SlideShare a Scribd company logo
1 of 32
UMLassure: A UML profile to model security requirements in software systems Presented by Manish Thaper(2007068) Supervised by Prof. ChandrashekarRamanathan International Institute of Information Technology, Bangalore
Welcome HARDWARE SOFTWARE EVERYWARE++ ++ http://designmind.frogdesign.com/events/software-hardware-everyware.html
So are …..
Whatever ! the Information flow must continue.
Hence a business case to…. Furthermore, the need for an expert software solution provider will never die.
Thesis background
A software solution….  …is composed of [2] Functional requirement (FR) A software should increase information availability Non-functional requirement (NFR) Security, reliability, performance, usability
Software development phases. Thesis focused at transition from Design to Construction
Problem Statement Software fraternity has long been attempting an improved translation of requirements and design artifacts into construction and deployment phases.  A successful examples exists on automating translation of functional requirements. Our research is on devising an approach to automate translation of the forgotten non-functional requirements from artifacts into construction.
Literature survey “If I have seen further it is by standing on the shoulders of giants.”			    Newton - 1675
Literature survey Goal requirement languages[23] Threat modeling[11] Misuse Case [5] cited in [19] Control Case[14] UMLsec [15, 16, 17] UMLintr [12], other citations [18, 21] Using uml to reflect nonfunctional Requirements [2] (using LEL)
Proposed approach“UMLassure” – A UML profile
UMLassure: helps in modeling… Software System Figure1 Actions, Actors and Assets [4] UMLassure[20] aid in modeling secure Actions.  Related work focused on modeling Actors and Assets
UMLassurecontinued… UML ,[object Object]
Benefits of UMLassure
Code comments, alerts – Helps developers, testers
A controlled access to expensive Assets by Actors through secure Actions
Potential applications of UMLassure
Higher translation from model to code
Plugs into an OMG MDA approach,[object Object]
Software implementation
Results – UML profile Stereotype <STEREOTYPE> <NAME>xss</NAME> <DESCRIPTION> To check ’cross-site scripting’ </DESCRIPTION> <BASECLASSES> <BASECLASS>UMLClass</BASECLASS> </BASECLASSES> </STEREOTYPE> Tagged value <TAGDEFINITIONSET> <NAME>xss</NAME> <BASECLASSES> <BASECLASS>UMLAttribute</BASECLASS> </BASECLASSES> <TAGDEFINITIONLIST> <TAGDEFINITION> <NAME>AttributeName</NAME> <TAGTYPE>String</TAGTYPE> </TAGDEFINITION>
Results – XML stylesheet (XSLT) XSLT sample file <xsl:apply-templates select="//XMI.content"/> </body> </html> </xsl:template> <xsl:template match="XMI.content"> <xsl:for-each select="UML:Model/UML:Namespace.ownedElement/UML:Model /UML:Namespace.ownedElement/UML:Class">
Results – XML stylesheet (XSLT) <xsl:value-of select="@visibility"/> <xsl:text disable-output-escaping="yes">   class  </xsl:text> <xsl:value-of select="@name"/> <xsl:text disable-output-escaping="yes"> 			….. cntd
Results – Sample code representation public class Organization { // Here goes the class contents X.53 organizationName X.53 organizationURL public getOrganizationName ( ) { // Method code goes here } public getOrganizationURL ( ) { // Method code goes here
Results – Sample code representation } private setOrganizationName ( ) { // Method code goes here 			…. cntd
Conclusion Non-functional requirements are critical for successful software development Static analysis tools remove bugs in software However, more efforts are required to minimize the design flaws
Conclusion – mitigating design flaws ,[object Object]
Purely mathematical modeling languages are not well understood by ALLstakeholders without sufficient mathematical backgroundUML profile provides an extension to UML at meta-model level UML profile being specific to a platform, provides higher model to codetranslation
Limitations Number of security threats run into hundreds This work demonstrated using four only. Security threats are tightly coupled to software under development Two out of four threats considered in this thesis are applicable to web applications only.  At this stage approach may be too naïve yet it’s a good beginning.
Future work This work demonstrates using class diagrams only… An extension over to behavioral diagram will be a necessary work in near future. Translations from design to construction phase discussed here can be improvised further.  Extend this work to augment construction and deployment phases.
Image references World map http://onearth.jpl.nasa.gov/examples/wms_gm_r2.jpeg Bug http://i.zdnet.com/blogs/istock_000002369355xsmall.jpg Crimeware http://www.cigital.com/justiceleague/wp-content/uploads/2008/04/crimeware.jpg Telegraph http://www.thecanadianencyclopedia.com/featuremedia/feature137/TelegraphMachine.jpg

More Related Content

Viewers also liked

A szamviteli torveny valtozasai 2016-ban
A szamviteli torveny valtozasai 2016-banA szamviteli torveny valtozasai 2016-ban
A szamviteli torveny valtozasai 2016-banSystem Media Kft.
 
Trabalho sobre depressão
Trabalho sobre depressãoTrabalho sobre depressão
Trabalho sobre depressãoEliete Santos
 
Expediente de evidencias de enseñanza
Expediente de evidencias de enseñanzaExpediente de evidencias de enseñanza
Expediente de evidencias de enseñanzante1504
 
赵靖-第3课喜宴2-高级-20110222
赵靖-第3课喜宴2-高级-20110222赵靖-第3课喜宴2-高级-20110222
赵靖-第3课喜宴2-高级-20110222Jing Zhao
 

Viewers also liked (6)

A szamviteli torveny valtozasai 2016-ban
A szamviteli torveny valtozasai 2016-banA szamviteli torveny valtozasai 2016-ban
A szamviteli torveny valtozasai 2016-ban
 
Neska ikustezina td
Neska ikustezina tdNeska ikustezina td
Neska ikustezina td
 
Trabalho sobre depressão
Trabalho sobre depressãoTrabalho sobre depressão
Trabalho sobre depressão
 
Plastic Bags
Plastic BagsPlastic Bags
Plastic Bags
 
Expediente de evidencias de enseñanza
Expediente de evidencias de enseñanzaExpediente de evidencias de enseñanza
Expediente de evidencias de enseñanza
 
赵靖-第3课喜宴2-高级-20110222
赵靖-第3课喜宴2-高级-20110222赵靖-第3课喜宴2-高级-20110222
赵靖-第3课喜宴2-高级-20110222
 

Similar to UMLassure: An approach to model software security

Carol Harstad Research Proposal
Carol Harstad   Research ProposalCarol Harstad   Research Proposal
Carol Harstad Research ProposalCarol Harstad
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareWinstina Kennedy
 
Rejunevating software reengineering processes
Rejunevating software reengineering processesRejunevating software reengineering processes
Rejunevating software reengineering processesmanishthaper
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureTiffany Graham
 
Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Tao Xie
 
Unit iii(part b - architectural design)
Unit   iii(part b - architectural design)Unit   iii(part b - architectural design)
Unit iii(part b - architectural design)BALAJI A
 
Chapter 08
Chapter 08Chapter 08
Chapter 08guru3188
 
Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 AIRCC Publishing Corporation
 
jChampions JSR381 Visual recognition for java
jChampions   JSR381 Visual recognition for javajChampions   JSR381 Visual recognition for java
jChampions JSR381 Visual recognition for javaZoran Sevarac, PhD
 
Software Architecture: introduction to the abstraction
Software Architecture: introduction to the abstractionSoftware Architecture: introduction to the abstraction
Software Architecture: introduction to the abstractionHenry Muccini
 
Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerRonitShrivastava057
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation IJECEIAES
 
Software Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the AbstractionSoftware Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the AbstractionHenry Muccini
 
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...Tao Xie
 
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...Gurdal Ertek
 
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONA SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONIJCSES Journal
 
Anton Zorin - cv
Anton Zorin - cvAnton Zorin - cv
Anton Zorin - cvAnton Zorin
 
DECORATOR PATTERN IN WEB APPLICATION
DECORATOR PATTERN IN WEB APPLICATIONDECORATOR PATTERN IN WEB APPLICATION
DECORATOR PATTERN IN WEB APPLICATIONijait
 

Similar to UMLassure: An approach to model software security (20)

Se research update
Se research updateSe research update
Se research update
 
Carol Harstad Research Proposal
Carol Harstad   Research ProposalCarol Harstad   Research Proposal
Carol Harstad Research Proposal
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 
Rejunevating software reengineering processes
Rejunevating software reengineering processesRejunevating software reengineering processes
Rejunevating software reengineering processes
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software Architecture
 
Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...
 
Unit iii(part b - architectural design)
Unit   iii(part b - architectural design)Unit   iii(part b - architectural design)
Unit iii(part b - architectural design)
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019
 
jChampions JSR381 Visual recognition for java
jChampions   JSR381 Visual recognition for javajChampions   JSR381 Visual recognition for java
jChampions JSR381 Visual recognition for java
 
Ch01lect1 et
Ch01lect1 etCh01lect1 et
Ch01lect1 et
 
Software Architecture: introduction to the abstraction
Software Architecture: introduction to the abstractionSoftware Architecture: introduction to the abstraction
Software Architecture: introduction to the abstraction
 
Minor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure VisualizerMinor Project Synopsis on Data Structure Visualizer
Minor Project Synopsis on Data Structure Visualizer
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Software Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the AbstractionSoftware Architecture: Introduction to the Abstraction
Software Architecture: Introduction to the Abstraction
 
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
 
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
Development of an Interactive Simulation of Steel Cord Manufacturing for Indu...
 
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONA SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
 
Anton Zorin - cv
Anton Zorin - cvAnton Zorin - cv
Anton Zorin - cv
 
DECORATOR PATTERN IN WEB APPLICATION
DECORATOR PATTERN IN WEB APPLICATIONDECORATOR PATTERN IN WEB APPLICATION
DECORATOR PATTERN IN WEB APPLICATION
 

More from manishthaper

Jazz - Collaborative Software Development
Jazz - Collaborative Software DevelopmentJazz - Collaborative Software Development
Jazz - Collaborative Software Developmentmanishthaper
 
Home care diagnostics system - Cntd
Home care diagnostics system - CntdHome care diagnostics system - Cntd
Home care diagnostics system - Cntdmanishthaper
 
Home care diagnostics system
Home care diagnostics systemHome care diagnostics system
Home care diagnostics systemmanishthaper
 
Adam and Eve Condoms
Adam and Eve CondomsAdam and Eve Condoms
Adam and Eve Condomsmanishthaper
 
Transformation of work with Information Technology
Transformation of work with Information TechnologyTransformation of work with Information Technology
Transformation of work with Information Technologymanishthaper
 

More from manishthaper (7)

Jazz - Collaborative Software Development
Jazz - Collaborative Software DevelopmentJazz - Collaborative Software Development
Jazz - Collaborative Software Development
 
Home care diagnostics system - Cntd
Home care diagnostics system - CntdHome care diagnostics system - Cntd
Home care diagnostics system - Cntd
 
Home care diagnostics system
Home care diagnostics systemHome care diagnostics system
Home care diagnostics system
 
Gudiya - Save her
Gudiya - Save herGudiya - Save her
Gudiya - Save her
 
Adam and Eve Condoms
Adam and Eve CondomsAdam and Eve Condoms
Adam and Eve Condoms
 
UML 2.0 Changes
UML 2.0 ChangesUML 2.0 Changes
UML 2.0 Changes
 
Transformation of work with Information Technology
Transformation of work with Information TechnologyTransformation of work with Information Technology
Transformation of work with Information Technology
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

UMLassure: An approach to model software security

  • 1. UMLassure: A UML profile to model security requirements in software systems Presented by Manish Thaper(2007068) Supervised by Prof. ChandrashekarRamanathan International Institute of Information Technology, Bangalore
  • 2. Welcome HARDWARE SOFTWARE EVERYWARE++ ++ http://designmind.frogdesign.com/events/software-hardware-everyware.html
  • 4. Whatever ! the Information flow must continue.
  • 5. Hence a business case to…. Furthermore, the need for an expert software solution provider will never die.
  • 7. A software solution…. …is composed of [2] Functional requirement (FR) A software should increase information availability Non-functional requirement (NFR) Security, reliability, performance, usability
  • 8. Software development phases. Thesis focused at transition from Design to Construction
  • 9. Problem Statement Software fraternity has long been attempting an improved translation of requirements and design artifacts into construction and deployment phases. A successful examples exists on automating translation of functional requirements. Our research is on devising an approach to automate translation of the forgotten non-functional requirements from artifacts into construction.
  • 10. Literature survey “If I have seen further it is by standing on the shoulders of giants.” Newton - 1675
  • 11. Literature survey Goal requirement languages[23] Threat modeling[11] Misuse Case [5] cited in [19] Control Case[14] UMLsec [15, 16, 17] UMLintr [12], other citations [18, 21] Using uml to reflect nonfunctional Requirements [2] (using LEL)
  • 13. UMLassure: helps in modeling… Software System Figure1 Actions, Actors and Assets [4] UMLassure[20] aid in modeling secure Actions. Related work focused on modeling Actors and Assets
  • 14.
  • 16. Code comments, alerts – Helps developers, testers
  • 17. A controlled access to expensive Assets by Actors through secure Actions
  • 19. Higher translation from model to code
  • 20.
  • 22. Results – UML profile Stereotype <STEREOTYPE> <NAME>xss</NAME> <DESCRIPTION> To check ’cross-site scripting’ </DESCRIPTION> <BASECLASSES> <BASECLASS>UMLClass</BASECLASS> </BASECLASSES> </STEREOTYPE> Tagged value <TAGDEFINITIONSET> <NAME>xss</NAME> <BASECLASSES> <BASECLASS>UMLAttribute</BASECLASS> </BASECLASSES> <TAGDEFINITIONLIST> <TAGDEFINITION> <NAME>AttributeName</NAME> <TAGTYPE>String</TAGTYPE> </TAGDEFINITION>
  • 23. Results – XML stylesheet (XSLT) XSLT sample file <xsl:apply-templates select="//XMI.content"/> </body> </html> </xsl:template> <xsl:template match="XMI.content"> <xsl:for-each select="UML:Model/UML:Namespace.ownedElement/UML:Model /UML:Namespace.ownedElement/UML:Class">
  • 24. Results – XML stylesheet (XSLT) <xsl:value-of select="@visibility"/> <xsl:text disable-output-escaping="yes">   class  </xsl:text> <xsl:value-of select="@name"/> <xsl:text disable-output-escaping="yes"> ….. cntd
  • 25. Results – Sample code representation public class Organization { // Here goes the class contents X.53 organizationName X.53 organizationURL public getOrganizationName ( ) { // Method code goes here } public getOrganizationURL ( ) { // Method code goes here
  • 26. Results – Sample code representation } private setOrganizationName ( ) { // Method code goes here …. cntd
  • 27. Conclusion Non-functional requirements are critical for successful software development Static analysis tools remove bugs in software However, more efforts are required to minimize the design flaws
  • 28.
  • 29. Purely mathematical modeling languages are not well understood by ALLstakeholders without sufficient mathematical backgroundUML profile provides an extension to UML at meta-model level UML profile being specific to a platform, provides higher model to codetranslation
  • 30. Limitations Number of security threats run into hundreds This work demonstrated using four only. Security threats are tightly coupled to software under development Two out of four threats considered in this thesis are applicable to web applications only. At this stage approach may be too naïve yet it’s a good beginning.
  • 31. Future work This work demonstrates using class diagrams only… An extension over to behavioral diagram will be a necessary work in near future. Translations from design to construction phase discussed here can be improvised further. Extend this work to augment construction and deployment phases.
  • 32. Image references World map http://onearth.jpl.nasa.gov/examples/wms_gm_r2.jpeg Bug http://i.zdnet.com/blogs/istock_000002369355xsmall.jpg Crimeware http://www.cigital.com/justiceleague/wp-content/uploads/2008/04/crimeware.jpg Telegraph http://www.thecanadianencyclopedia.com/featuremedia/feature137/TelegraphMachine.jpg
  • 33. Image references Apple iPhone http://noiseblogger.com/wp-content/uploads/2009/02/apple-iphone-keyboard.jpg Information rings http://www.future-gadgets.com/wp-content/uploads/2008/01/information-ring1.jpg Issac Newton http://www.linnaeus.uu.se/online/matematik/bilder/newton.jpg
  • 34. Literature references [1] Yu E. Chung L, Nixon B and Mylopoulos J., Non-functional requirements in software engineering, Kluwer Academic Publishers, 2000. [2] LuizMarcioCysneiros and Julio Cesar Sampaio do Prado Leite, Using uml to reflect nonfunctional requirements, Proceedings of the 2001 conference of the Centre for Advanced Studies on Collaborative research, Centre for Advanced Studies Toronto, November 05-07, 2001. [3] J. Doser D. Basin and T. Lodderstedt., Model driven security: From uml models to access control infrastructures., ACM Transactions on Software Engineering and Methodology. Vol.15, No. 1, January 2006, ACM, 2006, p. pp 3991. [4] Markus Schumacher et. al., Security patterns: integrating security and systems engineering, John Wiley and Sons, Ltd., 2006.
  • 35. Literature references [5] Sindre G. and Opdahl A.L., Eliciting security requirements by misuse cases, Proceedings of the TOOLS Pacific 2000, TOOLS Pacific, November 20-23, 2000, pp. pp 120–131. [6] Object Management Group, Model driven architecture., Object Management Group, 2002. [7] _________, Omgs official uml documentation site., Object Management Group, 2002. [8] _________, Omgsuml profile catalogue., Object Management Group, 2002. [9] _________, Uml profile for schedulability,performance and time, Object Management Group, 2002. [10] Kim Hamilton and Russel Miles, Learning uml 2.0, O’Reilly. [11] Michael Howard and David LeBlanc, Writing secure code, Microsoft Press, 2003. [12] Mohammed Hussein and Mohammad Zulkernine, Umlintr:auml profile for specifying intrusions, Proceedings of the 13th Annual IEEE International Symposium and Workshop on Engineering
  • 36. Literature references of Computer Based Systems (ECBS06), IEEE, 2006. [13] Leite J.C.S.P. and A.P.M. Franco, A strategy for conceptual model acquisition, Proceedings of the First IEEE International Symposium on Requirements Engineering, SanDiego, Ca, IEEE Computer Society Press, 1993, pp. pp 243–246. [14] Christopher J. Pavlovski. Joe Zou, Modeling architectural non functional requirements: From use case to control case, IEEE International Conference on eBusiness Engineering (ICEBE06), IEEE, 2006. [15] J. Jurjens, Towards development of secure systems using uml., In H. Hubmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International conference), Springer, Genova, Italy, 2001, p. pp 3991.
  • 37. Literature references [16] _________ , Using umlsec and goal trees for secure systems development, SAC 2002, Madrid, Spain, ACM, 2002. [17] _________ , Secure system development with uml, Springer-Verlag, 2005. [18] Axelsson S., Intrusion detection systems: A survey and taxonomy, Technical report 99-15, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March 2000. [19] Asoke K. Talukder and Manish Chaitanya, Architecting secure software systems, Auerbach Publications, 2008. [20] Manish Thaper and ChandrashekarRamanathan, Umlassure: A uml profile assuring a secure software, Proceedings of the 2009 International Conference on Software Technology and
  • 38. Literature references Engineering ”to appear”, World Scientific Press, July 24-26, 2009. [21] Eckmann S.T. Vigna G and Kemmerer R.A., Attack languages, Proceedings of the IEEE Information Survivability Workshop, Boston, MA, IEEE, 2000. [22] ManoochAzmoodehXiaoqing (Frank) Liu and NektariosGeorgalas, Specification of nonfunctional requirements for contract specification in the ngoss framework for quality management and product evaluation, Fifth International Workshop on Software Quality, IEEE, 2007. [23] University of Toronto, Canada website - http://www.cs.toronto.edu/km/GRL/

Editor's Notes

  1. Tip: Add your own speaker notes here.