Skip to main content

Showing 1–4 of 4 results for author: Stöckle, P

Searching in archive cs. Search in all archives.
.
  1. Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules

    Authors: Patrick Stöckle, Michael Sammereier, Bernd Grobauer, Alexander Pretschner

    Abstract: Insecure default values in software settings can be exploited by attackers to compromise the system that runs the software. As a countermeasure, there exist security-configuration guides specifying in detail which values are secure. However, most administrators still refrain from hardening existing systems because the system functionality is feared to deteriorate if secure settings are applied. To… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

    Comments: Peer-reviewed version accepted for publication at the 4th ACM/IEEE International Conference on Automation of Software Test (AST 2023), May 15--16, 2023, Melbourne, AU

    Journal ref: IEEE/ACM International Conference on Automation of Software Test (AST), May 15--16, 2023, Melbourne, AU

  2. Automated Implementation of Windows-related Security-Configuration Guides

    Authors: Patrick Stöckle, Bernd Grobauer, Alexander Pretschner

    Abstract: Hardening is the process of configuring IT systems to ensure the security of the systems' components and data they process or store. The complexity of contemporary IT infrastructures, however, renders manual security hardening and maintenance a daunting task. In many organizations, security-configuration guides expressed in the SCAP (Security Content Automation Protocol) are used as a basis for… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE '20), September 21--25, 2020, Virtual Event, Australia

  3. Automated Identification of Security-Relevant Configuration Settings Using NLP

    Authors: Patrick Stöckle, Theresa Wasserer, Bernd Grobauer, Alexander Pretschner

    Abstract: To secure computer infrastructure, we need to configure all security-relevant settings. We need security experts to identify security-relevant settings, but this process is time-consuming and expensive. Our proposed solution uses state-of-the-art natural language processing to classify settings as security-relevant based on their description. Our evaluation shows that our trained classifiers do no… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: Peer-reviewed version accepted for publication in the Industry Showcase track at the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE '22), October 10--14, 2022, Rochester, MI, USA

    Journal ref: Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE '22), October 10--14, 2022, Rochester, MI, USA

  4. Hardening with Scapolite: a DevOps-based Approach for Improved Authoring and Testing of Security-Configuration Guides in Large-Scale Organizations

    Authors: Patrick Stöckle, Ionut Pruteanu, Bernd Grobauer, Alexander Pretschner

    Abstract: Security Hardening is the process of configuring IT systems to ensure the security of the systems' components and data they process or store. In many cases, so-called security-configuration guides are used as a basis for security hardening. These guides describe secure configuration settings for components such as operating systems and standard applications. Rigorous testing of security-configurat… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: We submitted this article as a full-length paper. Unfortunately, the CODASPY Program Committee decided that our paper can only be accepted in the tool track. Thus, the published version only consists of 6 pages

    Journal ref: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY '22), April 24--27, 2022, Baltimore, MD, USA