Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Checking Security Compliance between Models and Code (2108.08579v3)

Published 19 Aug 2021 in cs.SE

Abstract: It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic technique for secure data flow compliance checks between design models and code. We develop heuristic-based automated mappings between a design-level model (SecDFD, provided by humans) and a code-level representation (Program Model, automatically extracted from the implementation) in order to guide users in discovering compliance violations, and hence potential security flaws in the code. These mappings enable an automated, and project-specific static analysis of the implementation with respect to the desired security properties of the design model. We developed two types of security compliance checks and evaluated the entire approach on open source Java projects.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (5)
  1. Katja Tuma (15 papers)
  2. Sven Peldszus (6 papers)
  3. Daniel Strüber (21 papers)
  4. Riccardo Scandariato (29 papers)
  5. Jan Jürjens (11 papers)
Citations (5)

Summary

We haven't generated a summary for this paper yet.