Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jostein Jensen is active.

Publication


Featured researches published by Jostein Jensen.


availability, reliability and security | 2010

Combining Misuse Cases with Attack Trees and Security Activity Models

Inger Anne Tøndel; Jostein Jensen; Lillian Røstad

Misuse cases and attack trees have been suggested for security requirements elicitation and threat modeling in software projects. Their use is believed to increase security awareness throughout the software development life cycle. Experiments have identified strengths and weaknesses of both model types. In this paper we present how misuse cases and attack trees can be linked to get a high-level view of the threats towards a system through misuse case diagrams and a more detailed view on each threat through attack trees. Further, we introduce links to security activity descriptions in the form of UML activity graphs. These can be used to describe mitigating security activities for each identified threat. The linking of different models makes most sense when security modeling is supported by tools, and we present the concept of a security repository that is being built to store models and relations such as those presented in this paper.


availability, reliability and security | 2009

An Architectural Foundation for Security Model Sharing and Reuse

Per Håkon Meland; Shanai Ardi; Jostein Jensen; Erkuden Rios; Txus Sanchez; Nahid Shahmehri; Inger Anne Tøndel

Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development.This situation can be improved by using an online repository, the SHIELDS SVRS, that facilitates fast and easy interchange of security artefacts between security experts, software developers and their assisting tools. Such security artefacts are embedded in or represented as security models containing the needed information to detect, remove and prevent vulnerabilities in software, independent of the applied development process. The purpose of this paper is to explain the main reference architecture description of the repository and the more general tool stereotypes that can communicate with it.


availability, reliability and security | 2009

Reusable Security Requirements for Healthcare Applications

Jostein Jensen; Inger Anne Tøndel; Martin Gilje Jaatun; Per Håkon Meland; Herbjørn Andresen

Healthcare information systems are currently being migrated from paper based journals to fully digitalised information platforms. Protecting patient privacy is thus becoming an increasingly complex task, where several national and international legal requirements must be met. These legal requirements present only high-level goals for privacy protection, leaving the details of security requirements engineering to the developers of electronic healthcare systems. Our objective has been to map legal requirements for sensitive personal information to a set of reusable technical information security requirements. This paper presents examples of such requirements extracted from legislation applicable to the healthcare domain.


international conference on engineering secure software and systems | 2010

Idea: reusability of threat models – two approaches with an experimental evaluation

Per H̊akon Meland; Inger Anne Tøndel; Jostein Jensen

To support software developers in addressing security, we encourage to take advantage of reusable threat models for knowledge sharing and to achieve a general increase in efficiency and quality. This paper presents a controlled experiment with a qualitative evaluation of two approaches supporting threat modelling - reuse of categorised misuse case stubs and reuse of full misuse case diagrams. In both approaches, misuse case threats were coupled with attack trees to give more insight on the attack techniques and how to mitigate them through security use cases. Seven professional software developers from two European software companies took part in the experiment. Participants were able to identify threats and mitigations they would not have identified otherwise. They also reported that both approaches were easy to learn, seemed to improve productivity and that using them were likely to improve their own skills and confidence in the results.


availability, reliability and security | 2008

A Novel Testbed for Detection of Malicious Software Functionality

Jostein Jensen

Behavioural software analysis is suggested by several research communities as a principle to complement the traditional signature-based anti-virus tools. This paper presents a novel open-source testbed for behavioural software analysis, designed to meet current trends in the malware community by allowing controlled access to the Internet in the analysis phase. General malware detection theories are studied and their principles combined to provide a powerful software analysis environment. A novel way of using honeypot technology is proposed to build a testbed that is able to analyse current threats.


international conference on internet monitoring and protection | 2009

Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-Day Malware

Havard Vegge; Finn Michael Halvorsen; Rune Walso Nergard; Martin Gilje Jaatun; Jostein Jensen

Zero-day malware is malware that is based on zero-day exploits and/or malware that is otherwise so new that it is not detected by any anti-virus or anti-malware scanners. This paper presents an empirical study that exposed updated Micsosoft Windows XP PCs with updated anti-virus software to a number of unsavoury Internet software repositories. A total of 124 zero-day malware instances were detected in our experiment. Our conclusion is that if a user is sufficiently adventurous (or foolish), no anti-virus protection can prevent a zero-day malware infection.


international conference on information and communication security | 2010

Experimental threat model reuse with misuse case diagrams

Jostein Jensen; Inger Anne Tøndel; Per Håkon Meland

This paper presents an experiment on the reusability of threat models, specifically misuse case diagrams. The objective was to investigate the produced and perceived differences when modelling with or without the aid of existing models. 30 participants worked with two case studies using a Latin-squares experimental design. Results show that reuse is the preferred alternative. However, the existing models must be of high quality, otherwise a security risk would arise due to false confidence. Also, reuse of misuse case diagrams is perceived to improve the quality of the new models as well as improve productivity compared to modelling from scratch.


availability, reliability and security | 2008

Secure Software Design in Practice

Per Håkon Meland; Jostein Jensen


international conference on software testing verification and validation | 2008

Learning from Software Security Testing

Inger Anne Tøndel; Martin Gilje Jaatun; Jostein Jensen


183-216 | 2011

A Lightweight Approach to Secure Software Engineering

Martin Gilje Jaatun; Jostein Jensen; Per Håkon Meland; Inger Anne Tøndel

Collaboration


Dive into the Jostein Jensen's collaboration.

Top Co-Authors

Avatar

Finn Michael Halvorsen

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Havard Vegge

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Rune Walso Nergard

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lillian Røstad

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge