of the most important items on several companies’ agendas. In this scenario, software attacks pose a major threat to the reliable execution of services, thus bringing negative effects on businesses. This paper presents a formal model that allows the identification of all the attacks against the assets embedded in a software application. Our approach can be used to perform the identification of the threats that loom over the assets and help to determine the potential countermeasures, that is the protections to deploy for mitigating the risks. The proposed model uses a Knowledge Base to represent the software assets, the steps that can be executed to mount an attack and their relationships. Inference rules permit the automatic discovery of attack step combinations towards the compromised assets that are discovered using a backward programming methodology. This approach is very usable as the attack discovery is fully automatic, once the Knowledge Base is populated with the information regarding the application to protect. In addition, it has been proven highly efficient and exhaustive.File | Dimensione | Formato | |
---|---|---|---|
2015SPRO_author.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Pubblico - Tutti i diritti riservati
Dimensione
209.15 kB
Formato
Adobe PDF
|
209.15 kB | Adobe PDF | Visualizza/Apri |
2015SPRO.pdf
accesso riservato
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
158.3 kB
Formato
Adobe PDF
|
158.3 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2615485