Published February 10, 2021 | Version v1
Dataset Open

SecReq

  • 1. Chalmers | University of Gothenburg
  • 2. Statnett SF
  • 3. University of East London
  • 4. University Koblenz-Landau
  • 5. Leibniz Universität Hannover

Description

The goal of SecReq [2] is to assist all steps in security requirements elicitation, as well as providing mechanisms to trace security requirements from high-level security statements (security objectives) to rather secure design. The approach aims at bridging the gap between security best practises and the lack of security experience among developers and designers. SecReq combines three distinctive techniques that have been integrated to meet this goal: (1) Common Criteria [1] and its underlying security requirements elicitation and refinement process, (2) the HeRA tool [4] with its security-related heuristic rules, and (3) the UMLsec tool set [3] for security analysis and design.

In order to let others reproduce our results, we share our data and tools here.

  • Expert Classification of requirements: In order to train and evaluate heuristic classifiers that identify security-relevant requirements, we need pre-classified requirements. Download our Expert-Classification of ePurse-Specification.
  • Training and Testdata: From the expert classification, we derive sets of classified requirements for training and evaluation. These are simple CSV files, for the three specifications in our evaluation:
    • ePurse, the Common Electronic Purse Specification [6]
    • CPN, the Customer Premises Network specification [7]
    • GPS, the Global Platform Specification [8]
  • Evaluation tool: In order to apply our training and evaluation datasets, we created a tool that manages the evaluation. It allows to load different datasets, apply them to a heuristic classifier, and evaluate the results. Please download and try our Evaluation Tool.
    • Extract the Zip, start the secreqEvaluationTool.jar, and add one or more of the specifications from above via the file menu.
    • Specify, which requirements should be used for training either manually or via the edit menu.
    • Train and use the classifier via the Actions menu. Resize the window, to make the statistics in the bottom line visible.
    • Use Tools - explain selected to analyse the data. If a requirement is selected, the tool displays the information it has about each word in the requirement. If no requirement is selected, the tool shows the trained database.
    • To get a visualisation of the performance of the classifiers, use Actions - K-fold cross validation. The analysis uses the requirements already loaded, but ignores training and classifier selections. We used a Bayesian classifier with classic parameters for our evaluation.

References

  1. ISO 15408:2007 Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 2, CCMB-2007-09-001, CCMB-2007-09-002 and CCMB-2007-09-003, September 2007.
  2. Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, and Kurt Schneider. Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. Requir. Eng., 15(1):63-93, March 2010.
  3. Jan Jürjens. Secure Systems Development with UML. Springer Academic Publishers, Heidelberg, 2005.
  4. Eric Knauss, Daniel Lübke, and Sebastian Meyer. Feedback-Driven Requirements Engineering: The Heuristic Requirements Assistant. In 31st International Conference on Software Engineering (ICSE 2009), pages 587-590, Vancouver, Canada, 2009.
  5. Knauss, E.; Houmb, S.; Schneider, K.; Islam, S. & Jürjens. Supporting Requirements Engineers in Recognising Security Issues. In Proceedings of 17th Intl. Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'11), Springer, 2011
  6. CEPSCO: Common Electronic Purse Specification (ePurse), http://web.archive.org/web/20070203044348/http://www.cepsco.com/ (accessed April 2007)
  7. TISPAN, ETSI: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Services requirements and capabilities for customer networks connected to TISPAN NGN. Technical report, European Telecommunications Standards Institute
  8. GlobalPlatform: Global Platform Specification (GPS), http://www.globalplatform.org (accessed August 2010)

Notes

This dataset was originally hosted at Leibniz Universität Hannover. A copy of the dataset has been used in the data challenge of RE 2017 data track. None of these resources is still available, thus we are hosting the set now here.

Files

CPN.csv

Files (5.7 MB)

Name Size Download all
md5:863f2b6a990c2ab6dbce7dbf83a020ba
34.2 kB Preview Download
md5:30815a7f5777cf52216fb3b6f68d4ccc
100.4 kB Download
md5:2b0e6563c8f5dbb34a2f0def1fbcf136
22.4 kB Preview Download
md5:2f8958875b1c3401bb46b197cba00ad2
38.6 kB Preview Download
md5:e5e5876277143af1db8358a3102b66e2
5.5 MB Preview Download

Additional details

Related works

Is supplement to
Journal article: 10.1007/s00766-009-0093-9 (DOI)
Journal article: 10.1007/s00766-011-0141-0 (DOI)