Identifying Implicit Vulnerabilities through Personas as Goal Models

08/11/2020
by   Shamal Faily, et al.
0

When used in requirements processes and tools, personas have the potential to identify vulnerabilities resulting from misalignment between user expectations and system goals. Typically, however, this potential is unfulfilled as personas and system goals are captured with different mindsets, by different teams, and for different purposes. If personas are visualised as goal models, it may be easier for stakeholders to see implications of their goals being satisfied or denied, and designers to incorporate the creation and analysis of such models into the broader RE tool-chain. This paper outlines a tool-supported approach for finding implicit vulnerabilities from user and system goals by reframing personas as social goal models. We illustrate this approach with a case study where previously hidden vulnerabilities based on human behaviour were identified.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/26/2023

Identifying human values from goal models: An industrial case study

Human values are principles that guide human actions and behaviour in pe...
research
12/22/2022

Detecting Network Security Vulnerabilities and Proactive Strategies to Mitigate Potential Threats

In multi-tier network systems, custom applications, Web services and pla...
research
03/09/2023

ACoRe: Automated Goal-Conflict Resolution

System goals are the statements that, in the context of software require...
research
12/20/2022

Settling the Reward Hypothesis

The reward hypothesis posits that, "all of what we mean by goals and pur...
research
05/16/2023

Sasha: creative goal-oriented reasoning in smart homes with large language models

Every smart home user interaction has an explicit or implicit goal. Exis...
research
08/12/2021

Comparative Analysis of Network Forensic Tools and Network Forensics Processes

Network Forensics (NFs) is a branch of digital forensics which used to d...
research
06/10/2020

Evaluating the Exploitability of Implicit Interactions in Distributed Systems

Implicit interactions refer to those interactions among the components o...

Please sign up or login with your details

Forgot password? Click here to reset