2022
DOI: 10.1007/s10270-022-00991-5
|View full text |Cite
|
Sign up to set email alerts
|

Checking security compliance between models and code

Abstract: It is challenging to verify that the planned security mechanisms are actually implemented in the software. In the context of model-based development, the implemented security mechanisms must capture all intended security properties that were considered in the design models. Assuring this compliance manually is labor intensive and can be error-prone. This work introduces the first semi-automatic technique for secure data flow compliance checks between design models and code. We develop heuristic-based automated… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 58 publications
0
1
0
Order By: Relevance
“…Work by Töberg et al [26] as well as Tuma et al [25] is similar to Quac in that it combines architecture and code by using sourcecode analyses to verify whether assumptions in an architectural model hold in the implementation. However, these approaches do not modify the architectural model based on the results of the source-code analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Work by Töberg et al [26] as well as Tuma et al [25] is similar to Quac in that it combines architecture and code by using sourcecode analyses to verify whether assumptions in an architectural model hold in the implementation. However, these approaches do not modify the architectural model based on the results of the source-code analysis.…”
Section: Related Workmentioning
confidence: 99%