Formalizing Security and Safety Requirements by Mapping Attack-Fault Trees on Obstacle Models with Constraint Programming Semantics

被引:1
作者
Ponsard, Christophe [1 ]
Deprez, Jean-Christophe [1 ]
Darimont, Robert [2 ]
机构
[1] CETIC Res Ctr, Charleroi, Belgium
[2] Respect IT, Louvain La Neuve, Belgium
来源
2020 IEEE WORKSHOP ON FORMAL REQUIREMENTS (FORMREQ 2020) | 2020年
关键词
Requirements engineering; goal analysis; formal analysis; safety; security; co-engineering; constraint programming;
D O I
10.1109/FORMREQ51202.2020.00009
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Requirements Engineering (RE) covers not only the capture and structuring of various properties the system should achieve but also the identification of high-level choices on how to achieve such goals or to avoid related obstacles. Generic RE frameworks support simple formalisation of alternatives using AND/OR refinements while more specialised fields such as safety and security engineering have richer analysis capabilities respectively through fault and attack trees. In this paper, we review the various constructs proposed in those domains and state their semantics at RE level to support safety and security co-engineering. As a supplementary step, we propose a mapping on the semantics provided by Constraint Programming in order to search for optimal configurations in the design space of a RE model. We consider multiple objectives stated as non-functional requirements and formalised using quantified attributes over goal models. Our work is validated on the complex design of an oil pipe system mixing safety and security critical properties.
引用
收藏
页码:8 / 13
页数:6
相关论文
共 32 条
[1]  
[Anonymous], 1999, P 17 INT SYST SAF C
[2]  
[Anonymous], 2018, Risk management: Guidelines
[3]  
[Anonymous], 2015, 6 INT C SAFETY SECUR
[4]   Fault trees for security system design and analysis [J].
Brooke, PJ ;
Paige, RF .
COMPUTERS & SECURITY, 2003, 22 (03) :256-264
[5]   Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems [J].
Brunner, Michael ;
Huber, Michael ;
Sauerwein, Clemens ;
Breu, Ruth .
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, :334-340
[6]   Regression Nodes: Extending attack trees with data from social sciences [J].
Bullee, Jan-Willem H. ;
Montoya, Lorena ;
Pieters, Wolter ;
Junger, Marianne ;
Hartel, Pieter H. .
2015 WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, 2015, :17-23
[7]  
Darimont R., 1996, Software Engineering Notes, V21, P179, DOI 10.1145/250707.239131
[8]   Efficient attack-defense tree analysis using Pareto attribute domains [J].
Fila, Barbara ;
Widel, Wojciech .
2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, :200-215
[9]   Integrating cyber attacks within fault trees [J].
Fovino, Igor Nai ;
Masera, Marcelo ;
De Cian, Alessio .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2009, 94 (09) :1394-1402
[10]  
Harmelen F, 2008, FOUND ARTIF INTELL, pVII