skip to main content
10.1145/1321631.1321736acmconferencesArticle/Chapter ViewAbstractPublication PagesaseConference Proceedingsconference-collections
demonstration

Tools for model-based security engineering: models vs. code

Published:05 November 2007Publication History

ABSTRACT

We present tools to support model-based security engineering at both the model and the code level. In the approach supported by these tools, one firstly specifies the security-critical part of the system (e.g. a crypto protocol) using the UML security extension UMLsec. The models are automatically verified for security properties using automated theorem provers. These are implemented within a framework that supports implementing verification routines, based on XMI output of the diagrams from UML CASE tools. Advanced users can use this open-source framework to implement verification routines for the constraints of self-defined security requirement

In a second step, one verifies that security-critical parts of the model are correctly implemented in the code (which might be a legacy implementation), and applies security hardening transformations where that is not the case. This is supported by tools that (1) establish traceability through refactoring scripts and (2) modularize security hardening advices through aspect-oriented programming. The proposed method has been applied to an open-source implementation of a cryptographic protocol implementation (Jessie) in Java to build up traceability mappings and security aspects. In that application, we found a security weakness which could be fixed using our approach. The resulting refactoring scripts and security aspects have found reusability in the Java Secure Socket Extension (JSSE) library

References

  1. B. Best, J. Jürjens, and B. Nuseibeh. Model-based security engineering of distributed information systems using UMLsec. In ICSE 2007, pages 581--590. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Jürjens. UMLsec webpage, 2002-07. Accessible at http://www.umlsec.org.Google ScholarGoogle Scholar
  3. J. Jürjens. Secure Systems Development with UML. Springer, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Jürjens. Code security analysis of a biometric authentication system using automated theorem provers. In 21st Annual Computer Security Applications Conference (ACSAC 2005). IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In 27th International Conference on Software Engineering (ICSE 2005). IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Jürjens. Security analysis of crypto-based Java programs using automated theorem provers. In S. Easterbrook and S. Uchitel, editors, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006). ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Tools for model-based security engineering: models vs. code

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                ASE '07: Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering
                November 2007
                590 pages
                ISBN:9781595938824
                DOI:10.1145/1321631

                Copyright © 2007 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 5 November 2007

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • demonstration

                Acceptance Rates

                Overall Acceptance Rate82of337submissions,24%

                Upcoming Conference

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader