@article{gegick_williams_2007, title={On the design of more secure software-intensive systems by use of attack patterns}, volume={49}, ISSN={["1873-6025"]}, DOI={10.1016/j.infsof.2006.06.002}, abstractNote={Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late changes can be difficult and more costly than if performed early in the software process. We have created regular expression-based attack patterns that show the sequential events that occur during an attack. By performing a Security Analysis for Existing Threats (SAFE-T), software engineers can match the symbols of a regular expression to their system design. An architectural analysis that identifies security vulnerabilities early in the software process can prepare software engineers for which security implementations are necessary when coding starts. A case study involving students in an upper-level undergraduate security course suggests that SAFE-T can be performed by relatively inexperienced engineers who are not experts in security. Data from the case study also suggest that the attack patterns do not restrict themselves to vulnerabilities in specific environments.}, number={4}, journal={INFORMATION AND SOFTWARE TECHNOLOGY}, author={Gegick, Michael and Williams, Laurie}, year={2007}, month={Apr}, pages={381–397} }