No abstract available.
Keynotes
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts
Software security has become more and more critical as we are increasingly depending on the Internet, an untrustworthy computing environment. Software functionality and security are tightly related to each other, vulnerabilities due to design errors, ...
Probabilistic Risk Assessment for Security Requirements: A Preliminary Study
Risk assessment is a critical decision making process during the Security Certification and Accreditation (C&A) process. However, existing infrastructure-wide C&A processes in real world are challenged by the ever increasing complexity of information ...
Component-Based Malicious Software Engineer Intrusion Detection
These days, security-sensitive business application systems are developed and maintained by more than one software engineer, some of which may be unethical or malicious. Unethical software engineers can insert malicious code to the systems or ...
Execution Constraint Verification of Exception Handling on UML Sequence Diagrams
Exception handling alters the control flow of the program. As such, errors introduced in exception handling code may influence the overall program in undesired ways. To detect such errors early and thereby decrease the programming costs, it is ...
Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software
Control logic of embedded systems is nowadays largely implemented in software. Such control software implements, among others, models of physical characteristics, like heat exchange among system components. Due to evolution of system properties and ...
Validation of SDL-Based Architectural Design Models: New Coverage Criteria
As the capability to automatically generate code from different models becomes more sophisticated, it is critical that these models be adequately tested for quality assurance prior to code generation. Although simulation-based blackbox testing ...
Using Partial Ordered Numbers to Control Information Flows
Information flow control models can be applied widely. This paper discusses only the models preventing information leakage during program execution. In the prevention, an information flow control model dynamically monitors statements that will cause ...
Security Goals Assurance Based on Software Active Monitoring
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinux). It is extremely difficult to verify ...
Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming
Temporal correctness is one of the most important requirements for time-critical systems. Although time-critical systems are designed to meet their timing constraints, there can be still errors especially with timing constraints in run-time due to ...
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems
Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) are widely used access control models. They are often used together in domains where both data integrity and information flow are concerned. There is much work on combined use of RBAC ...
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph
Covert channel analysis is an important requirement when building secure information systems, and identification is the most difficult task. Although some approaches were presented, they are either experimental or constrained to some particular systems. ...
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL
Organizations with stringent security requirements like banks or hospitals frequently adopt role-based access control (RBAC) principles to simplify their internal permission management. Authorization constraints represent a fundamental advanced RBAC ...
Deriving Data Dependence from/for UML State Machine Diagrams
Slicing is a well-known reduction technique in many areas such as debugging, maintenance, and testing, and thus, there has been considerable research in the application of slicing techniques to models at the design level. UML state machine diagrams can ...
Automatic Synthesis of Static Fault Trees from System Models
Fault tree analysis (FTA) is a traditional reliability analysis technique. In practice, the manual development of fault trees could be costly and error-prone, especially in the case of fault tolerant systems due to the inherent complexities such as ...
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study
We have developed a method called PREDIQT for model-based prediction of impacts of architectural design changes on system quality. A recent case study indicated feasibility of the PREDIQT method when applied on a real-life industrial system. This paper ...
On Testing Effectiveness of Metamorphic Relations: A Case Study
One fundamental challenge for software testing is the oracle problem, which means that either there does not exist a mechanism (called oracle) to verify the test output given any possible program input, or it is very expensive, if not impossible, to ...
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing
As part of network security testing, an administrator needs to know whether the firewall enforces the security policy as expected or not. In this setting, black-box testing and evaluation methodologies can be helpful. In this paper, we employ a simple ...
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution
Automatically finding vulnerabilities and even generating exploits are desirable for software testing. For the protection of intellectual property and copyright, programs being tested may be lack of source code and symbol table information. Concolic ...
Towards a Reliable Spam-Proof Tagging System
Tagging systems are particularly vulnerable to tag spam. Although some previous efforts aim to address this problem with detection-based or demotion-based approaches, tricky attacks launched by attackers who can exploit vulnerabilities of spam-resistant ...
Dynamic Service Replacement to Improve Composite Service Reliability
Service-oriented architecture (SOA) provides an ability to satisfy the increasing demand of the customer for complicated services in business environments via the composition of service components scattered on the Internet. Service composition is a ...
ReLACK: A Reliable VoIP Steganography Approach
VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of ...
Index Terms
- Proceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement