Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2652524.2652532acmconferencesArticle/Chapter ViewAbstractPublication PagesesemConference Proceedingsconference-collections
research-article

Using templates to elicit implied security requirements from functional requirements - a controlled experiment

Published: 18 September 2014 Publication History

Abstract

Context: Security requirements for software systems can be challenging to identify and are often overlooked during the requirements engineering process. Existing functional requirements of a system can imply the need for security requirements. Systems having similar security objectives (e.g., confidentiality) often also share security requirements that can be captured in the form of reusable templates and instantiated in the context of a system to specify security requirements.
Goal: We seek to improve the security requirements elicitation process by automatically suggesting appropriate security requirement templates implied by existing functional requirements.
Method: We conducted a controlled experiment involving 50 graduate students enrolled in a software security course to evaluate the use of automatically-suggested templates in eliciting implied security requirements. Participants were divided into treatment (automatically-suggested templates) and control groups (no templates provided).
Results: Participants using our templates identified 42% of all the implied security requirements in the oracle as compared to the control group, which identified only 16% of the implied security requirements. Template usage increased the efficiency of security requirements identified per unit of time.
Conclusion: Automatically-suggested templates helped participants (security non-experts) think about security implications for the software system and consider more security requirements than they would have otherwise. We found that participants need more incentive than just a participatory grade when completing the task. Further, we recommend to ensure task completeness, participants either need a step-driven (i.e., wizard) approach or progress indicators to identify remaining work.

References

[1]
1990. IEEE Standard Glossary of Software Engineering Terminology: http://standards.ieee.org/findstds/standard/610.12-1990.html
[2]
2001. Underlying Technical Models for Information Technology Security: http://csrc.nist.gov/publications/nistpubs/800-33/sp800-33.pdf
[3]
2004. Standards for Security Categorization of Federal Information and Information Systems: http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf
[4]
Boslaugh, S., 2012. The Pearson Correlation Coefficient. In Statistics in a Nutshell O'Reilly Media, Inc.
[5]
D. Mellado, C. Blanco, L. E. Sánchez, and Fernández-Medina, E., 2010. A Systematic Review of Security Requirements Engineering. Computer Standards and Interfaces 32, 4 (Jun.), 13.
[6]
Firesmith, D. G., 2003. Engineering Security Requirements. J. Object Technology 2, 1 (Jan-Feb.), 16.
[7]
Jedlitschka, A., Ciolkowski, M., and Pfahl, D., 2008. Reporting experiments in software engineering In Guide to Advanced Empirical Software Engineering Springer London, 201--228.
[8]
Kitchenham, B. and Charters, S., 2007. Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01 School of Computer Science and Mathematics, Keele University.
[9]
Kurt Schneider, Eric Knauss, Siv Houmb, Shareeful Islam, and Jürjens, J., 2012. Enhancing security requirements engineering by organizational learning. Requirements Engineering 17, 1, 35--56.
[10]
Landis, J. R. and Koch, G. G., 1977. The measurement of observer agreement for categorical data. Biometrics 33, 1, 159--174.
[11]
Lane, D. M., Research Design. In Online Statistics Education: An Interactive Multimedia Course of Study, Rice University.
[12]
Linstone, H. A. and Turoff, M., 2002. The Delphi Method: Techniques and Applications. Technometrics 18, 3, 363.
[13]
Mellado, D., Blanco, C., Sánchez, L. E., and Fernández-Medina, E., 2010. A systematic review of security requirements engineering. Computer Standards & Interfaces 32, 4, 153--165.
[14]
Meneely, A., Smith, B., and Williams, L., 2012. Appendix B: iTrust electronic health care system case study. In Software and Systems Traceability Springer Verlag.
[15]
Riaz, M., King, J., Slankas, J., and Williams, L., 2014. Hidden in Plain Sight: Automatically Identifying Security Requirements from Natural Language Artifacts. In Proceedings of the 22nd International Conference on Requirements Engineering (Karlskrona, Sweden, Aug 25-29 2014), IEEE.
[16]
Salini, P. and Kanmani, S., 2012. Survey and Analysis on Security Requirements Engineering. Computers and Electrical Engineering 38, 13.
[17]
Schumacher, M., Fernandez-Buglioni, E., Hyberston, D., Buschmann, F., and Sommerlad, P., 2006. Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, Ltd, West Sussex.
[18]
Viera, A. J. and Garrett, J. M., 2005. Understanding interobserver agreement: the kappa statistic. Fam Med 37, 5, 360--363.
[19]
Wohlin, C., Runeson, P., Host, M., Ohlsson, M. C., Regnell, B., and Wesslen, A., 2000. Experimentation in software engineering: an introduction. Kluwer Academic Publishers, Sweden.
[20]
Yskout, K., Scandariato, R., and Joosen, W., 2012. Does organizing security patterns focus architectural choices? In Proceedings of the International Conference on Software Engineering (ICSE '12) (Zurich, Switzerland, 2-9 June 2012), 617--627.

Cited By

View all
  • (2024)On the Measures of Success in Replication of Controlled Experiments with STRIDEInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402350065134:04(623-650)Online publication date: 23-May-2024
  • (2024)Contradictions Identification of Safety and Security Requirements for Industrial Cyber–Physical SystemsIEEE Internet of Things Journal10.1109/JIOT.2023.333212811:7(12033-12057)Online publication date: 1-Apr-2024
  • (2022)Identifying Functional and Non-functional Software Requirements From User App Reviews2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)10.1109/IEMTRONICS55184.2022.9795770(1-6)Online publication date: 1-Jun-2022
  • Show More Cited By

Index Terms

  1. Using templates to elicit implied security requirements from functional requirements - a controlled experiment

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ESEM '14: Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement
    September 2014
    461 pages
    ISBN:9781450327749
    DOI:10.1145/2652524
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 September 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. controlled experiment
    2. security requirements
    3. templates

    Qualifiers

    • Research-article

    Funding Sources

    • USA National Security Agency (NSA) Science of Security Lablet

    Conference

    ESEM '14
    Sponsor:

    Acceptance Rates

    ESEM '14 Paper Acceptance Rate 23 of 123 submissions, 19%;
    Overall Acceptance Rate 130 of 594 submissions, 22%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)On the Measures of Success in Replication of Controlled Experiments with STRIDEInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402350065134:04(623-650)Online publication date: 23-May-2024
    • (2024)Contradictions Identification of Safety and Security Requirements for Industrial Cyber–Physical SystemsIEEE Internet of Things Journal10.1109/JIOT.2023.333212811:7(12033-12057)Online publication date: 1-Apr-2024
    • (2022)Identifying Functional and Non-functional Software Requirements From User App Reviews2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)10.1109/IEMTRONICS55184.2022.9795770(1-6)Online publication date: 1-Jun-2022
    • (2021)Ethical issues in empirical studies using student subjects: Re-visiting practices and perceptionsEmpirical Software Engineering10.1007/s10664-021-09958-426:3Online publication date: 20-Mar-2021
    • (2020)A Maturity Model for Secure Requirements EngineeringComputers & Security10.1016/j.cose.2020.101852(101852)Online publication date: May-2020
    • (2019)Identifying implied security requirements from functional requirements2019 14th Iberian Conference on Information Systems and Technologies (CISTI)10.23919/CISTI.2019.8760631(1-7)Online publication date: Jun-2019
    • (2018)A Template for Writing Security RequirementsRequirements Engineering for Internet of Things10.1007/978-981-10-7796-8_6(73-86)Online publication date: 5-Jan-2018
    • (2017)Towards a platform for empirical software design studiesProceedings of the 1st International Workshop on Establishing the Community-Wide Infrastructure for Architecture-Based Software Engineering10.5555/3101282.3101284(3-7)Online publication date: 20-May-2017
    • (2017)Towards a Platform for Empirical Software Design Studies2017 IEEE/ACM 1st International Workshop on Establishing the Community-Wide Infrastructure for Architecture-Based Software Engineering (ECASE)10.1109/ECASE.2017.3(3-7)Online publication date: May-2017
    • (2017)Exploring software security approaches in software development lifecycleComputer Standards & Interfaces10.1016/j.csi.2016.10.00150:C(107-115)Online publication date: 1-Feb-2017
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media