论文标题
选择安全模式并检查其实施的高级方法
An Advanced Approach for Choosing Security Patterns and Checking their Implementation
论文作者
论文摘要
本文解决了生成混凝土测试用例以测试应用程序是否容易受到攻击的问题,以及检查安全解决方案是否正确实施。本文提出的方法旨在指导开发人员实施安全应用程序,从威胁建模阶段到测试阶段。这种方法依赖于集成了各种安全数据的知识库,例如攻击,攻击步骤和安全模式,这些模式是设计安全应用程序的通用和可重复使用的解决方案。该方法的第一阶段是协助开发人员设计攻击防御树的设计,以表达攻击者损害应用程序和可能实施的防御能力的可能性。这些防御是以安全模式组合形式给出的。在第二阶段,这些树被用来指导测试案例生成中的开发人员。在执行测试案件后,测试判决显示应用程序是否容易受到ADTREE模型的威胁的影响。该方法的最后阶段检查了在执行测试案例时收集的安全模式的行为属性是否存在。这些属性是由LTL属性正式化的,这些属性是由知识库产生的。开发人员不必编写LTL属性,而不是成为正式模型的专家。我们在10个Web应用程序上实验了该方法,以评估其测试效果及其性能。
This paper tackles the problems of generating concrete test cases for testing whether an application is vulnerable to attacks, and of checking whether security solutions are correctly implemented. The approach proposed in the paper aims at guiding developers towards the implementation of secure applications, from the threat modelling stage up to the testing one. This approach relies on a knowledge base integrating varied security data, e.g., attacks, attack steps, and security patterns that are generic and re-usable solutions to design secure applications. The first stage of the approach consists in assisting developers in the design of Attack Defense Trees expressing the attacker possibilities to compromise an application and the defenses that may be implemented. These defenses are given under the form of security pattern combinations. In the second stage, these trees are used to guide developers in the test case generation. After the test case execution, test verdicts show whether an application is vulnerable to the threats modelled by an ADTree. The last stage of the approach checks whether behavioural properties of security patterns hold in the application traces collected while the test case execution. These properties are formalised with LTL properties, which are generated from the knowledge base. Developers do not have to write LTL properties not to be expert in formal models. We experimented the approach on 10 Web applications to evaluate its testing effectiveness and its performance.