Lesegruppe/2019-01-30

Aus SDQ-Wiki
Datum 2019/01/30 11:15:00 – 2019/01/30 12:15:00
Ort Gebäude 50.34, Raum 348
Vortragende(r) Frederik Reiche
Forschungsgruppe
Titel Automated software architecture security risk analysis using formalized signatures
Autoren Mohamed Almorsy, John Grundy, and Amani S. Ibrahim
PDF https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6606612
URL https://dl.acm.org/citation.cfm?id=2486875
BibTeX https://dl.acm.org/downformats.cfm?id=2486875&parent id=2486788&expformat=bibtex
Abstract Reviewing software system architecture to pinpoint potential security flaws before proceeding with system development is a critical milestone in secure software development lifecycles. This includes identifying possible attacks or threat scenarios that target the system and may result in breaching of system security. Additionally we may also assess the strength of the system and its security architecture using well-known security metrics such as system attack surface, Compartmentalization, least-privilege, etc. However, existing efforts are limited to specific, predefined security properties or scenarios that are checked either manually or using limited toolsets. We introduce a new approach to support architecture security analysis using security scenarios and metrics. Our approach is based on formalizing attack scenarios and security metrics signature specification using the Object Constraint Language (OCL). Using formal signatures we analyse a target system to locate signature matches (for attack scenarios), or to take measurements (for security metrics). New scenarios and metrics can be incorporated and calculated provided that a formal signature can be specified. Our approach supports defining security metrics and scenarios at architecture, design, and code levels. We have developed a prototype software system architecture security analysis tool. To the best of our knowledge this is the first extensible architecture security risk analysis tool that supports both metric-based and scenario-based architecture security analysis. We have validated our approach by using it to capture and evaluate signatures from the NIST security principals and attack scenarios defined in the CAPEC database.