36
A Systematic Review of Model-Driven Security APSEC 2013, Bangkok, Thailand December 05 th , 2013 Phu H. Nguyen, Jacques Klein, and Yves Le Traon Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg Max E. Kramer Software Design and Quality Group, Karlsruhe Institute of Technology (KIT), Germany

A Systematic Review of Model-Driven Security

Embed Size (px)

Citation preview

Page 1: A Systematic Review of Model-Driven Security

A Systematic Review of Model-Driven Security

APSEC 2013, Bangkok, Thailand December 05th, 2013

Phu H. Nguyen, Jacques Klein,

and Yves Le Traon

Interdisciplinary Centre for Security,

Reliability and Trust (SnT),

University of Luxembourg,

Luxembourg

Max E. Kramer

Software Design and Quality Group,

Karlsruhe Institute of Technology (KIT),

Germany

Page 2: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 2

Page 3: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 3

1. MDS

Outline

Page 4: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 4

1. MDS

Outline

2. SLR

Page 5: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 5

1. MDS

Outline

2. SLR

3. Results

Page 6: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 6

Many security weaknesses already made the

headlines of the newspapers.

Page 7: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 7

1. (Software) systems are getting more complex, especially including security concerns.

http://seanblanchfield.com

dbstrat.com

Page 8: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 8

2. Security threats evolving fast, but are not taken into account early in the development process!

securesoftware.blogspot.com

Page 9: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 9

3. Economic pressure reduces the development time and increases the frequency of demanded modifications…

http://blogs.vmware.com

Page 10: A Systematic Review of Model-Driven Security

Article (Fernandez-Medina2009) Fernández-Medina, E.; Jurjens, J.; Trujillo, J. & Jajodia, S. Model-Driven Development for secure information systems Information and Software Technology, 2009, 51, 809-814

Page 11: A Systematic Review of Model-Driven Security

Article (Fernandez-Medina2009)

Page 12: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 12

Model-Driven Security with SecureUML Model Driven Security, Technical Report 414, ETH Zurich, 2004

1. Security concerns are dealt with from the very beginning, and throughout the MDS development lifecycle.

SecureUML

Page 13: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 13

2. Model-Based Security Verification & Validation could check for security properties in advance!

Page 14: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 14

3. MDS is productive, less error-prone by leveraging on (automated) model transformations.

www.sparxsystems.com

Page 16: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 16

Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?

Page 17: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 17

Sub-Research Questions

RQ1.1 What kinds of security mechanisms/concerns are addressed by these MDS approaches?

RQ1.2 How do the MDS approaches specify/model security requirements together with functional requirements?

RQ1.3 How model-to-model transformations (MMTs) are leveraged and which MMT engines are used?

RQ1.4 How model-to-text transformations (MTTs) are leveraged to generate code, including complete, configured security infrastructures?

Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?

Page 18: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 18

Sub-Research Questions

RQ1.5 Have any case studies been performed to evaluate the approaches? If yes, what results have been obtained? What other evaluation methods (other than case studies) have been applied to evaluate these approaches?

RQ1.6 Which application domains have been addressed in MDS approaches?

Research Question (RQ) 1: How are the existing MDS approaches supporting the development of secure systems?

Page 19: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 19

RQ3: What are the open issues to be further investigated?

RQ2: What are the current limitations of each approach?

Page 20: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 20

( “model-driven” OR “model based” OR MDA OR MDE OR model* OR UML ) AND ( specify* OR design* ) AND ( transform* OR “code generation” ) AND security

Selection Criteria

IEEE Xplore ACM Digital Library

ISI Web of Knowledge

Science Direct

Springer

Page 21: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 21

Evaluation Criteria - A Taxonomy of MDS

Security concerns/mechanisms

Modeling approaches

Model-to-model transformations (MMTs)

Model-to-text transformations (MTTs)

Evaluation methods

Application domains

Page 22: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 22

Results

Security concerns addressed by MDS. Why is Authorization tackled the most?

Page 23: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 23

Aspect-Oriented Modeling vs. Non-AOM

Page 24: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 24

Results

Model-to-model transformations

Page 25: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 25

Results

Model-to-code transformations

Page 26: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 26

Results

Application domains

Page 27: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 27

Results in details.

Page 28: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 28

Primary Approaches

Page 29: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 29

• Make sure the full selection of the most relevant MDS papers for the final set.

– Manual Search

– Adopt the “Snowballing” strategy

• Expand the discussion more detailed, e.g. trends analysis.

• Expand the comparison of all MDS approaches.

Future Work

Page 30: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 30

Page 31: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 31

Page 32: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 32

Page 33: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 33

Page 34: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 34

Page 35: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 35

Page 36: A Systematic Review of Model-Driven Security

ICTSS 2010 A Systematic Review of MDS Phu H. Nguyen et al. 36

• More information? Interested? => our paper is available!

• Twitter: @nguyenhongphu

The End! Q&A