DocumentCode :
1799329
Title :
Towards a framework to measure security expertise in requirements analysis
Author :
Hibshi, Hanan ; Breaux, Travis ; Riaz, Mohsin ; Williams, Laurie
Author_Institution :
Inst. for Software Res., Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear :
2014
fDate :
25-25 Aug. 2014
Firstpage :
13
Lastpage :
18
Abstract :
Research shows that commonly accepted security requirements are not generally applied in practice. Instead of relying on requirements checklists, security experts rely on their expertise and background knowledge to identify security vulnerabilities. To understand the gap between available checklists and practice, we conducted a series of interviews to encode the decision-making process of security experts and novices during security requirements analysis. Participants were asked to analyze two types of artifacts: source code, and network diagrams for vulnerabilities and to apply a requirements checklist to mitigate some of those vulnerabilities. We framed our study using Situation Awareness-a cognitive theory from psychology-to elicit responses that we later analyzed using coding theory and grounded analysis. We report our preliminary results of analyzing two interviews that reveal possible decision-making patterns that could characterize how analysts perceive, comprehend and project future threats which leads them to decide upon requirements and their specifications, in addition, to how experts use assumptions to overcome ambiguity in specifications. Our goal is to build a model that researchers can use to evaluate their security requirements methods against how experts transition through different situation awareness levels in their decision-making process.
Keywords :
decision making; formal specification; security of data; source code (software); coding theory; cognitive theory; decision-making patterns; decision-making process; grounded analysis; network diagrams; requirements checklist; security expertise; security experts; security requirements analysis; security vulnerabilities; situation awareness; source code; specifications ambiguity; Decision making; Encoding; Firewalls (computing); Interviews; Software; Uncertainty; Security; decision-making; patterns; requirements analysis; situation awareness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Evolving Security and Privacy Requirements Engineering (ESPRE), 2014 IEEE 1st Workshop on
Conference_Location :
Karlskrona
Type :
conf
DOI :
10.1109/ESPRE.2014.6890522
Filename :
6890522
Link To Document :
بازگشت