Security for Changing Software and Systems
Jan Jürjens
TU Dortmund & Fraunhofer ISST http://jan.jurjens.de
Jan Jrjens TU Dortmund & Fraunhofer ISST http://jan.jurjens.de - - PowerPoint PPT Presentation
Security for Changing Software and Systems Jan Jrjens TU Dortmund & Fraunhofer ISST http://jan.jurjens.de The Forgotten End of the System Life-cycle Challenges: Software lifetime often longer than intended (cf. Year-2000-Bug).
TU Dortmund & Fraunhofer ISST http://jan.jurjens.de
Jan Jürjens: Security for Changing Software and Systems 2/19
Jan Jürjens: Security for Changing Software and Systems 3/19
Jan Jürjens: Security for Changing Software and Systems 4/19
[money+x>=1000] [money+x<1000]
Jan Jürjens: Security for Changing Software and Systems 5/19
Jan Jürjens: Security for Changing Software and Systems 6/19
ExtraService ≈pub NoExtraService aber nicht: ExtraService.rx() ≈pub NoExtraService.rx()
[money+x>=1000] [money+x<1000] [money+x>=1000] [money+x<1000]
Ochoa, Jürjens, Warzecha: A Sound Decision Procedure for the Compositionality of Secrecy. ESSoS’12 Ruhroth, Jürjens. Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. HASE’12 Schmidt, Jürjens: Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. CAiSE’11 Hatebur, Heisel, Jürjens, Schmidt: Systematic Development of UMLsec Design Models Based on Security Requirements. FASE’11
Jan Jürjens: Security for Changing Software and Systems 7/19
[money+x>=1000] [money+x<1000]
Jan Jürjens: Security for Changing Software and Systems 8/19
Jan Jürjens: Security for Changing Software and Systems 9/19
Jan Jürjens: Security for Changing Software and Systems 10/19
[money+x>=1000] [money+x<1000]
[money+x>=1000] [money+x<1000]
Jan Jürjens: Security for Changing Software and Systems 11/19
...
Jan Jürjens: Security for Changing Software and Systems 12/19
Wenzel, Warzecha, Jürjens, Ochoa: UMLchange – Specifying Model Changes to Support Security Verification of Potential Evolution. Journal of Computer Standards & Interfaces, 2013.
[money+x>=1000] [money+x<1000] [money+x>=1000] [money+x<1000]
M → M’
Jan Jürjens: Security for Changing Software and Systems 13/19
[Bauer, Jürjens, Yu: Run-Time Security Traceability for Evolving Systems. Computer Journal ‘11]
Jan Jürjens: Security for Changing Software and Systems 14/19
Jan Jürjens: Security for Changing Software and Systems 15/19
All paths from p to q check g.
Aizatulin, Gordon, Jürjens: Computational Verification of C Protocol Implementations by Symbolic Execution. CCS’12 Aizatulin, Gordon, Jürjens: Extracting and verifying cryptographic models from C protocol code by symbolic execution. CCS’11
Bauer, Jürjens. Runtime Verification of Crypto-graphic
Pironti, Jürjens. Formally-Based Black-Box Monitoring
Property fulfilled?
Actions
System
Property
Monitor
Runtime verification in a nutshell
automatic generation of
Jan Jürjens: Security for Changing Software and Systems 16/19
Jan Jürjens: Security for Changing Software and Systems 17/19
[Robles et al.: Evolution and Growth in Large Libre Software Projects]
Jürjens, Trachtenherz, Reiss: Model-based Quality Assurance of Automotive Software. Models’08 Jürjens et al.: Incremental Security Verification for Evolving UMLsec models. ECMFA’11 Jürjens et al.: Model-based Security Analysis for Mobile Communications. ICSE’08 Lloyd, J. Jürjens, Security Analysis of a Biometric Authentication System using UMLsec and JML. Models’09 Jürjens, Rumm: Model-based Security Analysis of the German Health Card
Mouratidis, Sunyaev, Jürjens: Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. CAiSE’09
Jan Jürjens: Security for Changing Software and Systems 18/19
Jan Jürjens: Security for Changing Software and Systems 19/19