skip to main content
10.1145/1985793.1985968acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Automated security hardening for evolving UML models

Published: 21 May 2011 Publication History

Abstract

Developing security-critical software correctly and securely is difficult. To address this problem, there has been a significant amount of work over the last 10 years on providing model-based development approaches based on the Unified Modeling Language which aim to raise the trustworthiness of security-critical systems, some of them including tools allowing the user to check whether a UML model satisfies the relevant security requirements. However, when the requirements are not satisfied by a given model, it can be challenging for the user to determine which changes to do to the model so that it will indeed satisfy the security requirements. Also, the fact that software continues to evolve on an ongoing basis, even after the implementation has been shipped to the customer, increases the challenge since in principle, the software has to be re-verified after each modification, requiring significant efforts. We present work on automated tool-support that exploits recent work on secure software evolution in the Secure Change project in order to support the security hardening of evolving UML models (within the context of the UML security extension UMLsec).

References

[1]
P. Bottoni, M. Koch, F. Parisi-Presicce, and G. Taentzer. Consistency checking and visualization of OCL constraints. In UML, volume 1939 of LNCS, pages 294--308. Springer, 2000.
[2]
G. Engels, R. Heckel, and J. Küster. The Consistency Workbench: A tool for consistency management in UML-based development. In UML'03, volume 2863 of LNCS, pages 356--359, 2003.
[3]
J. Jürjens. Secure Systems Development with UML. Springer, 2005.
[4]
J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In ICSE. IEEE, 2005.
[5]
J. Jürjens, L. Montrieux, P.-Y. Schobbens, J. Schreck, and Y. Yu. Automated security hardening for UML models, 2011. Draft.
[6]
J. Jürjens, J. Schreck, and P. Bartmann. Model-based security analysis for mobile communications. In ICSE. ACM, 2008.
[7]
Á. Schmidt and D. Varró. CheckVML: A tool for model checking visual modeling languages. In UML, volume 2863 of LNCS, pages 92--95. Springer, 2003.
[8]
I. Siveroni, A. Zisman, and G. Spanoudakis. Property specification and static verification of UML models. In 3rd International Conference on Availability, Reliability, and Security (ARES'08), 2008.
[9]
UMLsec tool, 2001-2011. http://jan.jurjens.de/umlsectool.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '11: Proceedings of the 33rd International Conference on Software Engineering
May 2011
1258 pages
ISBN:9781450304450
DOI:10.1145/1985793
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 May 2011

Check for updates

Author Tags

  1. model-based development
  2. security-critical software
  3. umlsec

Qualifiers

  • Research-article

Conference

ICSE11
Sponsor:
ICSE11: International Conference on Software Engineering
May 21 - 28, 2011
HI, Waikiki, Honolulu, USA

Acceptance Rates

Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media