Title :
Security in Context: Analysis and Refinement of Software Architectures
Author :
Heyman, Thomas ; Scandariato, Riccardo ; Joosen, Wouter
Author_Institution :
IBBT-DistriNet, Katholieke Univ. Leuven, Leuven, Belgium
Abstract :
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the security of software-intensive system architectures that focusses on making these underlying assumptions explicit, so that they can be taken into account. Starting from an Alloy model of a software architecture, a set of constraints is elicited by leveraging model relaxation techniques. These constraints form a minimal but sufficient condition that the system must meet in order to realise its security requirements. As the approach starts from the minimal guarantees that the system environment offers, it does not depend on an explicit attacker model and can take arbitrary attacker behaviour into account. As it is iterative, it is possible to constructively integrate the approach in a secure software development life cycle. Our results are illustrated by means of a case study.
Keywords :
constraint handling; security of data; software architecture; software reliability; alloy model; arbitrary attacker behaviour; architecture refinement; constraint relaxation; context security; software architecture; software development life cycle; Analytical models; Connectors; Context; Metals; Object oriented modeling; Security; Unified modeling language; Alloy; analysis; security; software architecture;
Conference_Titel :
Computer Software and Applications Conference (COMPSAC), 2010 IEEE 34th Annual
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-7512-4
Electronic_ISBN :
0730-3157
DOI :
10.1109/COMPSAC.2010.23