During the development of security-critical software, the system implementation must capture the security properties postulated by the architectural design. This paper presents an approach to support secure data-flow compliance checks between design models and code. To iteratively guide the developer in discovering such compliance violations we introduce automated mappings. These mappings are created by searching for correspondences between a design-level model (Security Data Flow Diagram) and an implementation-level model (Program Model). We limit the search space by considering name similarities between model elements and code elements as well as by the use of heuristic rules for matching data-flow structures. The main contributions of th...
Existing security models require that information of a given security level be prevented from “leaki...
While cryptography is now readily available to everyone and can, provably, protect private informati...
While cryptography is now readily available to everyone and can, provably, protect private informati...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
Security-critical systems are challenging to design and implement correctly and securely. A lot of v...
Context: Security is a growing concern in many organizations. Industries developing software systems...
The use of open source components in software development has been growing at a rapid pace for a num...
We present PIDGIN, a program analysis and understanding tool that enables the specification and enfo...
We present a way to support the development of software applications that takes into account confide...
rity architects use a runtime architecture to look for security vulnerabilities that are architectur...
In this paper, we propose a software vulnerability checker which takes rules describing vulnerabilit...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
The security of software-intensive systems is frequently attacked. High fines or loss in reputation ...
We present tools to support model-based security engineering on both the model and the code level. I...
Existing security models require that information of a given security level be prevented from “leaki...
While cryptography is now readily available to everyone and can, provably, protect private informati...
While cryptography is now readily available to everyone and can, provably, protect private informati...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
This paper presents a practical and formal approach to analyze security-centric information flow pol...
Security-critical systems are challenging to design and implement correctly and securely. A lot of v...
Context: Security is a growing concern in many organizations. Industries developing software systems...
The use of open source components in software development has been growing at a rapid pace for a num...
We present PIDGIN, a program analysis and understanding tool that enables the specification and enfo...
We present a way to support the development of software applications that takes into account confide...
rity architects use a runtime architecture to look for security vulnerabilities that are architectur...
In this paper, we propose a software vulnerability checker which takes rules describing vulnerabilit...
Protecting confidentiality of data manipulated by programs is a growing concern in various applicati...
The security of software-intensive systems is frequently attacked. High fines or loss in reputation ...
We present tools to support model-based security engineering on both the model and the code level. I...
Existing security models require that information of a given security level be prevented from “leaki...
While cryptography is now readily available to everyone and can, provably, protect private informati...
While cryptography is now readily available to everyone and can, provably, protect private informati...