Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
30343.pdf (3.9 MB)
ETD Abstract Container
Abstract Header
Enhancing Software Security through Modeling Attacker Profiles
Author Info
Hussein, Nesrin
ORCID® Identifier
http://orcid.org/0000-0002-8246-0187
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409
Abstract Details
Year and Degree
2018, MS, University of Cincinnati, Engineering and Applied Science: Computer Science.
Abstract
One of the main concerns of engineering modern software is security. This is to ensure the software remains to function even under malicious attacks. Most practitioners acknowledge the importance of software security and realize that security needs to be considered as early as requirements engineering. Security requirements engineering has become a critical topic which aims to deliver the help by exploring the software vulnerabilities. Internet increases the risk of software applications specifically the security aspect. Nowadays, it has become a challenging task to protect the system from malicious attacks and initiate the protections from requirements engineering perspective. This thesis presents the main steps to establish a secure software-intensive system rooted in requirements engineering. We study the attacker profiling and we show that the adapted theory of a unified crime is productive to model the attackers and their degree of knowledge. Furthermore, we analyzed the requirements in the issue tracking systems and found that it is beneficial to propose a linear-combination-based approach to identify security requirements. In addition, we present our observation of how to enhance the test cases by considering the domain knowledge of the potential malicious attacks.
Committee
Nan Niu, Ph.D. (Committee Chair)
Dharma Agrawal, D.Sc. (Committee Member)
Raj Bhatnagar, Ph.D. (Committee Member)
Pages
90 p.
Subject Headings
Computer Science
Keywords
;
security requirements
;
Non-functional requirements
;
security related test cases
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Hussein, N. (2018).
Enhancing Software Security through Modeling Attacker Profiles
[Master's thesis, University of Cincinnati]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409
APA Style (7th edition)
Hussein, Nesrin.
Enhancing Software Security through Modeling Attacker Profiles.
2018. University of Cincinnati, Master's thesis.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409.
MLA Style (8th edition)
Hussein, Nesrin. "Enhancing Software Security through Modeling Attacker Profiles." Master's thesis, University of Cincinnati, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
ucin1523635219435409
Download Count:
391
Copyright Info
© 2018, all rights reserved.
This open access ETD is published by University of Cincinnati and OhioLINK.