Architecture-centric testing for security

نویسنده

  • Sarah Al-Azzani
چکیده

This thesis presents a novel architecture-centric approach, which uses Implied Scenarios (IS) to detect design-vulnerabilities in the software architecture. It reviews security testing approaches, and draws on their limitations in addressing unpredictable behaviour in the face of evolution. The thesis introduces the concept of Security IS as unanticipated (possibly malicious) behaviours that indicate potential insecurities in the architecture. The IS approach uses the architecture as the appropriate level of abstraction to tackle the complexity of testing. It provides potential for scalability to test large scale complex applications. It proposes a three-phased method for security testing: (1) Detecting design-level vulnerabilities in the architecture in an incremental manner. This is done via investigating emergent behaviours (i.e. ISs) in the composition of functionalities as functionalities evolve. (2) Classifying the impact of detected ISs on the security of the architecture. (3) Using the detected ISs and their impact to guide the refinement of the architecture. The refinement is test-driven and incremental, where refinements are tested before they are committed. The thesis also presents SecArch, an extension to the IS approach to enhance its search-space to detect hidden race conditions. It is concerned with predicting further valid conditions in the face of real parallelism in distributed systems with respect to non-FIFO queues. The thesis reports on the applications of the proposed approach and its extension to three case studies for testing the security of distributed and cloud architectures in the presence of uncertainty in the operating environment, unpredictability of interaction and possible security IS. The applications demonstrate novelty in the way security testing addresses emergent behaviour in applications which are characterised with dynamism, heterogeneity, openness, scale and unpredictability in operation and their evolution trends. We have drawn on these case studies to evaluate the thesis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DACSA: A Decoupled Architecture for Cloud Security Analysis

Monitoring virtual machine execution from the hypervisor provides new opportunities for evaluating cloud security. Unfortunately, traditional hypervisor based monitoring techniques tightly couple monitoring with internal VM operations and as a result 1) impose unacceptably high overhead to both guest and host environments and 2) do not scale. Towards addressing this problem, we present DACSA, a...

متن کامل

A Sensor Network Architecture: Information, Control and Behavior Definitions for Large-Scale or Systems- of-Systems Testing

This paper envisions a plug-and-play architecture for test and evaluation that will allow engineers to rapidly and robustly define and configure test environments and scenarios. The architecture described here is based on a layered functional decomposition of the three aspects of test: information flow, control flow and behavior. These individual layered decompositions are presented first, then...

متن کامل

A data-centric capability-focused approach for system-of-systems architecture modeling and analysis

1-15, doi:10.1002/sys.21253. analysis architecture capability data data-centric executable highlevel meta-model model system-of-systems. A data-centric capability-focused approach for system-of-systems architecture modeling and analysis. data-centric capability-focused approach for system-of-systems architecture modeling and analysis on the International top journal Systems. Bingfeng Ge, Keith ...

متن کامل

Architecting Smart Home Environments for Healthcare: A Database-Centric Approach

Considering existing system architectures for smart environments, the database management system (DBMS) is the most common but the least exploited architectural component, devoted exclusively for data storage and retrieval. However, database technology has advanced and matured considerably over the years, and, as a result, current DBMSs can be and do more. The scope of this thesis is therefore ...

متن کامل

Memory-Centric Security Architecture

This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for the same purpose, the new architecture ties cryptographic properties and security attributes to memory instead of each individual user process. The advantages of such a memory centric design are many folds. First, it provides a b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014