Title :
Verification and Trade-Off Analysis of Security Properties in UML System Models
Author :
Georg, Geri ; Anastasakis, Kyriakos ; Bordbar, Behzad ; Houmb, Siv Hilde ; Ray, Indrakshi ; Toahchoodee, Manachai
Author_Institution :
Comput. Sci. Dept., Colorado State Univ., Fort Collins, CO, USA
Abstract :
Designing secure systems is a nontrivial task. Incomplete or faulty designs can cause security mechanisms to be incorrectly incorporated in a system, allowing them to be bypassed and resulting in a security breach. We advocate the use of the Aspect-Oriented Risk-Driven Development (AORDD) methodology for developing secure systems. This methodology begins with designers defining system assets, identifying potential attacks against them, and evaluating system risks. When a risk is unacceptable, designers must mitigate the associated threat by incorporating security mechanisms methodically into the system design. Designers next formally evaluate the resulting design to ensure that the threat has been mitigated, while still allowing development to meet other project constraints. In this paper, we focus on the AORDD analysis, which consists of: (1) a formal security evaluation and (2) a trade-off analysis that enables system designers to position alternative security solutions against each other. The formal security evaluation uses the Alloy Analyzer to provide assurance that an incorporated security mechanism performs as expected and makes the system resilient to previously identified attacks. The trade-off analysis uses a Bayesian Belief Network topology to allow equally effective security mechanisms to be compared against system security requirements and other factors such as time-to-market and budget constraints.
Keywords :
Unified Modeling Language; aspect-oriented programming; belief networks; formal verification; security of data; AORDD methodology; Alloy Analyzer; Bayesian belief network topology; UML system models; aspect-oriented risk-driven development; budget constraints; formal security evaluation; risk evaluation; secure systems design; security properties verification; time-to-market; trade-off analysis; Aspect-oriented modeling (AOM); Bayesian belief network (BBN); security analysis; trade-off analysis.;
Journal_Title :
Software Engineering, IEEE Transactions on
DOI :
10.1109/TSE.2010.36