Rapid application security threat analysis
First Claim
1. A computer-implemented method for a computer-program module to provide application security threat-modeling, the method comprising:
- responsive to a first user input, selecting a set of model components to represent respective elements of an application;
providing class definitions for the model components, each class definition specifying a set of security threats associated with the model component;
responsive to a second user input, interconnecting at least a subset of the model components to form a logical model of the application;
responsive to a third user input, selecting a particular component of the subset;
automatically analyzing the at least a subset of the model components to identify model components of the subset having a security threat associated with a similar security threat category as one of the security threats associated with the particular component; and
changing a manner in which the components are displayed to a user in response to the selection of the particular component and the analysis.
2 Assignments
0 Petitions
Accused Products
Abstract
The following subject matter provides for modeling an application'"'"'s potential security threats at a logical component level early in the design phase of the application. Specifically, in a computer system, multiple model components are defined to represent respective logical elements of the application. Each model component includes a corresponding set of security threats that could potentially be of import not only to the component but also to the application as a whole in its physical implementation. The model components are interconnected to form a logical model of the application. One or more potential security threats are then analyzed in terms of the model components in the logical model.
-
Citations
41 Claims
-
1. A computer-implemented method for a computer-program module to provide application security threat-modeling, the method comprising:
-
responsive to a first user input, selecting a set of model components to represent respective elements of an application; providing class definitions for the model components, each class definition specifying a set of security threats associated with the model component; responsive to a second user input, interconnecting at least a subset of the model components to form a logical model of the application; responsive to a third user input, selecting a particular component of the subset; automatically analyzing the at least a subset of the model components to identify model components of the subset having a security threat associated with a similar security threat category as one of the security threats associated with the particular component; and changing a manner in which the components are displayed to a user in response to the selection of the particular component and the analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 36, 37)
-
-
11. A computer-readable medium comprising computer-executable instructions for providing application security threat-modeling, the computer-executable instructions comprising instructions for:
-
defining a plurality of model components to represent respective elements of an application, each model component specifying a set of security threats associated with the component, the model components being defined with class definitions in a component schema, and the model components being selected in response to a first user input; interconnecting, responsive to a second user input, at least a subset of the model components to form a logical model of the application; selecting, responsive to a third user input, a particular component of the subset; analyzing the at least a subset and respective interconnections to identify model components of the subset having a security threat associated with a similar threat category as one of the security threats associated with the particular component; and changing a manner in which the components are displayed to a user in response to the selection of the particular component and the analysis. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 38, 39)
-
-
21. A device comprising:
-
a memory comprising computer-executable instructions for providing application security threat-modeling; a processor that is operatively coupled to the memory, the processor being configured to fetch and execute the computer-executable instructions from the memory, the computer-executable instructions comprising instructions for; providing class definitions defining attributes of model components representing respective elements of an application, at least one attribute of the attributes associated with a model component specifying a set of security threats applicable to the model component, the model components being selected in response to a first user input; presenting symbols associated with at least a subset of the model components on a display; interconnecting respective ones of the at least a subset to form a logical model of the application; responsive to a second user input, selecting a particular component of the subset; analyzing the at least a subset of the model components to identify model components of the subset having a security threat associated with a similar security threat category as one of the security threats associated with the particular component; and changing a manner in which the components are displayed to a user in response to the selection of the particular component and the analysis. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 40, 41)
-
-
31. A computing device comprising:
-
processing means for presenting a user interface for application security threat-modeling, the processing means comprising; means for displaying and interconnecting a plurality of model components to design a logical model of an application, at least a subset of the model components comprising a corresponding set of security threat characteristics defined in a schema of class definitions for the model components; means for specifying a component of the model components in the logical model; means for analyzing the at least a subset of the model components to identify model components of the subset having a security threat associated with a similar security threat category as one of the security threats associated with the specified component; means for changing a manner in which the components are displayed in response to the specification of the particular component; and means for selecting a particular solution to mitigate the security threats in the logical model. - View Dependent Claims (32, 33, 34, 35)
-
Specification