Model-based security analysis of feature-oriented software product lines

Author:

Peldszus Sven1,Strüber Daniel1,Jürjens Jan1

Affiliation:

1. University of Koblenz-Landau, Germany

Abstract

Today's software systems are too complex to ensure security after the fact – security has to be built into systems by design. To this end, model-based techniques such as UMLsec support the design-time specification and analysis of security requirements by providing custom model annotations and checks. Yet, a particularly challenging type of complexity arises from the variability of software product lines. Analyzing the security of all products separately is generally infeasible. In this work, we propose SecPL, a methodology for ensuring security in a software product line. SecPL allows developers to annotate the system design model with product-line variability and security requirements. To keep the exponentially large configuration space tractable during security checks, SecPL provides a family-based security analysis. In our experiments, this analysis outperforms the naive strategy of checking all products individually. Finally, we present the results of a user study that indicates the usability of our overall methodology.

Funder

Deutsche Forschungsgemeinschaft

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Graphics and Computer-Aided Design,Software

Reference60 articles.

1. Model-based Privacy and Security Analysis with CARiSMA;Ahmadian Amir Shayan;FSE.,2017

2. A Product Line Modeling and Configuration Methodology to Support Model-Based Testing: An Industrial Case Study;Ali Shaukat;MoDELS.,2012

3. Oracle Corporation and/or its affiliates. 2018. OpenJDK. (2018). http://openjdk.java.net/. Oracle Corporation and/or its affiliates. 2018. OpenJDK. (2018). http://openjdk.java.net/.

4. Sven Apel Don S. Batory Christian Kästner and Gunter Saake. 2013. Feature-Oriented Software Product Lines - Concepts and Implementation. Springer. Sven Apel Don S. Batory Christian Kästner and Gunter Saake. 2013. Feature-Oriented Software Product Lines - Concepts and Implementation . Springer.

5. Runtime verification of cryptographic protocols

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Incremental Identification of T-Wise Feature Interactions;Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems;2024-02-07

2. Microservice Security Metrics for Secure Communication, Identity Management, and Observability;ACM Transactions on Software Engineering and Methodology;2023-01-31

3. Effects of variability in models: a family of experiments;Empirical Software Engineering;2022-03-17

4. The architectural divergence problem in security and privacy of eHealth IoT product lines;Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume A;2021-09-06

5. Variability representations in class models;Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems;2020-10-16

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3