skip to main content
10.1145/3524489.3527301acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

A reimagined catalogue of software security patterns

Published:30 November 2022Publication History

ABSTRACT

Since their introduction, security patterns had the promise to aid non-security experts to design secure software, yet in practice adoption and thus impact of security patterns remains limited. We believe one of the reasons is that existing security patterns are a mixture of security advice and advice on software design, such as encapsulation for maintainability. To address this, we propose a new security pattern catalogue in which we approach patterns from a security-centric perspective instead of a generic software engineering perspective. More specifically, we treat security as a first-class citizen while relying as much as possible on the vast body of knowledge from the security domain. Furthermore, our catalogue is structured to enable easy navigation for identifying relevant security problems and selecting appropriate solutions. In order to ensure a consistent level of abstraction and allow easier combination of multiple patterns, we describe our catalogue in a uniform description language and metamodel. An initial evaluation shows that our catalogue has good coverage of common security problems and solutions, indicating the catalogue's potential, but further evaluation is required to evaluate its impact in practice.

References

  1. Iván Arce, Neil Daswani, Jim Delgrosso, Danny Dhillon, Christoph Kern, Tadayoshi Kohno, Carl Landwehr, Gary McGraw, Brook Schoenfield, Margo Seltzer, Diomidis Spinellis, Izar Tarandach, and Jacob West. 2014. Avoiding the Top 10 Software Security Design Flaws. Technical Report. IEEE.Google ScholarGoogle Scholar
  2. Michaela Bunke. 2015. Software-Security Patterns: Degree of Maturity. In Proceedings of the 20th European Conference on Pattern Languages of Programs - EuroPLoP '15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Eduardo B. Fernandez. 2013. Security Patterns in Practice - Designing Secure Architectures Using Software Patterns. John Wiley & Sons.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissidis. 1994. Design Patterns - Elements of Reusable Object-Oriented Software. Addison-Wesley.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hui Guan, Hongji Yang, and Jun Wang. 2016. An Ontology-Based Approach to Security Pattern Selection. International Journal of Automation and Computing 13, 2 (April 2016), 168--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gary McGraw. 2006. Software Security: Building Security In. Addison-Wesley Professional.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Anas Motii, Brahim Hamid, Agnès Lanusse, and Jean-Michel Bruel. 2015. Guiding the Selection of Security Patterns Based on Security Requirements and Pattern Classification. In Proceedings of the 20th European Conference on Pattern Languages of Programs (EuroPLoP '15). Association for Computing Machinery, New York, NY, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. OWASP. 2021. OWASP Top 10. https://owasp.org/Top10/.Google ScholarGoogle Scholar
  9. Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, and Peter Sommerlad. 2006. Security Patterns - Integrating Security and Systems Engineering. John Wiley & Sons.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Adam Shostack. 2014. Threat Modeling - Designing for Security. John Wiley & Sons.Google ScholarGoogle Scholar
  11. Paulo Silva. 2017. OWASP API Security Top 10 2019 - The Ten Most Critical API Security Risks. Technical Report.Google ScholarGoogle Scholar
  12. Christopher Steel, Ramesh Nagappan, and Ray Lai. 2006. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Pearson Education, Inc.Google ScholarGoogle Scholar
  13. Alexander van den Berghe and Koen Yskout. 2021. Security Pattern Catalogue. https://securitypatterns.distrinet-research.be/.Google ScholarGoogle Scholar
  14. Alexander van den Berghe, Koen Yskout, and Wouter Joosen. 2018. Security Patterns 2.0: Towards Security Patterns Based on Security Building Blocks. In SEAD'18:IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment. Gothenburg, Sweden, 45--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Andrew van der Stock, Brian Glas, Neil Smithline, and Torsten Gigler. 2017. OWASP Top 10 - 2017: The Ten Most Critical Web Application Security Risks. Technical Report. OWASP.Google ScholarGoogle Scholar
  16. Joseph Yoder and Jeffrey Barcalow. 1998. Architectural Patterns for Enabling Application Security. In Pattern Languages of Programs Conference (PLoP).Google ScholarGoogle Scholar
  17. Koen Yskout, Riccardo Scandariato, and Wouter Joosen. 2012. Does Organizing Security Patterns Focus Architectural Choices?. In 2012 34th International Conference on Software Engineering (ICSE). 617--627. Google ScholarGoogle ScholarCross RefCross Ref
  18. Koen Yskout, Riccardo Scandariato, and Wouter Joosen. 2015. Do Security Patterns Really Help Designers?. In IEEE/ACM 37th IEEE International Conference on Software Engineering. 292--302. Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    EnCyCriS '22: Proceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems
    May 2022
    64 pages
    ISBN:9781450392907
    DOI:10.1145/3524489

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 30 November 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Upcoming Conference

    ICSE 2025
  • Article Metrics

    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)7

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader