Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings (Summary)
dc.contributor.author | Peldszus, Sven | |
dc.contributor.author | Tuma, Katja | |
dc.contributor.author | Strüber, Daniel | |
dc.contributor.author | Jürjens, Jan | |
dc.contributor.author | Scandariato, Riccardo | |
dc.contributor.editor | Felderer, Michael | |
dc.contributor.editor | Hasselbring, Wilhelm | |
dc.contributor.editor | Rabiser, Rick | |
dc.contributor.editor | Jung, Reiner | |
dc.date.accessioned | 2020-02-03T13:03:20Z | |
dc.date.available | 2020-02-03T13:03:20Z | |
dc.date.issued | 2020 | |
dc.description.abstract | We present our paper published at the 2019 edition of the International Conference on Model Driven Engineering Languages and Systems (MODELS). During the development of security-critical software, the system implementation must capture the security properties postulated by the architectural design. To iteratively guide the developer in discovering such compliance violations we introduce automated mappings. These mappings are created by searching for correspondences between a design-level model (Security Data Flow Diagram) and an implementation-level model (Program Model). We limit the search space by considering name similarities between model elements and code elements as well as by the use of heuristic rules for matching data-flow structures. The automated mappings support the designer in an early discovery of implementation absence, convergence, and divergence with respect to the planned software design as well as the discovery of secure data-flow compliance violations. We provide a publicly available implementation of the approach and its evaluation on five open source Java projects. | en |
dc.identifier.doi | 10.18420/SE2020_13 | |
dc.identifier.isbn | 978-3-88579-694-7 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/31689 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Software Engineering 2020 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-300 | |
dc.subject | Security-by-design | |
dc.subject | Security compliance | |
dc.subject | Data Flow Diagram (DFD) | |
dc.subject | Model-to-Model Transformation (M2M) | |
dc.title | Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings (Summary) | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | ||
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 51 | |
gi.conference.date | 24.-28. Feburar 2020 | |
gi.conference.location | Innsbruck, Austria | |
gi.conference.sessiontitle | Software Architektur, Design und Model-to-Code Mapping |
Dateien
Originalbündel
1 - 1 von 1