On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks

被引:4
作者
Koscinski, Viktoria [1 ]
Hashemi, Sara [1 ]
Mirakhorli, Mehdi [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY USA
来源
2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE | 2023年
基金
美国国家科学基金会;
关键词
Software Security Requirements; Requirements Engineering; Generative Adversarial Networks; NATURAL-LANGUAGE; SPECIFICATIONS; MODELS;
D O I
10.1109/ICSE48619.2023.00139
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security requirements engineering is a manual and error-prone activity that is often neglected due to the knowledge gap between cybersecurity professionals and software requirements engineers. In this paper, we aim to automate the process of recommending and synthesizing security requirements specifications and therefore supporting requirements engineers in soliciting and specifying security requirements. We investigate the use of Relational Generative Adversarial Networks (GANs) in automatically synthesizing security requirements specifications. We evaluate our approach using a real case study of the Court Case Management System (CCMS) developed for the Indiana Supreme Court's Division of State Court Administration. We present an approach based on RelGAN to generate security requirements specifications for the CCMS. We show that RelGAN is practical for synthesizing security requirements specifications as indicated by subject matter experts. Based on this study, we demonstrate promising results for the use of GANs in the software requirements synthesis domain. We also provide a baseline for synthesizing requirements, highlight limitations and weaknesses of RelGAN and define opportunities for further investigations.
引用
收藏
页码:1609 / 1621
页数:13
相关论文
共 59 条
  • [1] On the systematic analysis of natural language requirements with CIRCE
    Ambriola V.
    Gervasi V.
    [J]. Automated Software Engineering, 2006, 13 (1) : 107 - 167
  • [2] Non-functional Requirements in Architectural Decision Making
    Ameller, David
    Ayala, Claudia
    Cabot, Jordi
    Franch, Xavier
    [J]. IEEE SOFTWARE, 2013, 30 (02) : 61 - 67
  • [3] [Anonymous], 1998, IEEE RECOMMENDED PRA
  • [4] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [5] Argyropoulos N, 2017, PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, P4827
  • [6] Automated Checking of Conformance to Requirements Templates Using Natural Language Processing
    Arora, Chetan
    Sabetzadeh, Mehrdad
    Briand, Lionel
    Zimmer, Frank
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2015, 41 (10) : 944 - 968
  • [7] Badger J, 2014, INT REQUIR ENG CONF, P325, DOI 10.1109/RE.2014.6912279
  • [8] Berenbach B, 2003, 11TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS, P287
  • [9] Berenbach B, 2009, SOFTWARE AMP SYSTEMS, V1st
  • [10] Berenbach Brian A., 2004, OOPSLA '04: Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, P247