Security by design is a key principle for realizing secure software systems and it is advised to hunt for security flaws from the very early stages of software development. At design-time, security analysis is often performed manually by means of either threat modeling or expert-based design inspections. However, when leveraging the wide range of well-established knowledge bases on security design flaws (e.g., CWE, CAWE), these manual assessments become too time consuming, error-prone, and infeasible in the context of contemporary development practices which employ frequent iterations. This paper focuses on design inspection and explores the potential for automating the application of inspection rules to speed up the security analysis process. The contributions of this paper are: (i) the creation of a publicly available data set consisting of 26 design models annotated with security flaws, (ii) an automated approach for following inspection guidelines using model query patterns, and (iii) an empirical comparison of the results from this automated approach with those from manual inspection. Even though our results show that a complete automation of the security design flaw detection is hard to achieve, we find that some flaws (e.g., insecure data exposure) are more amenable to automation. Compared to manual analysis techniques, our results are encouraging and suggest that the automated technique could guide security analysts towards a more complete inspection of the software design, especially when analyzing large models.
Fri 23 OctDisplayed time zone: Eastern Time (US & Canada) change
15:00 - 16:15 | A7-Safety, Security and TestingTechnical Track at Room A Chair(s): Joanne M. Atlee University of Waterloo | ||
15:00 20mFull-paper | Automating the Early Detection of Security Design FlawsFT Technical Track Katja Tuma Chalmers | University of Gothenburg, Laurens Sion imec-DistriNet, KU Leuven, Riccardo Scandariato , Koen Yskout imec - DistriNet, KU Leuven Pre-print | ||
15:20 20mFull-paper | Scenario-based Specification of Security Protocols and Transformation to Security Model CheckersFT Technical Track | ||
15:40 20mFull-paper | Automating Test Schedule Generation with Domain-Specific Languages: A Configurable, Model-Driven ApproachP&I Technical Track | ||
16:00 10mDemonstration | MMINT-A 2.0: Tool Support for Lifecycle of Model-Driven Safety ArtifactsDemo Technical Track Alessio Di Sandro , Gehan Selim , Sahar Kokaly General Motors, Torin Viger , Rick Salay University of Toronto |