Run-time security traceability for evolving systems

dc.contributor.authorBauer, Andreas
dc.contributor.authorJurjens, Jan
dc.contributor.authorYu, Yijun
dc.date.accessioned2015-12-10T23:18:12Z
dc.date.issued2011
dc.date.updated2016-02-24T08:09:14Z
dc.description.abstractSecurity-critical systems are challenging to design and implement correctly and securely. A lot of vulnerabilities have been found in current software systems both at the specification and the implementation levels. This paper presents a comprehensive approach for model-based security assurance. Initially, it allows one to formally verify the design models against high-level security requirements such as secrecy and authentication on the specification level, and helps to ensure that their implementation adheres to these properties, if they express a system's run-time behaviour. As such, it provides a traceability link from the design model to its implementation by which the actual system can then be verified against the model while it executes. This part of our approach relies on a technique also known as run-time verification. The extra effort for it is small as most of the computation is automated; however, additional resources at run-time may be required. If during run-time verification a security weakness is uncovered, it can be removed using aspect-oriented security hardening transformations. Therefore, this approach also supports the evolution of software since the traceability mapping is updated when refactoring operations are regressively performed using our tool-supported refactoring technique. The proposed method has been applied to the Java-based implementation Jessie of the Internet security protocol SSL, in which a security weakness was detected and fixed using our approach. We also explain how the traceability link can be transformed to the official implementation of the Java secure sockets extension that was recently made open source by Sun.
dc.identifier.issn0010-4620
dc.identifier.urihttp://hdl.handle.net/1885/65518
dc.publisherOxford University Press
dc.sourceThe Computer Journal
dc.subjectKeywords: Cryptographic protocols; Formal verifications; IT security; Requirements traceability; Run-time verification; Security analysis; Software Evolution; Computer software selection and evaluation; Cryptography; Design; Internet protocols; Mathematical models; cryptographic protocols; formal verification; IT security; monitoring; requirements traceability; run-time verification; security analysis; software evolution
dc.titleRun-time security traceability for evolving systems
dc.typeJournal article
local.bibliographicCitation.issue1
local.bibliographicCitation.lastpage87
local.bibliographicCitation.startpage58
local.contributor.affiliationBauer, Andreas, College of Engineering and Computer Science, ANU
local.contributor.affiliationJurjens, Jan, Department of Computer Science, TU Dortmund and Fraunhofer
local.contributor.affiliationYu, Yijun, The Open University
local.contributor.authoruidBauer, Andreas, u4492070
local.description.embargo2037-12-31
local.description.notesImported from ARIES
local.identifier.absfor080303 - Computer System Security
local.identifier.absseo970108 - Expanding Knowledge in the Information and Computing Sciences
local.identifier.ariespublicationf2965xPUB1118
local.identifier.citationvolume54
local.identifier.doi10.1093/comjnl/bxq042
local.identifier.scopusID2-s2.0-78650881151
local.type.statusPublished Version

Downloads

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
01_Bauer_Run-time_security_traceability_2011.pdf
Size:
879.56 KB
Format:
Adobe Portable Document Format