Skip to main content

Showing 1–12 of 12 results for author: Tuma, K

  1. arXiv:2407.18584  [pdf, other

    cs.SE

    Designing Secure AI-based Systems: a Multi-Vocal Literature Review

    Authors: Simon Schneider, Ananya Saha, Emanuele Mezzi, Katja Tuma, Riccardo Scandariato

    Abstract: AI-based systems leverage recent advances in the field of AI/ML by combining traditional software systems with AI components. Applications are increasingly being developed in this way. Software engineers can usually rely on a plethora of supporting information on how to use and implement any given technology. For AI-based systems, however, such information is scarce. Specifically, guidance on how… ▽ More

    Submitted 26 July, 2024; originally announced July 2024.

    Comments: IEEE Secure Development Conference (SecDev)

  2. arXiv:2407.14540  [pdf

    cs.SE cs.AI cs.CR

    Risks of uncertainty propagation in Al-augmented security pipelines

    Authors: Emanuele Mezzi, Aurora Papotti, Fabio Massacci, Katja Tuma

    Abstract: The use of AI technologies is percolating into the secure development of software-based systems, with an increasing trend of composing AI-based subsystems (with uncertain levels of performance) into automated pipelines. This presents a fundamental research challenge and poses a serious threat to safety-critical domains (e.g., aviation). Despite the existing knowledge about uncertainty in risk anal… ▽ More

    Submitted 14 July, 2024; originally announced July 2024.

  3. arXiv:2407.02305  [pdf

    cs.HC

    The Equality Maturity Model: an actionable tool to advance gender balance in leadership and participation roles

    Authors: Paloma Díaz, Paula Alexandra Silva, Katja Tuma

    Abstract: The underrepresentation of women in Computer Science and Engineering is a pervasive issue, impacting the enrolment and graduation rates of female students as well as the presence of women in leadership positions in academia and industry. The European Network For Gender Balance in Informatics (EUGAIN) COST action seeks to share data, experiences, best practices, and lessons from failures, and to pr… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 10 pages, 2 figures

    MSC Class: H.m MISCELLANEOUS ACM Class: H.m

  4. arXiv:2403.09537  [pdf, other

    cs.SE

    Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub

    Authors: Francesco Minna, Fabio Massacci, Katja Tuma

    Abstract: Background: Helm is a package manager that allows defining, installing, and upgrading applications with Kubernetes (K8s), a popular container orchestration platform. A Helm chart is a collection of files describing all dependencies, resources, and parameters required for deploying an application within a K8s cluster. Objective: The goal of this study is to mine and empirically evaluate the securit… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: MSR 2024 - Registered Reports

  5. arXiv:2310.04097  [pdf, other

    cs.CY

    Impact of Gender on the Evaluation of Security Decisions

    Authors: Winnie Mbaka, Katja Tuma

    Abstract: Security decisions are made by human analysts under uncertain conditions which leaves room for bias judgement. However, little is known about how demographics like gender and education impact these judgments. We conducted an empirical study to investigate their influence on security decision evaluations, addressing this knowledge gap.

    Submitted 6 October, 2023; originally announced October 2023.

  6. arXiv:2208.01895  [pdf, other

    cs.SE

    The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan

    Authors: Katja Tuma, Romy Van Der Lee

    Abstract: Cybersecurity threat and risk analysis (RA) approaches are used to identify and mitigate security risks early-on in the software development life-cycle. Existing approaches automate only parts of the analysis procedure, leaving key decisions in identification, feasibility and risk analysis, and quality assessment to be determined by expert judgement. Therefore, in practice teams of experts manuall… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

  7. arXiv:2208.01524  [pdf, other

    cs.CR cs.SE

    A replication of a controlled experiment with two STRIDE variants

    Authors: Winnie Mbaka, Katja Tuma

    Abstract: To avoid costly security patching after software deployment, security-by-design techniques (e.g., STRIDE threat analysis) are adopted in organizations to root out security issues before the system is ever implemented. Despite the global gap in cybersecurity workforce and the high manual effort required for performing threat analysis, organizations are ramping up threat analysis activities. However… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  8. arXiv:2208.01512  [pdf, ps, other

    cs.SE

    Human Aspect of Threat Analysis: A Replication

    Authors: Katja Tuma, Winnie Mbaka

    Abstract: Background: Organizations are experiencing an increasing demand for security-by-design activities (e.g., STRIDE analyses) which require a high manual effort. This situation is worsened by the current lack of diverse (and sufficient) security workforce and inconclusive results from past studies. To date, the deciding human factors (e.g., diversity dimensions) that play a role in threat analysis hav… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  9. arXiv:2205.14498  [pdf, other

    cs.CR

    Towards a Security Stress-Test for Cloud Configurations

    Authors: Francesco Minna, Fabio Massacci, Katja Tuma

    Abstract: Securing cloud configurations is an elusive task, which is left up to system administrators who have to base their decisions on ``trial and error'' experimentations or by observing good practices (e.g., CIS Benchmarks). We propose a knowledge, AND/OR, graphs approach to model cloud deployment security objects and vulnerabilities. In this way, we can capture relationships between configurations, pe… ▽ More

    Submitted 7 June, 2022; v1 submitted 28 May, 2022; originally announced May 2022.

    Comments: Conference: The IEEE International Conference on Cloud Computing (CLOUD) 2022

  10. Checking Security Compliance between Models and Code

    Authors: Katja Tuma, Sven Peldszus, Daniel Strüber, Riccardo Scandariato, Jan Jürjens

    Abstract: It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic te… ▽ More

    Submitted 18 March, 2022; v1 submitted 19 August, 2021; originally announced August 2021.

  11. arXiv:1910.03422  [pdf, other

    cs.SE

    Finding Security Threats That Matter: An Industrial Case Study

    Authors: Katja Tuma, Christian Sandberg, Urban Thorsson, Mathias Widman, Riccardo Scandariato

    Abstract: Recent trends in the software engineering (i.e., Agile, DevOps) have shortened the development life-cycle limiting resources spent on security analysis of software designs. In this context, architecture models are (often manually) analyzed for potential security threats. Risk-last threat analysis suggests identifying all security threats before prioritizing them. In contrast, risk-first threat ana… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

  12. arXiv:1906.01961  [pdf, other

    cs.SE

    Inspection Guidelines to Identify Security Design Flaws

    Authors: Katja Tuma, Danial Hosseini, Kyriakos Malamas, Riccardo Scandariato

    Abstract: Recent trends in the software development practices (Agile, DevOps, CI) have shortened the development life-cycle causing the need for efficient security-by-design approaches. In this context, software architectures are analyzed for potential vulnerabilities and design flaws. Yet, design flaws are often documented with natural language and require a manual analysis, which is inefficient. Besides l… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.