A framework for semi-automated co-evolution of security knowledge and system models

被引:15
作者
Buerger, Jens [1 ]
Strueber, Daniel [1 ]
Gaertner, Stefan [2 ]
Ruhroth, Thomas [1 ]
Juerjens, Jan [1 ,4 ]
Schneiders, Kurt [3 ]
机构
[1] Univ Koblenz Landau, Univ Str 1, D-56070 Koblenz, Germany
[2] Adesso AG, Stockholmer Allee 200, D-44269 Dortmund, Germany
[3] Lebniz Univ Hannover, Welfengarten 1, D-30167 Hannover, Germany
[4] Fraunhofer ISST, Emil Figge Str 1, D-44227 Dortmund, Germany
关键词
Security requirements; Software evolution; Co-evolution; Software design; Security impact analysis; REQUIREMENTS; DESIGN;
D O I
10.1016/j.jss.2018.02.003
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security is an important and challenging quality aspect of software-intensive systems, becoming even more demanding regarding long-living systems. Novel attacks and changing laws lead to security issues that did not necessarily rise from a flawed initial design, but also when the system fails to keep up with a changing environment. Thus, security requires maintenance throughout the operation phase. Ongoing adaptations in response to changed security knowledge are inevitable. A necessary prerequisite for such adaptations is a good understanding of the security-relevant parts of the system and the security knowledge. We present a model-based framework for supporting the maintenance of security during the long-term evolution of a software system. It uses ontologies to manage the system-specific and the security knowledge. With model queries, graph transformation and differencing techniques, knowledge changes are analyzed and the system model is adapted. We introduce the novel concept of Security Maintenance Rules to couple the evolution of security knowledge with co-evolutions of the system model. As evaluation, community knowledge about vulnerabilities is used (Common Weakness Enumeration database). We show the applicability of the framework to the iTrust system from the medical care domain and hence show the benefits of supporting co-evolution for maintaining secure systems. (c) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 160
页数:19
相关论文
共 64 条
[1]   Model-Based Privacy and Security Analysis with CARiSMA [J].
Ahmadian, Amir Shayan ;
Peldszus, Sven ;
Ramadan, Qusai ;
Juerjens, Jan .
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, :989-993
[2]   Measuring, analyzing and predicting security vulnerabilities in software systems [J].
Alhazmi, O. H. ;
Malaiya, Y. K. ;
Ray, I. .
COMPUTERS & SECURITY, 2007, 26 (03) :219-228
[3]  
[Anonymous], COMM WEAKN EN
[4]  
[Anonymous], 2004, Threat modeling
[5]  
Arendt T, 2010, LECT NOTES COMPUT SC, V6394, P121
[6]  
Baras DSA, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P310, DOI 10.1109/ISBAST.2014.7013140
[7]   The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach [J].
Bouneffa, Mourad ;
Ahmad, Adeel .
ENTERPRISE INFORMATION SYSTEMS, ICEIS 2013, 2014, 190 :280-295
[8]  
Bowman S., 2013, PERSPECT HLTH INF MA, V10
[9]   Eliciting security requirements through misuse activities [J].
Braz, Fabricio A. ;
Ferriandez, Eduardo B. ;
VanHilst, Michael .
DEXA 2008: 19TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2008, :328-+
[10]   Lessons from applying the systematic literature review process within the software engineering domain [J].
Brereton, Pearl ;
Kitchenham, Barbara A. ;
Budgen, David ;
Turner, Mark ;
Khalil, Mohamed .
JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (04) :571-583