Validating Security Design Pattern Applications by Testing Design Models

Validating Security Design Pattern Applications by Testing Design Models

Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takano Okubo, Yoshiaki Fukazawa
Copyright: © 2014 |Pages: 30
DOI: 10.4018/ijsse.2014100101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Software developers are not necessarily security experts, confirming potential threats and vulnerabilities at an early stage of the development process (e.g., in the requirement- and design-phase) is insufficient. Additionally, even if designed software considers security at an early stage, whether the software really satisfies the security requirements must be confirmed. To realize secure design, this work proposes an application to validate security patterns using model testing. Its method provides extended security patterns, which include requirement- and design-level patterns as well as a new model testing process using these patterns. After a developer specifies threats and vulnerabilities in the target system during an early stage of development, this method can validate whether the security patterns are properly applied and assess if these vulnerabilities are resolved.
Article Preview
Top

1. Introduction

Due to the increased number of business services on open networks and distributed platforms, security has become a critical issue. Software must be supported with security measures (Maruyama, Washizaki, & Yoshioka, 2008), which are addressed in every phase of software development from requirements engineering to design, implementation, testing, and deployment. However, threats and vulnerabilities within a system cannot be sufficiently identified during the early development stage. Due to the vast number of security concerns and the fact that not all software engineers are security specialists, creating software with adequate security measures is extremely difficult.

Patterns, which are reusable packages that incorporate expert knowledge, represent frequently recurring structures, behaviors, activities, processes, or “things” during the software development process. Many security patterns have been proposed to resolve security issues (Bschmann, Fernandez-Buglioni, Schumacher, Sommerlad, & Hybertson, 2002). For example, Bschmann et al (2006) propose 25 design-level security patterns. By referring to these patterns, developer can realize software with high security level efficiently.

Although UML-based models are widely used for design, especially for model-driven software development, whether the patterns are applied correctly is often not verified (Maruyama, Washizaki, & Yoshioka, 2008). Therefore, it is possible to apply a security pattern inappropriately. Additionally, properly applying a security pattern does not guarantee that threats and vulnerabilities will be resolved. These issues may result in security damage. Thus, we propose an application to validate security patterns using model testing. Our method confirms that security patterns are properly applied and assesses whether vulnerabilities are resolved. Our research aims to answer the following two Research Questions (RQs):

  • RQ1: Can our method validate an appropriate application of the security design pattern in a design model?

  • RQ2: Can our method validate the presence of vulnerabilities identified at the requirement stage before and after applying patterns?

Herein we answer these two research questions. Because the Security Pattern alone does not provide systematic guidelines with respect to applications, we formally extended existing security patterns. Then we proposed a new testing process to validate applied patterns and a tool to support model testing. Our method provides three major contributions:

  • New extended security patterns using Object Constraint Language (OCL) expressions, which include requirement- and design-level patterns;

  • A new model-testing process based on Test-Driven Development (TDD) to validate appropriate pattern applications and the existence of vulnerabilities using these extended patterns;

  • A tool to support pattern application by creating a script to execute model testing automatically.

This paper is organized as follows. Section II describes the background and problems with security software development. Section III describes related works. Section IV details our new method, which integrates the security patterns. Section V applies our pattern to a case study. Section VI describes the threats to validity of our method. Finally, Section VII summarizes this paper.

Top

2. Background And Problems

In this section, we overview common existing techniques for secure design.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing