Tools for traceable security verification

  • Authors:
  • Jan Jürjens;Yijun Yu;Andreas Bauer

  • Affiliations:
  • Computing Department, The Open University, UK;Computing Department, The Open University, UK;Computer Sciences Lab, Australian National University

  • Venue:
  • VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work towards addressing this challenge which focusses on one facet of dependability, namely data security: We give an overview on an approach for modelbased security verification which provides a traceability link to the implementation. The approach uses a design model in the UML security extension UMLsec which can be formally verified against high-level security requirements such as secrecy and authenticity. An implementation of the specification can then be verified against the model by making use of run-time verification through the traceability link. The approach supports software evolution in so far as the traceability mapping is updated when refactoring operations are regressively performed using our tool-supported refactoring technique. The proposed method has been applied to an implementation of the Internet security protocol SSL.