The application of software and safety engineering techniques to security protocol development
نویسنده
چکیده
Security protocols are series of steps designed to achieve a particular aim, whilst also providing security functions. However, despite extensive research, protocols are still being designed which are susceptible to common flaws and attacks. Much of the research in this area has focused on protocol verification and, to a lesser extent, protocol design. Many comparisons have been made between software and safety and security engineering. This thesis builds on these comparisons in order to identify an approach to protocol development which reduces the likelihood of the occurrence of common flaws and attacks. This thesis proposes a process model for protocol development and justifies why such a model should be used to structure protocol development. One area that has often been overlooked in protocol research is that of the requirements of the security protocol. In this thesis, this area is investigated and, as a result, two techniques for the analysis and elicitation of security protocol requirements have been developed. The first technique is the Vulnerability Identification and Analysis (VIA) method. This is based on the HAZOP technique, which is successfully used in safety engineering, as well as a wide variety of other industries. The VIA method provides a structured approach to the deviation analysis of security protocol requirements, as well as the elicitation of further requirements. The second technique, Requirements Analysis and Elicitation (RAE) trees, extends the tree based analysis techniques which have been developed for the security field and draws on ideas from the safety analysis technique Fault Tree Analysis. The RAE trees are used to determine the causes of, and identify requirements to address, protocol vulnerabilities.
منابع مشابه
Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملTowards Analyzing Security-Critical Software During Development
We describe an approach and tool for analyzing the vulnerability of software applications to anomalous events and malicious threats during software development. Traditionally, security analysis has been applied at the network system level, after release, using tiger team approaches. After a successful tiger team penetration, speciic system vulnerabilities are patched. We make a case for applyin...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملA Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams
1 A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams; Tosin Daniel Oyetoyan, Department of Software Engineering, Safety & Security, SINTEF Digital, Trondheim, Norway Martin Gilje Jaatun, Department of Software Engineering, Safety & Security, SINTEF Digital, Trondheim, Norway Daniela Soares Cruzes, Department of Software Engineering, Safety & Security,...
متن کاملoverview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002