Security risk management and mitigation are two of the most important items on several companies’ agendas. In this scenario, software attacks pose a major threat to the reliable execution of services, thus bringing negative effects on businesses. This paper presents a formal model that allows the identification of all the attacks against the assets embedded in a software application. Our approach can be used to perform the identification of the threats that loom over the assets and help to determine the potential countermeasures, that is the protections to deploy for mitigating the risks. The proposed model uses a Knowledge Base to represent the software assets, the steps that can be executed to mount an attack and their relationships. Inference rules permit the automatic discovery of attack step combinations towards the compromised assets that are discovered using a backward programming methodology. This approach is very usable as the attack discovery is fully automatic, once the Knowledge Base is populated with the information regarding the application to protect. In addition, it has been proven highly efficient and exhaustive.

Automatic discovery of software attacks via backward reasoning / Basile, Cataldo; Canavese, Daniele; D’Annoville, Jerome; De Sutter, Bjorn; Valenza, Fulvio. - ELETTRONICO. - ICSE 2015 International Workshop on Software Protection (SPRO 2015):(2015). (Intervento presentato al convegno ICSE International Workshop on Software Protection (SPRO 2015) tenutosi a Firenze nel 19 Maggio 2015) [10.1109/SPRO.2015.17].

Automatic discovery of software attacks via backward reasoning

BASILE, CATALDO;CANAVESE, DANIELE;VALENZA, FULVIO
2015

Abstract

Security risk management and mitigation are two of the most important items on several companies’ agendas. In this scenario, software attacks pose a major threat to the reliable execution of services, thus bringing negative effects on businesses. This paper presents a formal model that allows the identification of all the attacks against the assets embedded in a software application. Our approach can be used to perform the identification of the threats that loom over the assets and help to determine the potential countermeasures, that is the protections to deploy for mitigating the risks. The proposed model uses a Knowledge Base to represent the software assets, the steps that can be executed to mount an attack and their relationships. Inference rules permit the automatic discovery of attack step combinations towards the compromised assets that are discovered using a backward programming methodology. This approach is very usable as the attack discovery is fully automatic, once the Knowledge Base is populated with the information regarding the application to protect. In addition, it has been proven highly efficient and exhaustive.
File in questo prodotto:
File Dimensione Formato  
2015SPRO_author.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 209.15 kB
Formato Adobe PDF
209.15 kB Adobe PDF Visualizza/Apri
2015SPRO.pdf

non disponibili

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 158.3 kB
Formato Adobe PDF
158.3 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2615485