论文部分内容阅读
该文提出了一种基于事件分解的威胁建模方法,并对该方法在网银盾USBKey的脆弱性分析中的应用进行了分析。从应用需要保护的资产出发,此建模方法先标识出资产可能面临的威胁,通过将威胁视为事件,对事件进行逐步分解直至原子事件,以此简化威胁分析过程。该方法以事件树的方式来组织分解过程,通过该树状结构,可获得产生威胁的所有可能的攻击路径,以便检查威胁分析的完备性。对选取的攻击路径,还提出了计算威胁成功概率的方法。结合事件分解模型和通用评估准则中攻击潜力的计算方法,以USBKey中的PIN码安全为例,对USBKey产品进行了脆弱性分析。分析表明:事件分解模型为脆弱性分析提供了一套合理可行的方法,可用于提升信息产品安全评估过程的完备性。
This paper proposes a threat modeling method based on event decomposition, and analyzes the application of this method in the vulnerability analysis of USBKey in Internet Banking Shield. Based on the assets that the application needs to protect, this modeling method first identifies the threats that assets may face by simplifying the threat analysis process by treating the threat as an event, breaking it down to an atomic event. This method organizes the decomposition process by means of an event tree. Through this tree structure, all possible attack paths that generate a threat can be obtained in order to check the completeness of the threat analysis. On the chosen attack path, a method of calculating the probability of threat success is also proposed. Combining with the event decomposition model and the calculation method of attack potential in the general evaluation criteria, taking the security of PIN code in USBKey as an example, vulnerability analysis of USBKey products is carried out. The analysis shows that the event decomposition model provides a set of reasonable and feasible methods for vulnerability analysis, which can be used to improve the completeness of the information product security assessment process.