We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the security-critical part of the system (e.g. a crypto protocol) using the UML security extension UMLsec. The models are automatically verified for security properties using automated theorem provers. These are implemented within a framework that supports implementing verification routines, based on XMI output of the diagrams from UML CASE tools. Advanced users can use this open-source framework to implement verification routines for the constraints of self-defined security requirements. In a second step, one verifies that security-critical parts of the model are correctly imple...
The current state of the art in developing security-critical software and systems in practice is far...
With the emergence of Internet of Things (IoT), there is growing number of interconnected devices be...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
We present tool-support for checking UML models and C code against security requirements. A framewor...
Developing security-critical systems is difficult and there are many well-known examples of security...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
Security-critical systems are challenging to design and implement correctly and securely. A lot of v...
Security-critical systems are challenging to design and implement correctly and securely. A lot of v...
peer reviewedModern systems are more and more complex and security has become a key component in the...
peer reviewedModern systems are more and more complex and security has become a key component in the...
We present a way to support the development of software applications that takes into account confide...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
Developing security-critical systems is difficult, and there are many well-known examples of vulnera...
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as o...
We give an overview over the challenges in developing secure embedded systems and show how to use th...
The current state of the art in developing security-critical software and systems in practice is far...
With the emergence of Internet of Things (IoT), there is growing number of interconnected devices be...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
We present tool-support for checking UML models and C code against security requirements. A framewor...
Developing security-critical systems is difficult and there are many well-known examples of security...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
Security-critical systems are challenging to design and implement correctly and securely. A lot of v...
Security-critical systems are challenging to design and implement correctly and securely. A lot of v...
peer reviewedModern systems are more and more complex and security has become a key component in the...
peer reviewedModern systems are more and more complex and security has become a key component in the...
We present a way to support the development of software applications that takes into account confide...
Security certification of complex systems requires a high amount of effort. As a particular challeng...
Developing security-critical systems is difficult, and there are many well-known examples of vulnera...
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as o...
We give an overview over the challenges in developing secure embedded systems and show how to use th...
The current state of the art in developing security-critical software and systems in practice is far...
With the emergence of Internet of Things (IoT), there is growing number of interconnected devices be...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...