skip to main content
10.1145/1852666.1852689acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Towards safe and productive development of secure software: FADES and model-based software engineering

Published:21 April 2010Publication History

ABSTRACT

Cost effective development of secure software is a key goal for many software organizations as they seek to manage the risks of misbehaving software. Employing Formal Methods (FMs) in the Model-Based Software Engineering (MBSE) paradigm that systematically produces software systems through modeling, simulation, reuse and automation provides a reasonable approach for developing highly secure software in a productive manner. MBSE approaches introduce some complexities at the beginning of the lifecycle, but save substantial time in production and delivery by identifying and resolving defects/errors early and reducing rework. On the other hand, the expertise needed for FMs and the concomitant costs often inhibit their wide employment in securing large and complex software systems. In this paper, we report our experience with Formal Analysis and Design for Engineering Security (FADES) an approach we introduced two years ago at this venue. Through systematic and automated transformation from semiformal requirements specifications to formal design, FADES facilitates embedding FMs into the development lifecycle of secure software systems. We outline the case studies and validation of FADES feasibility for the design and implementation of secure software systems. Promising experience with FADES was a necessary precursor to our work on generalizing FADES and our proposal to direct FADES toward being an MBSE approach. We discuss how the formality, transformation, reuse and automation in FADES may further enhance the MBSE-based production and delivery of secure software.

Skip Supplemental Material Section

Supplemental Material

References

  1. A. van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional Anti-Models", Proc. ICSE'04: 26th Intl. Conf. on Software Engineering, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Hassan, R., "Formal Analysis and Design for Engineering Security (FADES)," Ph.D Thesis, Virginia Tech, 2009.Google ScholarGoogle Scholar
  3. Hassan, R., Eltoweissy, M., Bohner, S., and El-Kassas, S., "The FADES Automated Derivation of Formal Software Security Specifications from Goal-Oriented Security Requirements", IET Software Journal, in press.Google ScholarGoogle Scholar
  4. Fontaine, P. J., Goal-Oriented Elaboration of Security Requirements, M. S. Thesis, Dept. Computing Science, University of Louvain, June 2001.Google ScholarGoogle Scholar
  5. Stepney, Susan, Cooper, et. al., "An Electronic Purse Specification, Refinement, and Proof", Programming Research Group, Oxford University Computing Labarotory, July 2000.Google ScholarGoogle Scholar
  6. A. van Lamsweerde and E. Letier, "Handling Obstacles in Goal-Oriented Requirements Engineering", IEEE Transactions on Software Engineering, Special Issue on Exception Handling, Vol. 26 No. 10, Oct. 2000, 978--1005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Bohner, "An Era of Change-Tolerant Systems," IEEE Computer, Vol. 40, No. 6, pp. 100--102, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. Stahl and M. Volter, "Model-Driven Software Development," John Wiley and Sons, Ltd. Publishing, 2005.Google ScholarGoogle Scholar
  9. S. Bohner and S. Mohan, "Model-Based Engineering of Software: Three Productivity Perspectives," IEEE Software Engineering Workshop, Skovede, Sweden, November 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Homeland Security, A Roadmap for Cybersecurity Research, Nov. 2009, http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf.Google ScholarGoogle Scholar
  11. National Cyber Leap Year Summit 2009, Co-Chairs' Report, http://www.nitrd.gov/NCLYSummit.aspx.Google ScholarGoogle Scholar

Index Terms

  1. Towards safe and productive development of secure software: FADES and model-based software engineering

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
                April 2010
                257 pages
                ISBN:9781450300179
                DOI:10.1145/1852666

                Copyright © 2010 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 21 April 2010

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader