The 9th IEEE International Workshop on Trusted Collaboration

Research Article

Achieving Security Assurance with Assertion-based Application Construction

Download604 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2014.257691,
        author={Carlos Rubio-Medrano and Gail-Joon Ahn and Karsten Sohr},
        title={Achieving Security Assurance with Assertion-based Application Construction},
        proceedings={The 9th IEEE International Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2014},
        month={11},
        keywords={security assurance software specification software assertions role-based access control api sdk},
        doi={10.4108/icst.collaboratecom.2014.257691}
    }
    
  • Carlos Rubio-Medrano
    Gail-Joon Ahn
    Karsten Sohr
    Year: 2014
    Achieving Security Assurance with Assertion-based Application Construction
    TRUSTCOL
    ICST
    DOI: 10.4108/icst.collaboratecom.2014.257691
Carlos Rubio-Medrano,*, Gail-Joon Ahn1, Karsten Sohr2
  • 1: Arizona State University
  • 2: University of Bremen
*Contact email: crubiome@asu.edu

Abstract

Modern software applications are commonly builtby leveraging pre-fabricated modules, e.g. application programming interfaces (APIs), which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may be consequently occurred. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.