Threat-driven modeling and verification of secure software using aspect-oriented Petri nets

被引:100
作者
Xu, DX [1 ]
Nygard, KE [1 ]
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
关键词
software security; modeling; verification; threat modeling; Petri nets; aspect-oriented Petri nets; aspect-oriented software development;
D O I
10.1109/TSE.2006.40
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Design-level vulnerabilities are a major source of security risks in software. To improve trustworthiness of software design, this paper presents a formal threat-driven approach, which explores explicit behaviors of security threats as the mediator between security goals and applications of security features. Security threats are potential attacks, i.e., misuses and anomalies that violate the security goals of systems' intended functions. Security threats suggest what, where, and how security features for threat mitigation should be applied. To specify the intended functions, security threats, and threat mitigations of a security design as a whole, we exploit aspect-oriented Petri nets as a unified formalism. Intended functions and security threats are modeled by Petri nets, whereas threat mitigations are modeled by Petri net-based aspects due to the incremental and crosscutting nature of security features. The unified formalism facilitates verifying correctness of security threats against intended functions and verifying absence of security threats from integrated functions and threat mitigations. As a result, our approach can make software design provably secured from anticipated security threats and, thus, reduce significant design-level vulnerabilities. We demonstrate our approach through a systematic case study on the threat-driven modeling and verification of a real-world shopping cart application.
引用
收藏
页码:265 / 278
页数:14
相关论文
共 47 条
[1]   Misuse cases: Use cases with hostile intent [J].
Alexander, I .
IEEE SOFTWARE, 2003, 20 (01) :58-+
[2]  
Allen J, 2000, CMUSEI99TR028
[3]  
[Anonymous], 2000, Proceedings of the 2000 workshop on New security paradigms, NSPW '00
[4]  
BUTTYAN L, 1999, SSC1999038 SWISS FED
[5]  
CHEN H, 2004, P 11 ANN NETW DISTR, P171
[6]  
De Win B, 2001, INT FED INFO PROC, V78, P125
[7]   An approach for modeling and analysis of security system architectures [J].
Deng, Y ;
Wang, JC ;
Tsai, JJP ;
Beznosov, K .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (05) :1099-1119
[8]  
DEVANBU P, 2000, FUTURE SOFTWARE ENG, P227
[9]  
DING J, 2005, P 17 INT C SOFTW ENG, P560
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208