Logo des Repositoriums
 

Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings (Summary)

dc.contributor.authorPeldszus, Sven
dc.contributor.authorTuma, Katja
dc.contributor.authorStrüber, Daniel
dc.contributor.authorJürjens, Jan
dc.contributor.authorScandariato, Riccardo
dc.contributor.editorFelderer, Michael
dc.contributor.editorHasselbring, Wilhelm
dc.contributor.editorRabiser, Rick
dc.contributor.editorJung, Reiner
dc.date.accessioned2020-02-03T13:03:20Z
dc.date.available2020-02-03T13:03:20Z
dc.date.issued2020
dc.description.abstractWe present our paper published at the 2019 edition of the International Conference on Model Driven Engineering Languages and Systems (MODELS). During the development of security-critical software, the system implementation must capture the security properties postulated by the architectural design. To iteratively guide the developer in discovering such compliance violations we introduce automated mappings. These mappings are created by searching for correspondences between a design-level model (Security Data Flow Diagram) and an implementation-level model (Program Model). We limit the search space by considering name similarities between model elements and code elements as well as by the use of heuristic rules for matching data-flow structures. The automated mappings support the designer in an early discovery of implementation absence, convergence, and divergence with respect to the planned software design as well as the discovery of secure data-flow compliance violations. We provide a publicly available implementation of the approach and its evaluation on five open source Java projects.en
dc.identifier.doi10.18420/SE2020_13
dc.identifier.isbn978-3-88579-694-7
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/31689
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSoftware Engineering 2020
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-300
dc.subjectSecurity-by-design
dc.subjectSecurity compliance
dc.subjectData Flow Diagram (DFD)
dc.subjectModel-to-Model Transformation (M2M)
dc.titleSecure Data-Flow Compliance Checks between Models and Code based on Automated Mappings (Summary)en
dc.typeText/Conference Paper
gi.citation.endPage
gi.citation.publisherPlaceBonn
gi.citation.startPage51
gi.conference.date24.-28. Feburar 2020
gi.conference.locationInnsbruck, Austria
gi.conference.sessiontitleSoftware Architektur, Design und Model-to-Code Mapping

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
B3-04.pdf
Größe:
65.64 KB
Format:
Adobe Portable Document Format