DocumentCode
492571
Title
Executable misuse cases for modeling security concerns
Author
Whittle, Jon ; Wijesekera, Duminda ; Hartong, Mark
Author_Institution
Dept. of Comput., Lancaster Univ., Lancaster
fYear
2008
fDate
10-18 May 2008
Firstpage
121
Lastpage
130
Abstract
Misuse cases are a way of modeling negative requirements, that is, behaviors that should not occur in a system. In particular, they can be used to model attacks on a system as well as the security mechanisms needed to avoid them. However, like use cases, misuse cases describe requirements in a high-level and informal manner. This means that, whilst they are easy to understand, they do not lend themselves to testing or analysis. In this paper, we present an executable misuse case modeling language which allows modelers to specify misuse case scenarios in a formal yet intuitive way and to execute the misuse case model in tandem with a corresponding use case model. Misuse scenarios are given in executable form and mitigations are captured using aspect-oriented modeling. The technique is useful for brainstorming potential attacks and their mitigations. Furthermore, the use of aspects allows mitigations to be maintained separately from the core system model. The paper, supported by a UML-based modeling tool, describes an application to two case studies, providing evidence that the technique can support red-teaming of security requirements for realistic systems.
Keywords
Unified Modeling Language; object-oriented programming; security of data; software tools; UML-based modeling tool; aspect-oriented modeling; executable misuse case modeling language; security mechanisms; Security; aspect scenarios; misuse cases;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering, 2008. ICSE '08. ACM/IEEE 30th International Conference on
Conference_Location
Leipzig
ISSN
0270-5257
Print_ISBN
978-1-4244-4486-1
Electronic_ISBN
0270-5257
Type
conf
DOI
10.1145/1368088.1368106
Filename
4814123
Link To Document