Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper)

How to design a security engineering process that can cope with the dynamic evolution of Future Internet scenarios and the rigidity of existing system engineering processes? The SecureChange approach is to orchestrate (as opposed to integrate) security and system engineering concerns by two types of relations between engineering processes: (i) vertical relations between successive security-related processes; and (ii) horizontal relations between mainstream system engineering processes and concurrent security-related processes. This approach can be extended to cover the complete system/ software lifecycle, from early security requirement elicitation to runtime configuration and monitoring, via high-level architecting, detailed design, development, integration and design-time testing. In this paper we illustrate the high-level scientific principles of the approach.

[1]  David Lee,et al.  Formal Techniques for Distributed Systems, Joint 11th IFIP WG 6.1 International Conference FMOODS 2009 and 29th IFIP WG 6.1 International Conference FORTE 2009, Lisboa, Portugal, June 9-12, 2009. Proceedings , 2009, FMOODS/FORTE.

[2]  Frank Piessens,et al.  The Belgian Electronic Identity Card: a Verification Case Study , 2011, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[3]  Bashar Nuseibeh,et al.  Early Identification of Problem Interactions: A Tool-Supported Approach , 2009, REFSQ.

[4]  John Mylopoulos,et al.  Requirements engineering for trust management: model, methodology, and reasoning , 2006, International Journal of Information Security.

[5]  Bashar Nuseibeh,et al.  Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.

[6]  John Mylopoulos,et al.  Computer-aided Support for Secure Tropos , 2007, Automated Software Engineering.

[7]  Dániel Varró,et al.  Change-driven model transformations - Change (in) the rule to rule the change , 2012, Softw. Syst. Model..

[8]  Jan Jürjens,et al.  Secure systems development with UML , 2004 .

[9]  De WinBart,et al.  On the secure software development process , 2009 .

[10]  Charles B. Haley,et al.  D.3.2 METHOLOGY FOR EVOLUTIONARY REQUIREMENTS , 2010 .

[11]  Axel van Lamsweerde,et al.  Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.

[12]  Dániel Varró,et al.  Change-driven model transformations , 2011, Software & Systems Modeling.

[13]  Frank Piessens,et al.  Annotation Inference for Separation Logic Based Verifiers , 2011, FMOODS/FORTE.

[14]  Fabio Massacci,et al.  Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution , 2011, CAiSE.

[15]  Frank Piessens,et al.  The Belgian Electronic Identity Card: a Verification Case Study , 2011 .

[16]  Frank Piessens,et al.  A Quick Tour of the VeriFast Program Verifier , 2010, APLAS.

[17]  Ruth Breu,et al.  Living on the MoVE: Towards an Architecture for a Living Models Infrastructure , 2010, 2010 Fifth International Conference on Software Engineering Advances.

[18]  Fabio Massacci,et al.  Managing changes with legacy security engineering processes , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[19]  Brian Campbell,et al.  Amortised Memory Analysis Using the Depth of Data Structures , 2009, ESOP.

[20]  Bashar Nuseibeh,et al.  Model-Based Argument Analysis for Evolving Security Requirements , 2010, 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement.

[21]  Ketil Stølen,et al.  Risk Analysis of Changing and Evolving Systems Using CORAS , 2011, FOSAD.

[22]  Frank Piessens,et al.  Expressive modular fine-grained concurrency specification , 2011, POPL '11.

[23]  Kevin Lano,et al.  Slicing of UML models using model transformations , 2010, MODELS'10.

[24]  Julien Botella,et al.  Model-Based Security Verification and Testing for Smart-cards , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[25]  Fabrizio Di Crosta GUIDE FOR ISO/IEC 12207 (SOFTWARE LIFE CYCLE PROCESSES) , 2010 .

[26]  Véronique Normand,et al.  Toward model-based security engineering : developing a security analysis DSML , 2009 .

[27]  Jan Jürjens,et al.  Incremental Security Verification for Evolving UMLsec models , 2011, ECMFA.

[28]  Rick Salay,et al.  Relationship-based change propagation: A case study , 2009, 2009 ICSE Workshop on Modeling in Software Engineering.

[29]  Ruth Breu,et al.  Living Security - Collaborative Security Management in a Changing World , 2011 .

[30]  Fabio Massacci,et al.  A Load Time Policy Checker for Open Multi-application Smart Cards , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.

[31]  Yijun Yu,et al.  An Extended Ontology for Security Requirements , 2011, CAiSE Workshops.

[32]  Ketil Stølen,et al.  Model-Driven Risk Analysis - The CORAS Approach , 2010 .

[33]  Jameleddine Hassine,et al.  Change impact analysis for requirement evolution using use case maps , 2005, Eighth International Workshop on Principles of Software Evolution (IWPSE'05).

[34]  Ákos Horváth,et al.  Incremental evaluation of model queries over EMF models , 2010, MODELS'10.

[35]  Eric S. K. Yu,et al.  A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities , 2010, Requirements Engineering.

[36]  Wouter Joosen,et al.  On the secure software development process: CLASP, SDL and Touchpoints compared , 2009, Inf. Softw. Technol..

[37]  Fabrice Bouquet,et al.  Selective Test Generation Method for Evolving Critical Systems , 2011, 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops.