Home > Research > Publications & Outputs > Executable misuse cases for modeling security c...
View graph of relations

Executable misuse cases for modeling security concerns

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Executable misuse cases for modeling security concerns. / Whittle, Jon; Wijesekera, Duminda; Hartong, Mark.
Proceedings of the 30th International Conference on Software engineering (ICSE '08) . New York: ACM Press, 2008. p. 121-130.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Whittle, J, Wijesekera, D & Hartong, M 2008, Executable misuse cases for modeling security concerns. in Proceedings of the 30th International Conference on Software engineering (ICSE '08) . ACM Press, New York, pp. 121-130, ICSE, 1/01/00. https://doi.org/10.1145/1368088.1368106

APA

Whittle, J., Wijesekera, D., & Hartong, M. (2008). Executable misuse cases for modeling security concerns. In Proceedings of the 30th International Conference on Software engineering (ICSE '08) (pp. 121-130). ACM Press. https://doi.org/10.1145/1368088.1368106

Vancouver

Whittle J, Wijesekera D, Hartong M. Executable misuse cases for modeling security concerns. In Proceedings of the 30th International Conference on Software engineering (ICSE '08) . New York: ACM Press. 2008. p. 121-130 doi: 10.1145/1368088.1368106

Author

Whittle, Jon ; Wijesekera, Duminda ; Hartong, Mark. / Executable misuse cases for modeling security concerns. Proceedings of the 30th International Conference on Software engineering (ICSE '08) . New York : ACM Press, 2008. pp. 121-130

Bibtex

@inproceedings{f92264535e674d62a711ee5e6c6c9ad7,
title = "Executable misuse cases for modeling security concerns",
abstract = "Misuse cases are a way of modeling negative requirements, that is, behaviors that should not occur in a system. In particular, they can be used to model attacks on a system as well as the security mechanisms needed to avoid them. However, like use cases, misuse cases describe requirements in a high-level and informal manner. This means that, whilst they are easy to understand, they do not lend themselves to testing or analysis. In this paper, we present an executable misuse case modeling language which allows modelers to specify misuse case scenarios in a formal yet intuitive way and to execute the misuse case model in tandem with a corresponding use case model. Misuse scenarios are given in executable form and mitigations are captured using aspect-oriented modeling. The technique is useful for brainstorming potential attacks and their mitigations. Furthermore, the use of aspects allows mitigations to be maintained separately from the core system model. The paper, supported by a UML-based modeling tool, describes an application to two case studies, providing evidence that the technique can support red-teaming of security requirements forn realistic systems.",
author = "Jon Whittle and Duminda Wijesekera and Mark Hartong",
year = "2008",
doi = "10.1145/1368088.1368106",
language = "English",
isbn = "978-1-60558-079-1",
pages = "121--130",
booktitle = "Proceedings of the 30th International Conference on Software engineering (ICSE '08)",
publisher = "ACM Press",
note = "ICSE ; Conference date: 01-01-1900",

}

RIS

TY - GEN

T1 - Executable misuse cases for modeling security concerns

AU - Whittle, Jon

AU - Wijesekera, Duminda

AU - Hartong, Mark

PY - 2008

Y1 - 2008

N2 - Misuse cases are a way of modeling negative requirements, that is, behaviors that should not occur in a system. In particular, they can be used to model attacks on a system as well as the security mechanisms needed to avoid them. However, like use cases, misuse cases describe requirements in a high-level and informal manner. This means that, whilst they are easy to understand, they do not lend themselves to testing or analysis. In this paper, we present an executable misuse case modeling language which allows modelers to specify misuse case scenarios in a formal yet intuitive way and to execute the misuse case model in tandem with a corresponding use case model. Misuse scenarios are given in executable form and mitigations are captured using aspect-oriented modeling. The technique is useful for brainstorming potential attacks and their mitigations. Furthermore, the use of aspects allows mitigations to be maintained separately from the core system model. The paper, supported by a UML-based modeling tool, describes an application to two case studies, providing evidence that the technique can support red-teaming of security requirements forn realistic systems.

AB - Misuse cases are a way of modeling negative requirements, that is, behaviors that should not occur in a system. In particular, they can be used to model attacks on a system as well as the security mechanisms needed to avoid them. However, like use cases, misuse cases describe requirements in a high-level and informal manner. This means that, whilst they are easy to understand, they do not lend themselves to testing or analysis. In this paper, we present an executable misuse case modeling language which allows modelers to specify misuse case scenarios in a formal yet intuitive way and to execute the misuse case model in tandem with a corresponding use case model. Misuse scenarios are given in executable form and mitigations are captured using aspect-oriented modeling. The technique is useful for brainstorming potential attacks and their mitigations. Furthermore, the use of aspects allows mitigations to be maintained separately from the core system model. The paper, supported by a UML-based modeling tool, describes an application to two case studies, providing evidence that the technique can support red-teaming of security requirements forn realistic systems.

UR - http://www.scopus.com/inward/record.url?scp=57349132966&partnerID=8YFLogxK

U2 - 10.1145/1368088.1368106

DO - 10.1145/1368088.1368106

M3 - Conference contribution/Paper

SN - 978-1-60558-079-1

SP - 121

EP - 130

BT - Proceedings of the 30th International Conference on Software engineering (ICSE '08)

PB - ACM Press

CY - New York

T2 - ICSE

Y2 - 1 January 1900

ER -