• Keine Ergebnisse gefunden

Modelling secure Itô systems - A survey

N/A
N/A
Protected

Academic year: 2022

Aktie "Modelling secure Itô systems - A survey"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Modelling Secure IT Systems–A Survey

Johannes Gr¨unbauer, Jan J¨urjens, Guido Wimmel

Software & Systems Engineering, Institut f¨ur Informatik, TU M¨unchen {gruenbau|juerjens|wimmel}@in.tum.de

Motivation

The development of security-critical systems is difficult. Many systems are designed and realised which exhibit severe shortcomings, which sometimes enable spectacular exploits. In this short paper we give a brief overview on work at the Software & Systems Engineering group at TU M¨unchen regarding this problem.

UMLsec

The Unified Modelling Language (UML, [RJB99], the de facto industrial standard in object- oriented modelling) offers an unprecedented opportunity for high-quality critical systems devel- opment that is feasible in an industrial context.

The advantages of UMLsec are, that a large number of developers is trained in UML. Further- more, compared to previous notations with a user community of comparable size, UML is rel- atively precisely defined. In the end, there exist many tools or are being developed to construct and analyse UML models, to generate code, etc.

We use stereotypes, tags and constraints to encapsulate knowledge on prudent security engineer- ing and thereby make it available to developers which may not be specialised in security. Some examples for the use of UMLsec diagrams are as follows:

Use case diagrams are commonly used to describe typical interactions between a user and a computer system in requirements elicitation. They can be used to capture security requirements.

Activity diagrams can be used to model workflow and to explain use cases in more detail.

Similarly, they can be used to make security requirements more precise. The control flow within activity diagrams can depend on security requirements.

Deployment diagrams are used to describe the physical layer of a system. We use them to check whether the security requirements on the logical level of the system are enforced by the level of physical security, or whether additional security mechanisms (such as encryption) have to be employed.

Statechart diagrams, showing the changes in state throughout an object’s life, can be used to specify security requirements on the resulting sequences of states and the interaction with the object’s environment.

For more details, see [J¨u04].

(2)

AUTOFOCUS

Software-Engineering of security-critical systems can be supported by the tool AUTOFOCUS. AUTOFOCUSis a CASE tool for graphically specifying distributed systems. It is based on the formal method FOCUS, and its models have a simple, formally defined semantics. AUTOFOCUS

offers standard, easy-to-use description techniques for an end-user who does not necessarily need to be a formal methods expert, as well as state-of-the-art techniques for validation and verification of the modelled systems. Systems are specified in AUTOFOCUSusing static and dynamic views, which are conceptually similar to those offered in UML-RT. To be able to model, verify and validate security-critical systems, security aspects were included. AUTOFOCUS models should be used in security-critical systems development if a high degree of formality and tool support is required. Designers are thus forced to use a restricted set of description techniques and learn the (however intuitive) AUTOFOCUSnotation. See [AF] for more information and a tutorial.

Secure Systems Development Based on the Common Criteria

The Common Criteria for IT Security Evaluation (CC) is an international standard for the assess- ment and certification of the security of an IT system. To obtain an evaluation according to the CC, one has to fulfil a number of requirements (such as models of different degree of formality, testing, configuration and life cycle management etc.) in the development of the system to be certified. The CC does not specify at which point in development the activities to fulfil these requirements must be carried out.

Case Studies

To demonstrate these techniques, there exist several case studies. Several case studies for UMLsec can be found in [J¨u04]. [Ve01, VWW02] describes a process model for secure systems devel- opment based on the CC, which suggests appropriate points in development to fulfil the require- ments of the CC, in context of a phase oriented process. The process has been applied in the case study PalME. A special application of the modelling tool AUTOFOCUS in the field “Security Engineering” can be found in [GHJW03]. Here, two security protocols have been modelled in AUTOFOCUSand model checked for correctness.

References

[AF] AUTOFOCUShomepage. URL:http://autofocus.in.tum.de.

[GHJW03] Gr¨unbauer, J., Hollmann, H., J¨urjens, J., und Wimmel, G.: Modelling and verification of layered security-protocols: A bank application. In: SAFECOMP’03. LNCS. Springer. 2003.

[J¨u04] J¨urjens, J.: Secure Systems Development with UML. Springer. March 2004. To be published.

[RJB99] Rumbaugh, J., Jacobson, I., und Booch, G.: The Unified Modeling Language Reference Man- ual. Addison-Wesley. 1999.

[Ve01] Vetterling, M.: Security Engineering nach den Common Criteria — eine Fallstudie. Master’s thesis. Technische Universit¨at M¨unchen. August 2001.

[VWW02] Vetterling, M., Wimmel, G., und Wißpeintner, A.: Secure Systems Development Based on the Common Criteria. In: 10th International Symposium on the Foundations of Software Engi- neering (FSE-10). 2002.

Referenzen

ÄHNLICHE DOKUMENTE

In case the agent meets another agent it has not traded with before and consequently does not have any direct information about this agent, the second part of Yu and Singh’s model

Moreover, recent research as well as experience from practice shows companies utilizing different development approaches to assemble the best-fitting approach for the

While the filter functions in Linux are executed as sub-routines within the TCP/IP stack, the MinixWall filters network packages by a single filter process in user mode and enables

As opposed to most other SnC techniques, se- crecy in the code voting approach does neither assume the voting environment nor the standard communication channel between the voter

In order to evaluate Internet voting systems with regard to election principles, those abstract principles were refined into technical requirements and evaluation metrics for

Secure operating systems need secure user interfaces to provide users a trusted path to applications.. We have pre- sented a security pattern for graphical user

Source: Technical Report "Secure Software Delivery and Installation in Embedded Systems", http://www.prosec.rub.de/.. CHANGES IN THE ROLE OF SW IN AN

To protect the initial boot module (and its verification data) and to reliably build the chain of trust, the root of trust is realized in hardware. Hardware is assumed to be more