SecReq
- 1. Chalmers | University of Gothenburg
- 2. Statnett SF
- 3. University of East London
- 4. University Koblenz-Landau
- 5. Leibniz Universität Hannover
Description
The goal of SecReq [2] is to assist all steps in security requirements elicitation, as well as providing mechanisms to trace security requirements from high-level security statements (security objectives) to rather secure design. The approach aims at bridging the gap between security best practises and the lack of security experience among developers and designers. SecReq combines three distinctive techniques that have been integrated to meet this goal: (1) Common Criteria [1] and its underlying security requirements elicitation and refinement process, (2) the HeRA tool [4] with its security-related heuristic rules, and (3) the UMLsec tool set [3] for security analysis and design.
In order to let others reproduce our results, we share our data and tools here.
- Expert Classification of requirements: In order to train and evaluate heuristic classifiers that identify security-relevant requirements, we need pre-classified requirements. Download our Expert-Classification of ePurse-Specification.
- Training and Testdata: From the expert classification, we derive sets of classified requirements for training and evaluation. These are simple CSV files, for the three specifications in our evaluation:
- ePurse, the Common Electronic Purse Specification [6]
- CPN, the Customer Premises Network specification [7]
- GPS, the Global Platform Specification [8]
- Evaluation tool: In order to apply our training and evaluation datasets, we created a tool that manages the evaluation. It allows to load different datasets, apply them to a heuristic classifier, and evaluate the results. Please download and try our Evaluation Tool.
- Extract the Zip, start the secreqEvaluationTool.jar, and add one or more of the specifications from above via the file menu.
- Specify, which requirements should be used for training either manually or via the edit menu.
- Train and use the classifier via the Actions menu. Resize the window, to make the statistics in the bottom line visible.
- Use Tools - explain selected to analyse the data. If a requirement is selected, the tool displays the information it has about each word in the requirement. If no requirement is selected, the tool shows the trained database.
- To get a visualisation of the performance of the classifiers, use Actions - K-fold cross validation. The analysis uses the requirements already loaded, but ignores training and classifier selections. We used a Bayesian classifier with classic parameters for our evaluation.
References
- ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007.
- Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, and Kurt Schneider. Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. Requir. Eng., 15(1):63-93, March 2010.
- Jan Jürjens. Secure Systems Development with UML. Springer Academic Publishers, Heidelberg, 2005.
- Eric Knauss, Daniel Lübke, and Sebastian Meyer. Feedback-Driven Requirements Engineering: The Heuristic Requirements Assistant. In 31st International Conference on Software Engineering (ICSE 2009), pages 587-590, Vancouver, Canada, 2009.
- Knauss, E.; Houmb, S.; Schneider, K.; Islam, S. & Jürjens. Supporting Requirements Engineers in Recognising Security Issues. In Proceedings of 17th Intl. Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'11), Springer, 2011
- CEPSCO: Common Electronic Purse Specification (ePurse), http://web.archive.org/web/20070203044348/http://www.cepsco.com/ (accessed April 2007)
- TISPAN, ETSI: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Services requirements and capabilities for customer networks connected to TISPAN NGN. Technical report, European Telecommunications Standards Institute
- GlobalPlatform: Global Platform Specification (GPS), http://www.globalplatform.org (accessed August 2010)
Notes
Files
CPN.csv
Files
(5.7 MB)
Name | Size | Download all |
---|---|---|
md5:863f2b6a990c2ab6dbce7dbf83a020ba
|
34.2 kB | Preview Download |
md5:30815a7f5777cf52216fb3b6f68d4ccc
|
100.4 kB | Download |
md5:2b0e6563c8f5dbb34a2f0def1fbcf136
|
22.4 kB | Preview Download |
md5:2f8958875b1c3401bb46b197cba00ad2
|
38.6 kB | Preview Download |
md5:e5e5876277143af1db8358a3102b66e2
|
5.5 MB | Preview Download |
Additional details
Related works
- Is supplement to
- Journal article: 10.1007/s00766-009-0093-9 (DOI)
- Journal article: 10.1007/s00766-011-0141-0 (DOI)