作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2011, Vol. 37 ›› Issue (4): 21-23. doi: 10.3969/j.issn.1000-3428.2011.04.008

• 博士论文 • 上一篇    下一篇

面向对象的威胁建模方法

何 可,李晓红,冯志勇   

  1. (天津大学计算机科学与技术学院,天津 300072)
  • 出版日期:2011-02-20 发布日期:2011-02-17
  • 作者简介:何 可(1981-),男,博士研究生,主研方向:可信软件,软件安全;李晓红,教授;冯志勇,教授、博士生导师
  • 基金资助:
    国家自然科学基金资助项目(90718023);国家“863”计划基金资助项目(2007AA01Z130)

Approach to Object Oriented Threat Modeling

HE Ke, LI Xiao-hong, FENG Zhi-yong   

  1. (School of Computer Science and Technology, Tianjin University, Tianjin 300072, China)
  • Online:2011-02-20 Published:2011-02-17

摘要: 为提高软件设计的可信性,提出一种面向对象的威胁建模方法,不仅能够捕捉数据流中存在的威胁,而且能够捕捉控制流中存在的威胁。基于攻击路径,从成本效益角度更准确地评估威胁,根据评估结果制定缓和方案并确定优先级,应用缓和方案改进软件设计,有效地缓和威胁,增强系统安全性。实现一个面向对象的威胁建模工具,并以实例进行了验证。

关键词: 威胁建模, 软件安全, 面向对象

Abstract: To improve trustworthiness of software design, this paper presents an object oriented threat modeling approach. This approach captures not only threats existed in data flow, but also threats existed in control flow. To precisely evaluate threats, this approach adopts an attack path based evaluation method in terms of cost-effectiveness. According to the evaluation results, mitigation measures are designed and prioritized. Applying the mitigation measures to the design of software can effectively mitigate threats and enhance the security of applications. An object oriented threat modeling tool is implemented. A case study is given to demonstrate the approach.

Key words: threat modeling, software security, object oriented

中图分类号: