OASIS: Weakening User Obligations for Security-critical Systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security-critical systems typically place some requirements on the behaviour of their users, obliging them to follow certain instructions when using those systems. Security vulnerabilities can arise when users do not fully satisfy their obligations. In this paper, we propose an approach that improves system security by ensuring that attack scenarios are mitigated even when the users deviate from their expected behaviour. The approach uses structured transition systems to present and reason about user obligations. The aim is to identify potential vulnerabilities by weakening the assumptions on how the user will behave. We present an algorithm that combines iterative abstraction and controller synthesis to produce a new software specification that maintains the satisfaction of security requirements while weakening user obligations. We demonstrate the feasibility of our approach through two examples from the e-voting and e-commerce domains.

Original languageEnglish
Title of host publicationProceedings - 28th IEEE International Requirements Engineering Conference, RE 2020
EditorsTravis Breaux, Andrea Zisman, Samuel Fricker, Martin Glinz
PublisherIEEE Computer Society
Pages113-124
Number of pages12
ISBN (Electronic)9781728174389
DOIs
Publication statusPublished - Aug 2020
Externally publishedYes
Event28th IEEE International Requirements Engineering Conference, RE 2020 - Zurich, Switzerland
Duration: 31 Aug 20204 Sep 2020

Publication series

NameProceedings of the IEEE International Conference on Requirements Engineering
Volume2020-August
ISSN (Print)1090-705X
ISSN (Electronic)2332-6441

Conference

Conference28th IEEE International Requirements Engineering Conference, RE 2020
Country/TerritorySwitzerland
CityZurich
Period31/08/204/09/20

Keywords

  • e-voting
  • System security
  • user behaviour

Fingerprint

Dive into the research topics of 'OASIS: Weakening User Obligations for Security-critical Systems'. Together they form a unique fingerprint.

Cite this