A Hybrid Monitoring of Software Design-Level Security Specifications

被引:5
作者
Khan, Muhammad Umair [1 ]
Zulkernine, Mohammad [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
来源
2014 14TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC 2014) | 2014年
关键词
design-level; security specifications; monitoring;
D O I
10.1109/QSIC.2014.14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The behavior of the deployed software should be monitored against its security specifications to identify vulnerabilities introduced due to incorrect implementation of secure design decisions. Security specifications, including design-level ones, impose constraints on the behavior of the software. These constraints can be broadly categorized as non-time-critical and time-critical and have to be monitored in a manner that minimizes the monitoring overhead. In this paper, we suggest using a hybrid of event and time monitoring techniques to observe these constraints. The viability of the hybrid technique is assessed by comparing its effectiveness and performance with event and time monitoring techniques. The results indicate that the hybrid monitoring technique is more effective and efficient when compared separately with event or time monitoring.
引用
收藏
页码:111 / 116
页数:6
相关论文
共 30 条
[1]  
Aggarwal A, 2006, ISSRE 2006:17TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, P146
[2]  
[Anonymous], 2006, Software security: building security in
[3]  
[Anonymous], 200567 CERIAS PURD U
[4]  
Bandhakavi S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P12
[5]  
Buehrer G., 2005, P 5 INT WORKSH SOFTW, P106, DOI DOI 10.1145/1108473.1108496
[6]   RAD: A compile-time solution to buffer overflow attacks [J].
Chiueh, TC ;
Hsu, FH .
21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, :409-417
[7]  
Cowan C, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P63
[8]   A taxonomy and catalog of runtime software-fault monitoring tools [J].
Delgado, N ;
Gates, AQ ;
Roach, S .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2004, 30 (12) :859-872
[9]   Efficiently detecting all dangling pointer uses in production servers [J].
Dhurjati, Dinakar ;
Adve, Vikram .
DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, :269-278
[10]  
Gilliam DP, 2003, TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, P243