Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings (Summary)

  • Sven Peldszus
  • , Katja Tuma
  • , Daniel Strüber
  • , Jan Jürjens
  • , Riccardo Scandariato

Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskning

Abstract

We present our paper published at the 2019 edition of the International Conference on Model Driven Engineering Languages and Systems (MODELS) [Pe19]. During the development of security-critical software, the system implementation must capture the security properties postulated by
the architectural design. To iteratively guide the developer in discovering such compliance violations we introduce automated mappings. These mappings are created by searching for correspondences between a design-level model (Security Data Flow Diagram) and an implementation-level model (Program Model). We limit the search space by considering name similarities between model elements and code elements as well as by the use of heuristic rules for matching data-Ćow structures. The automated mappings support the designer in an early discovery of implementation absence, convergence, and divergence with respect to the planned software design as well as the discovery of secure data-Ćow
compliance violations. We provide a publicly available implementation of the approach and its evaluation on Ąve open source Java projects.
OriginalsprogEngelsk
TitelSoftware engineering 2020
UdgivelsesstedBonn, Germany
ForlagGesellschaft für Informatik
Publikationsdato2020
ISBN (Trykt)9783885796947, 3885796945
DOI
StatusUdgivet - 2020
Udgivet eksterntJa

Fingeraftryk

Dyk ned i forskningsemnerne om 'Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings (Summary)'. Sammen danner de et unikt fingeraftryk.

Citationsformater