Title :
Argumentation-Based Security Requirements Analysis: BitMessage Case Study
Author :
Kovacs, Andor ; Karakatsanis, Ioannis ; Svetinovic, Davor
Author_Institution :
Electr. Eng. & Comput. Sci., Masdar Inst. of Sci. & Technol., Abu Dhabi, United Arab Emirates
Abstract :
Developers have to ensure that their systems meet certain security requirements. Structured argumentation can be a powerful tool for developers to deal with system behavior, vulnerabilities, and threats. Haley´s framework is based on construction of a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements. Incomplete and uncertain information and limited resources force the developers to settle for good-enough security. Risk assessment in Security Argumentation (RISA) extends Haley´s method with risk assessment. RISA uses publicly available catalogs of security expertise and most common attack patterns to support risk assessment. These catalogs provide valuable information to the assessment process and help the developers identify mitigations for security requirements satisfaction. RISA developers stated the most pressing issue of their future work is the validation of RISA. In previous studies, no validation of RISA framework has been done on a complex system. Hence, this work evaluates RISA framework by applying it to the security requirements analysis of the address generation module of the decentralized, peer-to-peer communication protocol Bit Message. In addition, based on this analysis, we suggest a new set of requirements to improve the security of the current Bit Message client version.
Keywords :
formal specification; peer-to-peer computing; risk management; security of data; BitMessage case study; BitMessage client version; RISA developer; RISA framework; address generation module; argumentation-based security requirements analysis; assessment process; attack pattern; complex system; decentralized BitMessage; good-enough security; limited resources; peer-to-peer communication protocol BitMessage; risk assessment in security argumentation; satisfaction argument; security expertise; security requirements satisfaction; structured argumentation; system behavior; valuable information; Catalogs; Complexity theory; Context; Generators; Graphical user interfaces; Risk management; Security; Requirements engineering; Risk-based Argumentation; Security Requirements;
Conference_Titel :
Internet of Things (iThings), 2014 IEEE International Conference on, and Green Computing and Communications (GreenCom), IEEE and Cyber, Physical and Social Computing(CPSCom), IEEE
Print_ISBN :
978-1-4799-5967-9
DOI :
10.1109/iThings.2014.74