Home > Research > Publications & Outputs > User-centric security assessment of software co...

Links

Text available via DOI:

View graph of relations

User-centric security assessment of software configurations: A case study

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

User-centric security assessment of software configurations: A case study. / Ghani, H.; Luna Garcia, J.; Petkov, I. et al.
Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Vol. 8364 LNCS Springer-Verlag, 2014. p. 196-212.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Ghani, H, Luna Garcia, J, Petkov, I & Suri, N 2014, User-centric security assessment of software configurations: A case study. in Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. vol. 8364 LNCS, Springer-Verlag, pp. 196-212. https://doi.org/10.1007/978-3-319-04897-0_13

APA

Ghani, H., Luna Garcia, J., Petkov, I., & Suri, N. (2014). User-centric security assessment of software configurations: A case study. In Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings (Vol. 8364 LNCS, pp. 196-212). Springer-Verlag. https://doi.org/10.1007/978-3-319-04897-0_13

Vancouver

Ghani H, Luna Garcia J, Petkov I, Suri N. User-centric security assessment of software configurations: A case study. In Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Vol. 8364 LNCS. Springer-Verlag. 2014. p. 196-212 doi: 10.1007/978-3-319-04897-0_13

Author

Ghani, H. ; Luna Garcia, J. ; Petkov, I. et al. / User-centric security assessment of software configurations : A case study. Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Vol. 8364 LNCS Springer-Verlag, 2014. pp. 196-212

Bibtex

@inproceedings{e3ac571a11b749c68427fae58aac4f0d,
title = "User-centric security assessment of software configurations: A case study",
abstract = "Software systems are invariably vulnerable to exploits, thus the need to assess their security in order to quantify the associated risk their usage entails. However, existing vulnerability assessment approaches e.g., vulnerability analyzers, have two major constraints: (a) they need the system to be already deployed to perform the analysis and, (b) they do not consider the criticality of the system within the business processes of the organization. As a result, many users, in particular small and medium-sized enterprizes are often unaware about assessing the actual technical and economical impact of vulnerability exploits in their own organizations, before the actual system's deployment. Drawing upon threat modeling techniques (i.e., attack trees), we propose a user-centric methodology to quantitatively perform a software configuration's security assessment based on (i) the expected economic impact associated with compromising the system's security goals and, (ii) a method to rank available configurations with respect to security. This paper demonstrates the feasibility and usefulness of our approach in a real-world case study based on the Amazon EC2 service. Over 2000 publicly available Amazon Machine Images are analyzed and ranked with respect to a specific business profile, before deployment in the Amazon's Cloud. {\textcopyright} 2014 Springer International Publishing Switzerland.",
keywords = "Cloud Security, Economics of Security, Security Metrics, Security Quantification, Vulnerability Assessment, Economic and social effects, Cloud securities, Economical impact, Security assessment, Security metrics, Software configuration, Vulnerability analyzers, Vulnerability assessments, Security of data",
author = "H. Ghani and {Luna Garcia}, J. and I. Petkov and Neeraj Suri",
year = "2014",
doi = "10.1007/978-3-319-04897-0_13",
language = "English",
isbn = "9783319048963",
volume = "8364 LNCS",
pages = "196--212",
booktitle = "Engineering Secure Software and Systems",
publisher = "Springer-Verlag",

}

RIS

TY - GEN

T1 - User-centric security assessment of software configurations

T2 - A case study

AU - Ghani, H.

AU - Luna Garcia, J.

AU - Petkov, I.

AU - Suri, Neeraj

PY - 2014

Y1 - 2014

N2 - Software systems are invariably vulnerable to exploits, thus the need to assess their security in order to quantify the associated risk their usage entails. However, existing vulnerability assessment approaches e.g., vulnerability analyzers, have two major constraints: (a) they need the system to be already deployed to perform the analysis and, (b) they do not consider the criticality of the system within the business processes of the organization. As a result, many users, in particular small and medium-sized enterprizes are often unaware about assessing the actual technical and economical impact of vulnerability exploits in their own organizations, before the actual system's deployment. Drawing upon threat modeling techniques (i.e., attack trees), we propose a user-centric methodology to quantitatively perform a software configuration's security assessment based on (i) the expected economic impact associated with compromising the system's security goals and, (ii) a method to rank available configurations with respect to security. This paper demonstrates the feasibility and usefulness of our approach in a real-world case study based on the Amazon EC2 service. Over 2000 publicly available Amazon Machine Images are analyzed and ranked with respect to a specific business profile, before deployment in the Amazon's Cloud. © 2014 Springer International Publishing Switzerland.

AB - Software systems are invariably vulnerable to exploits, thus the need to assess their security in order to quantify the associated risk their usage entails. However, existing vulnerability assessment approaches e.g., vulnerability analyzers, have two major constraints: (a) they need the system to be already deployed to perform the analysis and, (b) they do not consider the criticality of the system within the business processes of the organization. As a result, many users, in particular small and medium-sized enterprizes are often unaware about assessing the actual technical and economical impact of vulnerability exploits in their own organizations, before the actual system's deployment. Drawing upon threat modeling techniques (i.e., attack trees), we propose a user-centric methodology to quantitatively perform a software configuration's security assessment based on (i) the expected economic impact associated with compromising the system's security goals and, (ii) a method to rank available configurations with respect to security. This paper demonstrates the feasibility and usefulness of our approach in a real-world case study based on the Amazon EC2 service. Over 2000 publicly available Amazon Machine Images are analyzed and ranked with respect to a specific business profile, before deployment in the Amazon's Cloud. © 2014 Springer International Publishing Switzerland.

KW - Cloud Security

KW - Economics of Security

KW - Security Metrics

KW - Security Quantification

KW - Vulnerability Assessment

KW - Economic and social effects

KW - Cloud securities

KW - Economical impact

KW - Security assessment

KW - Security metrics

KW - Software configuration

KW - Vulnerability analyzers

KW - Vulnerability assessments

KW - Security of data

U2 - 10.1007/978-3-319-04897-0_13

DO - 10.1007/978-3-319-04897-0_13

M3 - Conference contribution/Paper

SN - 9783319048963

VL - 8364 LNCS

SP - 196

EP - 212

BT - Engineering Secure Software and Systems

PB - Springer-Verlag

ER -