Techniques for Validating the Security Quality of Infrastructure .ppt
《Techniques for Validating the Security Quality of Infrastructure .ppt》由会员分享,可在线阅读,更多相关《Techniques for Validating the Security Quality of Infrastructure .ppt(34页珍藏版)》请在麦多课文档分享上搜索。
1、Techniques for Validating the Security Quality of Infrastructure Software,John D. McGregor johnmccs.clemson.edu,Outline,Motivation Proposed strategy Detailed actions Conclusion,Theme Life Cycle Threats,There is not a means for automated testing of large software, both static and mobile code, to dete
2、ct, identify malicious code, sleeper codes, and exploitable vulnerabilities and to determine and understand the potential impact on the life-cycle of the codes. Current testing approaches are largely manual rather than automated. CSIIR Workshop Themes document,A Recommended Strategy,Software securit
3、y vulnerabilities are often caused by defective specification, design, and implementation. require that software be designed with security at the very heart of the design process Establish a security verification and validation program to evaluate different software development processes and practic
4、es for effectiveness in producing secure software. Certify those processes demonstrated to be effective for producing secure software.Security Across the Software Development Lifecycle Task Force,Recommended Practices,Statistical testing - Usage based testing permits valid statistical estimation of
5、quality with respect to all the executions not tested and tends to find any remaining high-failure-rate defects early. Production testing - Two strategies are testing security functionality with standard functional testing techniques, and risk-based security testing based on attack patterns and thre
6、at models. A good security test plan (with traceability back to requirements) uses both strategies. Process models - organizations can use the goals and attributes defined in process models as high-level guides for defining and improving their management and engineering processes in the ways they fe
7、el are most appropriate for them.Security Across the Software Development Lifecycle Task Force,SEI,The security of a software-intensive system is directly related to the quality of its software1. Over 90% of software security incidents are caused by attackers exploiting known software defects. Analy
8、sis of 45 e-business applications showed that 70% of security defects were design defects. Experienced and capable software engineers inject, on average, one defect every nine lines of code. A one million line of code systems typically contains 1,000-5,000 defects when shipped.1 http:/www.sei.cmu.ed
9、u/tsp/tsp-security.html,A Final Source,“One of the key things that developers can do to help secure their systems is to write code that can withstand attack and use security features properly.” Defend Your Code with Top Ten Security Tips Every Developer Must Know 8 out of 10 tips are directly progra
10、mming issueshttp:/ Assumptions,Testing early is cheaper than testing later. System test of a system with j modules and k experiments (iterations or different implementations for a given interface) results in the following cost of testing,Where ct is the cost per test. Module-level tests with j modul
11、es and k experiments results in,Baldwin and Clark. Design Rules The Power of Modularity, volume 1, MIT Press, 2000.,Basic assumptions - 2,Though estimates vary, the cost of removing defect increases dramatically later in the life cycle.,Premise,Our premise is that poorly written software will contai
12、n more vulnerabilities than well written software where the security quality attribute is a design driver. Current views of security often take a defensive approach. Some of the security infrastructure even adds to the security risk due to the complexity it adds to the product. We propose an offensi
13、ve approach in which security is a key design driver and a priority throughout the development process.,Context,A chain of quality should be threaded through the entire process so that validation is most effective and efficient.,A Proposed Strategy,Develop method engineering tactics and guidelines t
14、hat enhance the security quality of the software through improved processes. Structure architecture evaluation techniques to focus on security by searching for static security patterns. Discover and capture test patterns that correspond to dynamic security patterns. Develop focused test techniques t
15、o effectively explore security test patterns while reducing the test suite size. Create a defect model for security that can be used to predict types and number of security vulnerabilities in scientific codes.,Action Develop method engineering techniques,Method engineers create custom-made processes
16、 to help a project achieve specific goals. The goal of being “secure” needs to be operationalized so that these engineers can assemble methods in ways that enhance the security of the software product built using their processes. This task would involve extending the Software Process Engineering Met
17、aModel1 (SPEM) standard to define security-specific constructs. The model would be automated using existing tools such as MetaEdit+.1 Software Process Engineering Metamodel, version 1.1, Object Management Group (OMG), 2005.,Action Develop method engineering techniques - 2,The security-oriented metho
18、d fragments would be suitable to integrate into processes defined in the context of the SPEM. Process audits could evaluate the strength of the security aspect of the process, once it is explicitly embedded in the process, just as other qualities are validated. Deliverables: A process definition gui
19、de that would show how to design security-centric development process fragments, an assembly guide, and an example process.,Action Create architecture security analysis,Architects have techniques that they apply to an architecture in order to improve the behavior of the architecture with respect to
20、classes of security threats1. Assuring system survivability requires showing that the system architecture is adequately resilient to likely patterns of attack2. One approach to architecture design is to identify quality attributes for the architecture and make design decisions that enhance the desir
21、able qualities and degrade the less desirable ones. Architecture evaluation techniques such as the architecture trade-off analysis method (ATAM) can be used to focus architecture evaluations on the security quality through security-specific scenarios. One aspect of this task would be to develop a se
22、t of architecture-level security scenarios that would guide the evaluation of an architecture for the security quality.1 Security and Survivability Reasoning Frameworks and Architectural Design Tactics. CMU/SEI-2004-TN-022 2 Architectural Refinement for the Design of Survivable Systems CMU/SEI-2001-
23、TN-008,Action Create architecture security analysis - 2,This evaluation can be automated if the architects use a formal architecture description language (ADL). Our current implementation uses the Architectural Analysis and Design Language (AADL) from the Society of Automotive Engineers (SAE) and Ec
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- TECHNIQUESFORVALIDATINGTHESECURITYQUALITYOFINFRASTRUCTUREPPT

链接地址:http://www.mydoc123.com/p-389698.html