There is a newer version of the record available.

Published March 12, 2020 | Version v3
Dataset Open

Artifacts: An Efficient Approach for Reviewing Security-Related Aspects in Agile Requirements Specifications of Web Applications

  • 1. PUC-Rio
  • 2. Blekinge Institute of Technology

Description

Abstract: Defects in requirements specifications can have severe consequences during the software development lifecycle. Some of them result in time and cost overruns due to incorrect or missing quality characteristics, such as security. This characteristic requires special attention in web applications because they have become a target for manipulating sensible data. Several concerns make security difficult to deal with. For instance, (1) when stakeholders discuss general requirements they are often unaware that they should also discuss security-related aspects, because (2) they typically do not have enough expertise in security. This often leads to unspecified or ill-defined security requirements. These concerns become even more challenging in agile contexts, where lightweight documentation is typically produced. To tackle this problem, we designed an approach for reviewing security-related aspects in agile requirements specifications of web applications. Our proposal considers user stories and security specifications as inputs and relates those user stories to security properties via Natural Language Processing. Based on the related security properties, our approach identifies high-level security requirements from the Open Web Application Security Project (OWASP) to be verified, and generates a reading technique to support reviewers in detecting defects. We evaluate our approach via three experiment trials conducted with 56 novice software engineers, measuring effectiveness, efficiency, usefulness, and ease of use. We compare our approach against using: (1) the OWASP high-level security requirements, and (2) a perspective-based approach as proposed in contemporary state of the art. The results strengthen our confidence that using our approach has a positive impact (with large effect size) on the performance of inspectors in terms of effectiveness and efficiency.

The files below contains the following data:

1) Consent form.docx: This document provides to the research subjects information to decide whether to participate in a research study or not based on an explanation of the proposed research and the nature of the participation that is requested of them.

2) Characterization_Questionnaire.docx:  This document shows the questions used to characterize the working experience and knowledge of the participants of the controlled experiment. The answers obtained through this questionnaire allowed us to identify some key characteristics about three knowledge areas: Agile Software Development, Software Security and Software Inspection.

3) Experiment_Results.xlsx: This Excel document shows a summary of the results of the experiments by participant ID, trial and technique. It also synthesizes the defects found by the reviewers and the characterization, follow up and TAM questionnaire.      

4) FollowUp_Questionnaire_AdHoc_Technique.docx: This document shows the questions used to acquire information about the review conducted by inspectors who used the ad hoc technique.

5) FollowUp_Questionnaire_Reading_Technique.docx: This document shows the questions used to acquire information about the review conducted by inspectors who used the proposed reading technique. 

6)  Repository of Keywords.docx: This document shows the keywords used by our proposed approach and that indicate some security concern. 

7) Task_description_AdHoc_A.docx: This document shows textual instructions on how to follow the ad hoc review for a set of user stories. 

8) Task_description_AdHoc_B.docx: This document shows textual instructions on how to follow the ad hoc review for another set of user stories.

9) Task_description_RT_A.docx: This document shows textual instructions on how to follow the proposed reading technique for a set of user stories.

10) Task_description_RT_B.docx: This document shows textual instructions on how to follow the proposed reading technique for another set of user stories. 

11) Training_Experiment.pptx: This document contains the material used to explain the topics involved in the experiment. It was used to train the subjects. 

Files

Files (1.1 MB)

Name Size Download all
md5:c98ebf4212017c2a05f81d7f45298569
62.8 kB Download
md5:3ee66498207bd605224e4c348e9c01f7
64.8 kB Download
md5:8f931a8ae451328a299102e3488aedda
188.4 kB Download
md5:01a8c3cec74763a222f7b37feb4ae034
63.1 kB Download
md5:004ad6073f6bab470e16c2d94b707898
64.5 kB Download
md5:695359a8661268ea272df8a8ba0e457e
75.3 kB Download
md5:39a5f960c88836875d92a5f859504ffd
74.5 kB Download
md5:9957ed0766f77fc7f79d7b9b44b8668c
74.4 kB Download
md5:333608165a556af45e807c2904f646a0
74.6 kB Download
md5:0ff0844cf1ac695d3138836614f7c799
74.7 kB Download
md5:d0d332097537e4edd0853ddbeb74f57c
302.9 kB Download

Additional details

Related works

Is cited by
Dataset: 10.5281/zenodo.3273298 (DOI)
Conference paper: 10.1109/RE.2019.00020 (DOI)