Abstract | ||
---|---|---|
Poor design has been a major source of software security problems. Rigorous and designer-friendly methodologies for modeling and analyzing secure software are highly desirable. A formal method for software development, however, often suffers from a gap between the rigidity of the method and the informal nature of system requirements. To narrow this gap, this paper presents a UML-based framework for modeling and analyzing security threats (i.e. potential security attacks) rigorously and visually. We model the intended functions of a software application with UML statechart diagrams and the security threats with sequence diagrams, respectively. Statechart diagrams are automatically converted into a graph transformation system, which has a well-established theoretical foundation. Method invocations in a sequence diagram of a security threat are interpreted as a sequence of paired graph transformations. Therefore, the analysis of a security threat is conducted through simulating the state transitions from an initial state to a final state triggered by method invocations. In our approach, designers directly work with UML diagrams to visually model system behaviors and security threats while threats can still be rigorously analyzed based on graph transformation. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1142/S0218194010004980 | INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING |
Keywords | Field | DocType |
Graph transformation, visual modeling and analysis, security threats | Data mining,Sequence diagram,UML state machine,Unified Modeling Language,Systems engineering,Computer science,Software security assurance,Applications of UML,Graph rewriting,Software development,Computer security model | Journal |
Volume | Issue | ISSN |
20 | 6 | 0218-1940 |
Citations | PageRank | References |
6 | 0.49 | 21 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jun Kong | 1 | 237 | 29.70 |
Dianxiang Xu | 2 | 790 | 73.83 |
Xiaoqin Zeng | 3 | 407 | 32.97 |