2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) (2007)
Big Island, Hawaii
Jan. 3, 2007 to Jan. 6, 2007
Yue Chen , University of Southern California, Los Angeles, USA
Barry Boehm , University of Southern California, Los Angeles, USA
Luke Sheppard , University of Southern California, Los Angeles, USA
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the total severity weights of relevant Attack Paths for Commercial Off The Shelf (COTS) systems. Compared to existing approaches, TMAP is sensitive to an organization?s business value priorities and IT environment. It distills the technical details of thousands of relevant software vulnerabilities into management-friendly numbers at a high-level. T-MAP can help system designers evaluate the security performance of COTS systems and analyze the effectiveness of security practices. In the case study, we demonstrate the steps of using T-MAP to analyze the cost-effectiveness of how system patching and upgrades can improve security. In addition, we introduce a software tool that automates the T-MAP.
Y. Chen, L. Sheppard and B. Boehm, "Value Driven Security Threat Modeling Based on Attack Path Analysis," 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)(HICSS), Big Island, Hawaii, 2007, pp. 280a.