Checking security compliance between models and code

被引:3
|
作者
Tuma, Katja [1 ]
Peldszus, Sven [2 ]
Struber, Daniel [3 ,4 ]
Scandariato, Riccardo [5 ]
Juerjens, Jan [6 ,7 ]
机构
[1] Vrije Univ Amsterdam, Amsterdam, Netherlands
[2] Ruhr Univ Bochum, Bochum, Germany
[3] Radboud Univ Nijmegen, Nijmegen, Netherlands
[4] Chalmers Gothenburg Univ, Gothenburg, Sweden
[5] Hamburg Univ Technol, Hamburg, Germany
[6] Univ Koblenz Landau, Mainz, Germany
[7] Fraunhofer Inst Software & Syst Engn ISST, Dortmund, Germany
来源
SOFTWARE AND SYSTEMS MODELING | 2023年 / 22卷 / 01期
基金
欧盟地平线“2020”;
关键词
Security-by-design; Security compliance; Data flow diagram (DFD); Static program analysis; THREAT ANALYSIS; CONFORMANCE;
D O I
10.1007/s10270-022-00991-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic technique for secure data flow compliance checks between design models and code. We develop heuristic-based automated mappings between a design-level model (SecDFD, provided by humans) and a code-level representation (Program Model, automatically extracted from the implementation) in order to guide users in discovering compliance violations, and hence, potential security flaws in the code. These mappings enable an automated, and project-specific static analysis of the implementation with respect to the desired security properties of the design model. We developed two types of security compliance checks and evaluated the entire approach on open source Java projects.
引用
收藏
页码:273 / 296
页数:24
相关论文
共 50 条
  • [21] Efficient conditional compliance checking of business process models
    Groefsema, H.
    van Beest, N. R. T. P.
    Armas-Cervantes, A.
    COMPUTERS IN INDUSTRY, 2020, 115 (115)
  • [22] A Review on BIM-Based Automated Code Compliance Checking System
    Ismail, Aimi Sara
    Ali, Kherun Nita
    Iahad, Noorminshah A.
    2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE, 2017,
  • [23] Automated code compliance checking research based on BIM and knowledge graph
    Peng, Junlong
    Liu, Xiangjun
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [24] Automated code compliance checking research based on BIM and knowledge graph
    Junlong Peng
    Xiangjun Liu
    Scientific Reports, 13
  • [25] Code compliance checking of railway designs by integrating BIM, BPMN and DMN
    Haeussler, Marco
    Esser, Sebastian
    Borrmann, Andre
    AUTOMATION IN CONSTRUCTION, 2021, 121
  • [26] Design knowledge modeling and software implementation for building code compliance checking
    Yang, QZ
    Xu, XJ
    BUILDING AND ENVIRONMENT, 2004, 39 (06) : 689 - 698
  • [27] Compliance Checking for Decision-Aware Process Models
    Haarmann, Stephan
    Batoulis, Kimon
    Weske, Mathias
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, BPM 2018 INTERNATIONAL WORKSHOPS, 2019, 342 : 494 - 506
  • [28] TINMAN: A resource bound security checking system for mobile code
    Mok, AK
    Yu, WJ
    COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 178 - 193
  • [29] Compositional Equivalence Checking for Models and Code of Control Systems
    Majumdar, Rupak
    Saha, Indranil
    Ueda, Koichi
    Yazarel, Hakan
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 1564 - 1571
  • [30] Towards Efficiently Checking Compliance Against Automotive Security and Safety Standards
    Patricia, Julieth
    Ardila, Castellanos
    Gallina, Barbara
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2017), 2017, : 317 - 324