Method to detect leaks of use case in security requirement analysis

A method based on attack patterns is proposed to help software designers to detect the leaks of use cases in the original designed use case diagram.Then some feasible mitigations can be expected.The method,based on the formulation of use cases,takes misuse cases as the special attributes of use case which are concerned to security.The information involved potential misuse case is supposed to be got from the interaction with customer.On this basis,the misuse-point can be calculated.The comparison between the misuse-point of target use case and the ones of defined attack patterns can justify whether the target use case is related to certain misuse cases or attack patterns.Thus the possible leaks of use cases will be exposed.Further,the feasible mitigations turn to be available.