Download now Free registration required
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. The authors present an approach to analyze the security of software-intensive system architectures that focuses on making these underlying assumptions explicit, so that they can be taken into account. Starting from an Alloy model of a software architecture, a set of constraints is elicited by leveraging model relaxation techniques. These constraints form a minimal but sufficient condition that the system must meet in order to realise its security requirements. As the approach starts from the minimal guarantees that the system environment offers, it does not depend on an explicit attacker model and can take arbitrary attacker behavior into account.
- Format: PDF
- Size: 250.16 KB