UMLsecRT: reactive security monitoring of java applications with round-trip engineering

S Peldszus, J Bürger, J Jürjens - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Today's software systems tend to be long-living and often process security-critical data, so
keeping up with ever-changing security measures, attacks, and mitigations is critical to …

Secure data-flow compliance checks between models and code based on automated mappings

S Peldszus, K Tuma, D Strüber… - 2019 ACM/IEEE …, 2019 - ieeexplore.ieee.org
During the development of security-critical software, the system implementation must
capture the security properties postulated by the architectural design. This paper presents …

[PDF][PDF] Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies

J Briffaut, JF Lalande, C Toinard - International journal on …, 2009 - researchgate.net
Enforcement of security properties by Operating Systems is an open problem. To the best of
our knowledge, the solution presented in this paper1 is the first one that enables a wide …

Blare tools: A policy-based intrusion detection system automatically set by the security policy

L George, V Viet Triem Tong, L Mé - … Saint-Malo, France, September 23-25 …, 2009 - Springer
We present here an intrusion detection system automatically parameterized by the security
policy. The main idea consists in monitoring information flows in an operating system in …

Designing information flow policies for Android's operating system

R Andriatsimandefitra, S Geller… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
A mobile phone evolves as a data repository where the pieces of data have different owners
and may thus be protected by different security policies. These pieces of data are used on …

Specifying and enforcing a fine-grained information flow policy: Model and experiments

V Tong, A Clark, L Mé - Journal of Wireless Mobile Networks …, 2010 - eprints.qut.edu.au
In this paper we present a model for defining and enforcing a fine-grained information flow
policy. We describe how the policy can be enforced on a typical computer and present …

Information flow control for intrusion detection derived from mac policy

S Geller, C Hauser, F Tronel… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Most of today's MAC implementations can be turned into permissive mode, where no
enforcement is performed but alerts are raised instead. This behavior is very close to an …

Recovering security in model-based software engineering by context-driven co-evolution

J Bürger - 2019 - kola.opus.hbz-nrw.de
Software systems have an increasing impact on our daily lives. Many systems process
sensitive data or control critical infrastructure. Providing secure software is therefore …

Heterogeneous Event Causal Dependency Definition for the Detection and Explanation of Multi-Step Attacks

C Xosanavongsa - 2020 - theses.hal.science
Knowing that a persistent attacker will eventually succeed in gaining a foothold inside the
targeted network despite prevention mechanisms, it is mandatory to perform security …

An Assessment of Practical Hands-On Lab Activities in Network Security Management

TS Chou, N Hempenius - Journal of …, 2020 - digitalcommons.kennesaw.edu
With the advancement in technology over the past decades, networks have become
increasingly large and complex. In the meantime, cyberattacks have become highly …