Type of Document Dissertation Author Mansour, Riham Author's Email Address firstname.lastname@example.org URN etd-03232009-182707 Title Formal Analysis and Design for Engineering Security Degree PhD Department Computer Science Advisory Committee
Advisor Name Title Bohner, Shawn A. Committee Chair El-Kassas, Sherif Committee Member Eltoweissy, Mohamed Y. Committee Member Gracanin, Denis Committee Member McCrickard, Donald Scott Committee Member Keywords
- Security Engineering
- Formal methods
- Formal Analysis and Design
- Goal-Oriented Requirements Analysis
- Software Engineering
Date of Defense 2009-03-11 Availability unrestricted AbstractEngineering secure software remains a significant challenge for today’s software organizations as they struggle to understand the implications of security on their systems and develop systems that guarantee specified software security properties. The use of formal methods that are based on mathematical models has long been advocated in the development of secure systems, yet the promise of formal methods has not been realized. This is due to the additional discipline needed to formulate precisely the requirements and due complexities that often confront engineers. Further, the cost of development and the requisite learning curve of formal methods are quite high making them cost prohibitive to apply, especially for large software.
The transition from requirements to design has been one of the most difficult steps in software development. Moreover, effective methods for deriving design from requirements that guarantee retention of the intended security properties remain largely unrealized on a repeatable and consistent basis. If security requirements are formalized and transformed into design using formal methods, the potential for security vulnerabilities would be diminished through better clarity, completeness, and consistency. Therefore, a requirements specification must be systematically transformable to a formal representation, and through effective formal methods the design can be derived such that the security properties are preserved and conveyed.
This dissertation presents the FADES (Formal Analysis and Design for Engineering Security) approach that couples goal-oriented requirements specification with formal design specification to develop secure software in a constructive, provable and cost-effective way. To the best of our knowledge, FADES is the first security engineering approach that provides a systematic and automated bridge between semi-formal security requirements and formal design and implementation. FADES maintains the completeness and consistency of the security requirements specified with KAOS (Knowledge Acquisition for autOmated Specifications) when transformed to B formal specifications. Relaxing formality during requirements analysis enables security requirements to be better organized for producing more complete, consistent and clear requirements. The KAOS requirements model is then transformed to B, a popular formal representation used to derive and refine software systems. Security design specifications and implementation are produced using the B formal method which preserves the requisite security requirement properties.
FADES treats security-specific elements in a systematic and constructive way while considering security early in the development lifecycle. Moreover, employing FADES provides better confidence for security evaluators in the evaluation of trusted software. A side effect of employing formal methods in development is the availability of sufficient traceability information at the various phases of development and maintenance allowing for more accurate impact analysis of security changes.
FADES has been examined empirically both by security engineering experts and practitioners. Results obtained from the controlled experiments compare FADES to other formal methods, and show that FADES preserves security properties while maintaining better consistency, quality, and completeness. This is accomplished at a lower cost and with better results. These results have been evaluated by academic and industry experts working in the area of security and formal methods.
Filename Size Approximate Download Time (Hours:Minutes:Seconds)
28.8 Modem 56K Modem ISDN (64 Kb) ISDN (128 Kb) Higher-speed Access approvalLetter(experiment1).pdf 253.61 Kb 00:01:10 00:00:36 00:00:31 00:00:15 00:00:01 approvalLetter(experiment2).pdf 217.56 Kb 00:01:00 00:00:31 00:00:27 00:00:13 00:00:01 RihamMansour-ETD-FinalDefensDocument(new).pdf 4.03 Mb 00:18:40 00:09:36 00:08:24 00:04:12 00:00:21
If you have questions or technical problems, please Contact DLA.