Checking security compliance between models and code

被引:3
|
作者
Tuma, Katja [1 ]
Peldszus, Sven [2 ]
Struber, Daniel [3 ,4 ]
Scandariato, Riccardo [5 ]
Juerjens, Jan [6 ,7 ]
机构
[1] Vrije Univ Amsterdam, Amsterdam, Netherlands
[2] Ruhr Univ Bochum, Bochum, Germany
[3] Radboud Univ Nijmegen, Nijmegen, Netherlands
[4] Chalmers Gothenburg Univ, Gothenburg, Sweden
[5] Hamburg Univ Technol, Hamburg, Germany
[6] Univ Koblenz Landau, Mainz, Germany
[7] Fraunhofer Inst Software & Syst Engn ISST, Dortmund, Germany
来源
SOFTWARE AND SYSTEMS MODELING | 2023年 / 22卷 / 01期
基金
欧盟地平线“2020”;
关键词
Security-by-design; Security compliance; Data flow diagram (DFD); Static program analysis; THREAT ANALYSIS; CONFORMANCE;
D O I
10.1007/s10270-022-00991-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic technique for secure data flow compliance checks between design models and code. We develop heuristic-based automated mappings between a design-level model (SecDFD, provided by humans) and a code-level representation (Program Model, automatically extracted from the implementation) in order to guide users in discovering compliance violations, and hence, potential security flaws in the code. These mappings enable an automated, and project-specific static analysis of the implementation with respect to the desired security properties of the design model. We developed two types of security compliance checks and evaluated the entire approach on open source Java projects.
引用
收藏
页码:273 / 296
页数:24
相关论文
共 50 条
  • [1] Checking security compliance between models and code
    Katja Tuma
    Sven Peldszus
    Daniel Strüber
    Riccardo Scandariato
    Jan Jürjens
    Software and Systems Modeling, 2023, 22 : 273 - 296
  • [2] Automated code compliance checking for building inspection
    Nguyen, TH
    Bedard, C
    Ha, KH
    COMPUTING IN CIVIL ENGINEERING, 1996, : 1020 - 1026
  • [3] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [4] A Compliance Checking Framework for DNN Models
    Verma, Sunny
    Wang, Chen
    Zhu, Liming
    Liu, Wei
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 6470 - 6471
  • [5] BUILDING CODE COMPLIANCE CHECKING USING BIM TECHNOLOGY
    Tang-Hung Nguyen
    Kim, Jin-Lee
    PROCEEDINGS OF THE 2011 WINTER SIMULATION CONFERENCE (WSC), 2011, : 3395 - 3400
  • [6] Property Templates for Checking Source Code Security
    Leonard, Elizabeth, I
    Archer, Myla M.
    Heitmeyer, Constance L.
    MEMOCODE 2017: PROCEEDINGS OF THE 15TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN, 2017, : 88 - 91
  • [7] Automated Code Compliance Checking for Building Envelope Design
    Tan, Xiangyang
    Hammad, Amin
    Fazio, Paul P. E.
    JOURNAL OF COMPUTING IN CIVIL ENGINEERING, 2010, 24 (02) : 203 - 211
  • [8] Approximate Reasoning and Fuzzy Evaluation in Code Compliance Checking
    Grabska, Ewa
    Lachwa, Andrzej
    Slusarczyk, Grazyna
    MAN-MACHINE INTERACTIONS 4, ICMMI 2015, 2016, 391 : 551 - 561
  • [9] Model Validation for Automated Building Code Compliance Checking
    Wu, Jin
    Zhang, Jiansong
    Debs, Luciana
    CONSTRUCTION RESEARCH CONGRESS 2022: COMPUTER APPLICATIONS, AUTOMATION, AND DATA ANALYTICS, 2022, : 640 - 650
  • [10] Clustering Information Types for Semantic Enrichment of Building Information Models to Support Automated Code Compliance Checking
    Bloch, Tanya
    Sacks, Rafael
    JOURNAL OF COMPUTING IN CIVIL ENGINEERING, 2020, 34 (06)