Back to Search Start Over

Identifying Potential Security Flaws using Loophole Analysis and the SECREt.

Authors :
Busby-Earle, Curtis
Mugisa, Ezra K.
Source :
GSTF Journal on Computing. 2011, Vol. 1 Issue 2, p61-68. 8p.
Publication Year :
2011

Abstract

In contemporary software development there are a number of methods that attempt to ensure the security of a system. Many of these methods are however introduced in the latter stages of development or try to address the issues of securing a software system by envisioning possible threats to that system, knowledge that is usually both subjective and esoteric. In this paper we introduce the concept of path fixation and discuss how contradictory paths or loopholes, discovered during requirements engineering and using only a requirements specification document, can lead to potential security flaws in a proposed system. The SECREt is a proof-of-concept prototype tool developed to demonstrate the effectiveness of loophole analysis. We discuss how the tool performs a loophole analysis and present the results of tests conducted on an actual specification document. We conclude that loophole analysis is an effective, objective method for the discovery of potential vulnerabilitites that exist in proposed systems and that the SECREt can be successfully incorporated into the requirements engineering process. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20102283
Volume :
1
Issue :
2
Database :
Academic Search Index
Journal :
GSTF Journal on Computing
Publication Type :
Academic Journal
Accession number :
85627312
Full Text :
https://doi.org/10.5176/2010-2283_1.2.40