A security specific knowledge modelling approach for secure software engineering

被引:2
|
作者
Abeyrathna, A. [1 ]
Samarage, C. [1 ]
Dahanayake, B. [1 ]
Wijesiriwardana, C. [2 ]
Wimalaratne, P. [1 ]
机构
[1] Univ Colombo, Sch Comp, 35 Reid Ave, Colombo 07, Sri Lanka
[2] Univ Moratuwa, Fac Informat Technol, Katubedda, Moratuwa, Sri Lanka
关键词
Security touchpoints; software security; static code analysis; threat modelling;
D O I
10.4038/jnsfsr.v48i1.8950
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The paradigm shift of 'Build Security In' has emerged in recent decades with the underpinning idea that software security has to be an integral part of all the phases of the software development lifecycle. As a result, each phase of the lifecycle is associated with security specific best practices such as threat modelling and static code analysis. It was observed that various artefacts (i.e., security requirements, architectural flaws, bug reports, security test cases) generated as a result of security best practices tend to be disconnected from each other. This creates a significant barrier to ensure that the security issues identified in the architectural level are incorporated in the implementation level. In order to address this issue, this paper presents a knowledge-modelling based approach to semantically infer the associations between architectural level security flaws and code level security bugs, which is manually tedious. Threat modelling and static analysis are used to identify security flaws, and security bugs, respectively. The case study based experimental results reveal that the architectural security flaws have a significant impact on originating security bugs in the code level.
引用
收藏
页码:93 / 98
页数:6
相关论文
共 50 条
  • [1] Ontological Approach Toward Security Knowledge Management for Secure Software Engineering
    Lasmar, Sarra
    Ben Ghezala, Henda Hajjemi
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 6402 - 6413
  • [2] Engineering secure software by modelling privacy and security requirements
    Kreeger, MN
    Duncan, I
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
  • [3] When security meets software engineering: a case of modelling secure information systems
    Mouratidis, H
    Giorgini, P
    Manson, G
    INFORMATION SYSTEMS, 2005, 30 (08) : 609 - 629
  • [4] Secure software systems engineering: The secure Tropos approach
    Mouratidis H.
    Journal of Software, 2011, 6 (03) : 331 - 339
  • [5] AN EVENT-DRIVEN CARTOGRAPHIC APPROACH TO MODELLING SOFTWARE ENGINEERING KNOWLEDGE
    Cachia, Ernest
    Micallef, Mark
    KMIS 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2011, : 18 - 27
  • [6] Software rejuvenation approach to security engineering
    Aung, KMM
    Park, JS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 574 - 583
  • [7] A Common Body of Knowledge for Engineering Secure Software and Services
    Schwittek, Widura
    Schmidt, Holger
    Beckers, Kristian
    Eicker, Stefan
    Fassbender, Stephan
    Heisel, Maritta
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 499 - 506
  • [8] Systematic Mapping Study on Security Approaches in Secure Software Engineering
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Khan, Habib Ullah
    Ilyas, Muhammad
    IEEE ACCESS, 2021, 9 : 19139 - 19160
  • [9] SECURE SOFTWARE ENGINEERING IN ACADEMIC EDUCATION: STUDENTS' PRECONCEPTIONS OF IT SECURITY
    Jahn, S.
    Gold-Veerkamp, C.
    Reuter, R.
    Mottok, J.
    Abke, J.
    12TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI2019), 2019, : 6825 - 6834
  • [10] Case Base for Secure Software Development Using Software Security Knowledge Base
    Hazeyama, Atsuo
    Saito, Masahito
    Yoshioka, Nobukazu
    Kumagai, Azusa
    Kobashi, Takanori
    Washizaki, Hironori
    Kaiya, Haruhiko
    Okubo, Takao
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 97 - 103