@inproceedings{a33bd424fd9349a5a4cfd71714768b65,
title = "OASIS: Weakening User Obligations for Security-critical Systems",
abstract = "Security-critical systems typically place some requirements on the behaviour of their users, obliging them to follow certain instructions when using those systems. Security vulnerabilities can arise when users do not fully satisfy their obligations. In this paper, we propose an approach that improves system security by ensuring that attack scenarios are mitigated even when the users deviate from their expected behaviour. The approach uses structured transition systems to present and reason about user obligations. The aim is to identify potential vulnerabilities by weakening the assumptions on how the user will behave. We present an algorithm that combines iterative abstraction and controller synthesis to produce a new software specification that maintains the satisfaction of security requirements while weakening user obligations. We demonstrate the feasibility of our approach through two examples from the e-voting and e-commerce domains.",
keywords = "e-voting, System security, user behaviour",
author = "Tun, \{Thein Than\} and Amel Bennaceur and Bashar Nuseibeh",
note = "Publisher Copyright: {\textcopyright} 2020 IEEE.; 28th IEEE International Requirements Engineering Conference, RE 2020 ; Conference date: 31-08-2020 Through 04-09-2020",
year = "2020",
month = aug,
doi = "10.1109/RE48521.2020.00023",
language = "English",
series = "Proceedings of the IEEE International Conference on Requirements Engineering",
publisher = "IEEE Computer Society",
pages = "113--124",
editor = "Travis Breaux and Andrea Zisman and Samuel Fricker and Martin Glinz",
booktitle = "Proceedings - 28th IEEE International Requirements Engineering Conference, RE 2020",
}