| Literature DB >> 25685514 |
Hassan El-Hadary1, Sherif El-Kassas1.
Abstract
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.Entities:
Keywords: AF, abuse frame; AR, anti-requirement; Application security; PF, problem frame; Problem frames; SPF, security problem frame; SR, security requirement; Security requirements engineering; Security threat modeling
Year: 2014 PMID: 25685514 PMCID: PMC4294748 DOI: 10.1016/j.jare.2014.03.001
Source DB: PubMed Journal: J Adv Res ISSN: 2090-1224 Impact factor: 10.479
Fig. 1Flow chart for the proposed methodology.
Fig. 2Problem context diagram for a simple software bank system.
Fig. 3PF1: Crediting funds to account subproblem frame diagram [33].
Fig. 4AF1: Tampering account information abuse frame diagram.
Fig. 5SPF1: Integrity preserving of account info.
Fig. 6AF: Tampering stored data.
Fig. 7SPF: Integrity preserving of stored data.
Example of security catalog item.
| Category: Tampering |
| Title: Tampering stored data |
| Abuse frame |
| Security concern: Integrity |
| Title: Integrity preserving of stored data |
| Security problem frame |
| Threat |
| Category: Tampering |
| Title: Tampering stored data |
| Abuse frame |
| Security concern: Integrity |
| Title: Integrity preserving of stored data |
| Security problem frame |
Fig. 8SPF2: Confidentiality preserving of salary information.
The comparison results with Haley’s methodology.
| Security requirements: |
| Security requirements: |
The comparison results with SEPP methodology.
| Security requirements: |
| Security requirements: |
Results of first iteration during applying our methodology on the HR system.
| Step | Results |
|---|---|
| System modeling | Problem frames: |
| “PF1: Salary Info editing” | |
| Requirement: | |
| “PF2: Salary Info display” | |
| Requirement: | |
| Identify assets | Assets: |
| Salary Information | |
| Identify threats and vulnerabilities | Abuse frames diagrams: |
| “AF1: Information disclosure of salary information” | |
| AR: | |
| “AF2: Tampering Salary information” | |
| AR: | |
| Identify security requirements | “SPF1: Integrity preserving of salary information” |
| SR: | |
| “SPF2: Confidentiality preserving of salary information” | |
| SR: | |
| Security requirements evaluation | The requirements complete each other and do not cause conflicts |
Results of second iteration during applying our methodology on the HR system.
| Step | Results |
|---|---|
| System modeling | The security problem frame diagrams SPF1 and SPF2 will be modified by adding the domains |
| Identify assets | Assets: |
| – Authentication Data | |
| Identify threats and vulnerabilities | Abuse frames: |
| “AF3: Information disclosure of transmitted salary information and authentication data” | |
| AR: | |
| “AF4: Spoofing a HR staff” | |
| AR: | |
| AF5: Repudiation of salary info editing” | |
| AR: | |
| Identify security requirements | The security requirement in SPF1 will be as follows: |
| SR: | |
| The security requirement in SPF2 will be as follows: | |
| SR: | |
| Security requirements evaluation | The requirements complete each other and do not cause conflicts |
Results of third iteration during applying our methodology on the HR system.
| Step | Results |
|---|---|
| System modeling | The domain |
| Identify assets | Assets: |
| No new assets | |
| Identify threats and vulnerabilities | The threat described in AF3 is still applicable and can cause vulnerability because we are not sure if encryption keys are secure |
| Identify security requirements | The following trust assumptions are added: |
| – | |
| – | |
| Security requirements evaluation | The requirements complete each other and do not cause conflicts |