Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality

08/03/2023
by   Felix Schwickerath, et al.
0

Through the increasing interconnection between various systems, the need for confidential systems is increasing. Confidential systems share data only with authorized entities. However, estimating the confidentiality of a system is complex, and adjusting an already deployed software is costly. Thus, it is helpful to have confidentiality analyses, which can estimate the confidentiality already at design time. Based on an existing data-flow-based confidentiality analysis concept, we reimplemented a data flow analysis as a Java-based tool. The tool uses the software architecture to identify access violations based on the data flow. The evaluation for our tool indicates that we can analyze similar scenarios and scale for certain scenarios better than the existing analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/07/2023

Scalable and Cost-effective Data Flow Analysis for Distributed Software: Algorithms and Applications

More and more distributed software systems are being developed and deplo...
research
07/31/2019

What-Why Analysis of Expert Interviews: Analysing Geographically-Embedded Flow Data

In this paper, we present our analysis of five expert interviews, each f...
research
03/13/2020

How Fast Can We Insert? A Performance Study of Apache Kafka

Message brokers see widespread adoption in modern IT landscapes, with Ap...
research
11/30/2017

Tool Supported Analysis of IoT

The design of IoT systems could benefit from the combination of two diff...
research
04/06/2007

Empirical analysis and statistical modeling of attack processes based on honeypots

Honeypots are more and more used to collect data on malicious activities...
research
06/04/2020

Data-Flow-Based Extension of the System-Theoretic Process Analysis for Security (STPA-Sec)

Security analysis is an essential activity in security engineering to id...
research
02/13/2023

Towards Understanding Provenance in Industry

Context: Trustworthiness of software has become a first-class concern of...

Please sign up or login with your details

Forgot password? Click here to reset