Applying a Goal-Oriented Method for Hazard Analysis: A Case Study Sam Supakkul The University of Texas at Dallas Lawrence Chung The.

Slides:



Advertisements
Similar presentations
1 GRL Introduction Lin Liu University of Toronto April 2001.
Advertisements

Centralize or Decentralize? A Requirements Engineering Perspective on Internet-Scale Architectures Eric Yu University of Toronto July 2000.
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
A UML Profile for Goal-Oriented and Use Case-Driven Representation of NFRs and FRs Sam Supakkul Titat Software LLC Lawrence Chung The.
lamsweerde Part 2: Building System Models for RE © 2009 John Wiley and Sons 1 Part 2: Building System Models for RE Introduction.
Planning using Problem Analysis and The Theory of Change.
CSC 593: Secure Software Engineering SeminarSlide #1 Misuse Cases: Use Cases With Hostile Intent Ian Alexander.
Software Transparency Support from Dagstuhl-Seminar :Science of Design 10/2008 Julio Cesar Sampaio do Prado Leite Departamento de Informática Pontifícia.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
درس مهندسی نیازمندی ها استاد دکتر عبداله زاده دانشجو خیرالنسا مرچانت Dealing with NFR : Three Experimental Studies of a Process-Oriented Approach.
Security by Design Thomas Zalonis Seth Gainey Neil C. Lee Thomas Zalonis Seth Gainey Neil.
Amirkabir University of Technology, Computer Engineering Faculty, Intelligent Systems Laboratory,Requirements Engineering Course, Dr. Abdollahzadeh 1 Dealing.
SE 555 Software Requirements & Specification 1 Misuse Cases.
Modeling challenges: Compliance (1/2) Compliance management has emerged as a major problem following major corporate governance scandals (e.g. Enron, WorldComm)
Dealing with NFRs Vahid Jalali Amirkabir university of technology, Department of computer engineering and information technology, Intelligent systems laboratory,
Cloud Usability Framework
LUCENTIA Research Group Department of Software and Computing Systems Using i* modeling for the multidimensional design of data warehouses Jose-Norberto.
Toward Component Non-functional Interoperability Analysis: A UML- based and Goal-oriented Approach Sam Supakkul and Lawrence Chung The University of Texas.
Architecture Tradeoff Analysis Method Based on presentations by Kim and Kazman
Company LOGO Business Process Monitoring and Alignment An Approach Based on the User Requirements Notation and Business Intelligence Tools Pengfei Chen.
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.
Problems in handling NFR Term Paper (as-is) problem statement BY AJAYKUMAR ASWATHAPPA CS/SE 6361 EXECUTIVE.
Nary Subramanian Firmware Engineer Applied Technology Division Anritsu Company Richardson, TX. Lawrence Chung.
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR.
Evaluating Goal Achievement in Enterprise Modeling – An Interactive Procedure and Experiences Jennifer Horkoff 1 Eric Yu 2 1 Department of Computer Science,
Architecting secure software systems
Capturing, Organizing, and Reusing Knowledge of NFRs: An NFR Pattern Approach Sam Supakkul 1 Tom Hill 2 Ebenezer Akin Oladimeji 3 Lawrence Chung 1 1 The.
Virtual OSGi Framework and Telecommunications Sam Supakkul Yotta Networks Digital Pockets, LLC Dallas, Texas Lawrence Chung Dept.
Project design & Planning The Logical Framework Approach An Over View Icelandic International Development Agency (ICEIDA) Iceland United Nations University.
Architecting Adaptable Software Using COTS: An NFR Approach Lawrence Chung Kendra Cooper Anna Yi Department of Computer Science University of Texas at.
Jan 20-21, 2005Weiss and Amyot, MCETECH 051 Designing and Evolving Business Models with the User Requirements Notation Michael Weiss (Carleton University)
Module 4: Systems Development Chapter 12: (IS) Project Management.
Effective Requirements Management – an overview Kristian Persson Field Product Manager, Telelogic Asia/Pacific.
S CHOOL OF I NFORMATION T ECHNOLOGY AND E NGINEERING U NIVERSITY OF O TTAWA, C ANADA Daniel Amyot Q18/17 (URN) Rapporteur User Requirements.
© Mahindra Satyam 2009 Decision Analysis and Resolution QMS Training.
Sam Supakkul Lawrence Chung The University of Texas at Dallas
Misuse Cases Claude Turner. Outline Introduction Misuse Cases Example 1 Example 2 Tool Support for Use and Misuse Cases.
1 Introduction to Software Engineering Lecture 1.
Designing software architectures to achieve quality attribute requirements F. Bachmann, L. Bass, M. Klein and C. Shelton IEE Proceedings Software Tzu-Chin.
1 Evolving System Architecture to Meet Changing Business Goals An Agent and Goal-Oriented Approach Daniel Gross & Eric Yu Faculty of Information Studies.
Capturing and Reusing Functional and Non-functional Requirements Knowledge: A Goal-Object Pattern Approach Lawrence Chung and Sam Supakkul The University.
COTS-Aware Requirements Engineering and Software Architecting
Human Computer Interaction
Security Codesign Steve Dawson and Victoria Stavridou Bruno Dutertre, Josh Levy, Bob Riemenschneider, Hassen Saidi, Tomas Uribe System Design Laboratory.
Design and Implementation of a Rationale-Based Analysis Tool (RAT) Diploma thesis from Timo Wolf Design and Realization of a Tool for Linking Source Code.
Copyright ©2004 Virtusa Corporation | CONFIDENTIAL Requirement Engineering Virtusa Training Group 2004 Trainer: Ojitha Kumanayaka Duration : 1 hour.
Developing Adaptable Software Architectures for Real-Time Systems Using Design Patterns Lawrence Chung, Kendra Cooper, Anna Yi The University of Texas.
Part III: Strategy in Action
S CHOOL OF I NFORMATION T ECHNOLOGY AND E NGINEERING U NIVERSITY OF O TTAWA, C ANADA Daniel Amyot Q18/17 (URN) Rapporteur User Requirements.
Software Architecting Using Goals, Scenarios, Patterns and Objects Lawrence Chung The University of Texas at Dallas.
Integrating FRs and NFRs: A Use Case and Goal Driven Approach Presented by Chin-Yi Tsai.
Integrating FRs and NFRs: A Use Case and Goal Driven Approach Sam Supakkul Network Surveillance Systems MCI Lawrence Chung Dept. of.
Requirement Engineering with URN: Integrating Goals and Scenarios Jean-François Roy Thesis Defense February 16, 2007.
Requirements Engineering From System Goals to UML Models to Software Specifications Axel Van Lamsweerde.
Rule-based Context-aware Adaptation Using a Goal-Oriented Ontology Hongyuan Wang (Jilin University, China) Rutvij Mehta (The University of Texas at Dallas,USA)
Network-Centric Analysis and Representation Requirements for Successful Effects Based Operations Resilient Cognitive Solutions James Gualtieri, William.
1 Towards Integrated Tool Support for the User Requirements Notation Jean-François Roy
© NALO Solutions Limited NALO Solutions, presents the – Revenue Collector App Using Mobile Phones to gather Revenue SOFTWARE ENGINEERING.
SECURE TROPOS Michalis Pavlidis 8 May Seminar Agenda  Secure Tropos  History and Foundation  Tropos  Basics  Secure Tropos  Concepts / Modelling.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Page 1 An Overview of The COTS-Aware Requirements Engineering and Software Architecting Project (CARE/SA) The University of Texas at Dallas Department.
Software Engineering Lecture 4 System Modeling The Analysis Stage.
Chapter Three Objectives
The University of Texas at Dallas
A Tutorial for a RE-Tool
Integrating FRs and NFRs: A Use Case and Goal Driven Approach
Computer Security Introduction
SECURITY AS NON-FUNCTIONAL REQUIREMENT IN SOFTWARE ENGINEERING
And now the Framework WP4.
Requirements engineering in Cloud Computing
Presentation transcript:

Applying a Goal-Oriented Method for Hazard Analysis: A Case Study Sam Supakkul The University of Texas at Dallas Lawrence Chung The University of Texas at Dallas

e-commerce system related “hazards” steal card info flood system Adapted from: G. Sindre and A. Opdahl, “Eliciting Security Requirements by Misuse Cases”, TOOLS Pacific 2000 E. A. Oladimeji, S. Supakkul, and L. Chung, “Security Threat Modeling And Analysis: A Goal-oriented Approach”, submitted to SEA06 obtain password server down unauthorized account disclosure repudiation spoofing hazard = an obstacle to product’s goal achievement

Car related “hazards” theft paint fading broken antenna robbery driver injury engine break-down Challenges for hazard analysis How to represent hazards and countermeasures? How to organize and focus hazards elicitation? How to rationalize and trade-off multiple countermeasures? How to integrate with requirements model? rusting

Current practice – misuse cases [G. Sindre and A. L. Opdahl, “Eliciting Security Requirements with Misuse Cases”, Requirements Engineering 2002] Misuse case threatens use case Countermeasure use case mitigates misuse case Real attackers e.g. crook, thief Imaginary attackers e.g. bad luck, bad weather Seamlessly integrated with use case model Interplay between hazards and countermeasures Equal weight for all hazards Alternatives and rationale not recorded Require malicious actor for every hazard

Current practice – fault tree [D. Lu and R. Lutz, “Fault contribution trees for product families”, ISSRE 2002] Fault or hazard Refine hazard with AND/OR decomposition Hazard relationships through AND/OR decomposition Only hazards are represented Independent of requirements model Detailed hazard

Strategies for meeting the challenges How to represent hazards and countermeasures Hazard = obstacle to product’s goal achievement Countermeasure = obstacle to hazard achievement How to organize and focus hazards elicitation NFR-driven elicitation, focus more on critical NFRs How to rationalize one countermeasure over others  multiple countermeasures per hazard  compare by countermeasure’s effectiveness and justification How to integrate with requirements model Integrate with the UML use case model

Adopting the NFR Framework for hazard analysis Represent NFRs as (soft)goals Identify NFR operationalizations with positive contribution to achieve NFRs Extensions to support hazard analysis: Associate NFRs with use case model elements Hazard = NFR operationalization with negative contribution toward the NFRs countermeasure = operationalization with negative contribution toward the hazards

Representing NFRs as softgoals in the use case model [Supakkul and Chung, SERA 04] The association provides context for the NFRs Security of the system (car) Convenience of the interface ! ! → important NFR !! → critical NFR

Refine NFRs and explore solution alternatives [J. Mylopoulos and L. Chung 92, L. Chung et. al 2000] NFR Softgoal NFR Operationalization Claim AND Decomposition Positive Contribution for possible solutions 1. Refine NFR softgoals 2. Explore solution alternatives (operationalization) 4. Make trade-offs analysis and finalize design decisions 3. Record arguments “for” or “against” choices and contributions Naming convention = Type [Topic] Type = Availability, Topic = EMS Negative contribution for side-effects !

Hazard analysis process perform hazard analysis before the regular NFR operationalization analysis Reason: some operationalizations are natural countermeasures of some hazards. e.g. LockDoor to counter Theft

Hazard analysis for car hazard = operationalization with negative contribution toward NFR hazard refined with AND-decomposition to detailed hazards ignition key as a countermeasure to prevent thief from starting the engine Thief may counter and circumvent by shorting the ignition circuit to start the engine. Lock transmission to counter the shorting of the ignition.

Traceability between hazards and countermeasures Node-countering countermeasure UseKey counters StartEngine Link-countering hazard Break-in counters the countermeasuring of LockDoor on AccessCabin Link-countering countermeasure UseDoorRemoteControl counters the side-effect of LockDoor on Convenience NFR Diagrammatically unclear which negative contribution is countered. Node-countering hazard ShortIgnition counters UseKey Node-countering countermeasure LockTransmission counters ShortIgnition

Determining NFR satisficing accepted by the stakeholders denied as it is negated by the countermeasure satisficed as its hazard has been negated denied as it is negated by the countermeasure denied because an offspring of AND-decomposition is denied satisficed as its hazard has been negated accepted by the stakeholders satisficed as its countermeasure has been negated satisficed as the side-effect has been negated

Implementing the countermeasures Include ignition key as a part of the car architecture Reflect LockTransmission behavior in the functional requirements

An experimental case study of car hazard analysis Hypotheses: 1.The goal-oriented approach is suitable for hazard analysis? 2.Non-attacker-driven hazard elicitation is not intuitive for hazard analysis 3.The goal-oriented approach is well integrated with the use case modeling

Suitability of the goal-oriented approach for hazard analysis Explicit representation of hazards and corresponding countermeasures → hazard = operationalization with negative contribution toward NFR → countermeasure = operationalization with negative contribution toward hazard Focused hazards elicitation → NFR-driven elicitation → focus more on hazards of critical NFRs Reasoning framework → explore multiple countermeasures → select based on degree of contribution and supporting claims Integration with requirements model → associate NFRs with use case model elements → map countermeasures to additional use cases

Intuitiveness of the non-attacker- driven approach Comparing with attacker-driven approaches Not as intuitive for hazards initiated by real agents Thief → initiates “CarTheft” hazard Robber → initiates “Robbery” hazard More natural for unintentional hazards “EngineBreakDown” hazard: unnatural to model “wear and tear” as the attacker “CarSkid” hazard: unnatural to model “bad weather” as the attacker

Good integration with use case model Pros: forward integration by associating NFRs (the starting point of hazard elicitation) with use case model elements backward integration by mapping countermeasures to additionaluse cases Cons: the hazard analysis not integrated and performed in the use case model

Benefits and limitation of the approach Benefits: complement & transparency to positive modeling natural for risk related NFRs operationalizations are countermeasures of some hazards difficult to identify operationalization that is not a countermeasure of some hazard some countermeasures may partially/slightly negate the hazard some other may more strongly negate the hazard Limitation: no explicit representation of natural attackers need different degrees of negative contribution

Conclusion Contributions: use of negative contribution to represent hazards and countermeasures introduction of link-associated operationalization to provide precise context for countermeasures the car hazard analysis to illustrate the application of the goal-oriented approach Future work: use different degrees of negative contribution for hazards and countermeasures refine label propagation to deal with different degrees of negative contributions

Applying a Goal-Oriented Method for Hazard Analysis: A Case Study Sam Supakkul The University of Texas at Dallas Lawrence Chung The University of Texas at Dallas Thank you!