Análise de Segurança Baseada em Roles para Fábricas de Software

09/09/2019
by   Miguel Loureiro, et al.
0

Most software factories contain applications with sensitive information that needs to be protected against breaches of confidentiality and integrity, which can have serious consequences. In the context of large factories with complex applications, it is not feasible to manually analyze accesses to sensitive information without some form of safety mechanisms. This article presents a static analysis technique for software factories, based on role-based security policies. We start by synthesising a graph representation of the relevant software factories, based on the security policy defined by the user. Later the graph model is analysed to find access information where the security policy is breached, ensuring that all possible execution states are analysed. A proof of concept of our technique has been developed for the analysis of OutSystems software factories. The security reports generated by the tool allows developers to find and prioritise security breaches in their factories. The prototype was evaluated using large software factories, with strong safety requirements. Several security flaws were found, some serious ones that would be hard to be detected without our analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/17/2021

Hardware-Enforced Integrity and Provenance for Distributed Code Deployments

Deployed microservices must adhere to a multitude of application-level s...
research
02/01/2021

Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification

A Digital Twin (DT) is a digital representation of a physical object use...
research
07/22/2022

Security policy audits: why and how

Information security isn't just about software and hardware – it's at le...
research
06/17/2021

Enabling Security-Oriented Orchestration of Microservices

As cloud providers push multi-tenancy to new levels to meet growing scal...
research
05/08/2022

Reasoning about inter-procedural security requirements in IoT applications

The importance of information security dramatically increased and will f...
research
05/30/2018

Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86

Modern applications are increasingly advanced and complex, and inevitabl...
research
09/05/2022

A repository of automatic GUI test patterns in Android applications: Specification and Analysis using Alloy modeling language

The software industry aims to provide customers with quality software. T...

Please sign up or login with your details

Forgot password? Click here to reset