Checking Security Compliance between Models and Code

08/19/2021
by   Katja Tuma, et al.
0

The verification that planned security mechanisms are actually implemented in the software code is a challenging endeavor. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic technique for secure data flow compliance checks between design models and code. We develop heuristic-based automated mappings between a design-level model (SecDFD, provided by humans) and a code-level representation (Program Model, automatically extracted from the implementation) in order to guide users in discovering compliance violations, and hence potential security flaws in the code. These mappings enable an automated, and project-specific static analysis of the implementation with respect to the desired security properties of the design model. We contribute with (i) a definition of corresponding elements between the design-level and the implementation-level models and a heuristic-based approach to search for correspondences, (ii) two types of security compliance checks using static code analysis, and (iii) an implementation of our approach as a publicly available Eclipse plugin, evaluated with three studies on open source Java projects. Our evaluation shows that the mappings are automatically suggested with up to 87.2 security compliance checks are relatively precise (average precision is 79.6 and 100 recall is 65.5 implementation. Finally, our approach enables a project-specific analysis with up to 62

READ FULL TEXT
research
05/12/2023

Opti Code Pro: A Heuristic Search-based Approach to Code Refactoring

This paper presents an approach that evaluates best-first search methods...
research
09/20/2022

NLP-based Automated Compliance Checking of Data Processing Agreements against GDPR

Processing personal data is regulated in Europe by the General Data Prot...
research
08/28/2022

Measuring design compliance using neural language models – an automotive case study

As the modern vehicle becomes more software-defined, it is beginning to ...
research
07/20/2020

Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance

A trusted execution environment (TEE) such as Intel Software Guard Exten...
research
04/25/2023

Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java

Dataflow diagrams (DFDs) are a valuable asset for securing applications,...
research
10/01/2019

Towards French Smart Building Code: Compliance Checking Based on Semantic Rules

Manually checking models for compliance against building regulation is a...
research
09/10/2022

Code Compliance Assessment as a Learning Problem

Manual code reviews and static code analyzers are the traditional mechan...

Please sign up or login with your details

Forgot password? Click here to reset