SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Software Engineering and
     Information Security
     R&D Perspectives

     Massimo Felici




Massimo Felici © 2012   Software Engineering and Information Security   1
Overview
     • Background and Experience
     • Software Engineering and Information Security: Rationale
     • Complex Application Domain: Air Traffic Management
     • Research Perspectives
           – Requirements
           – Risk Analysis
           – Design and Validation
     • Research Considerations
           – Research Impact
     • Future Research


Massimo Felici © 2012        Software Engineering and Information Security   2
Background and Experience




Massimo Felici © 2012   Software Engineering and Information Security   3
Rationale
   SOFTWARE ENGINEERING AND
   INFORMATION SECURITY

Massimo Felici © 2012   Software Engineering and Information Security   4
Sony Security Cyber Attack
     • “Sony of Japan revealed that names, addresses, passwords
       and possibly credit-card details of 77 million accounts were
       stolen when hackers gained access to the network it runs in 60
       countries for its PlayStation online-gaming system”
                                                                 [The Economist, Apr 28th 2011]

     • “Sony warns of almost 25 million extra user detail theft”
                                                                         [BBC News, 3 May 2011]




Massimo Felici © 2012    Software Engineering and Information Security                            5
Security Attacks
Attacker Types and Techniques                    Attach Type, Time and Impact




                           [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report]

Massimo Felici © 2012   Software Engineering and Information Security                              6
Vulnerability Disclosures




                        [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report]


Massimo Felici © 2012               Software Engineering and Information Security                    7
Who should worry?
     • Security is a concern across different domains and countries
     • “An investigation of targeted intrusions into more than 70 global
       companies, governments, and non-profit organizations during the last
       five years”




                                                                          [McAfee, 2011]



Massimo Felici © 2012     Software Engineering and Information Security                    8
Scenario

   AIR TRAFFIC MANAGEMENT


Massimo Felici © 2012   Software Engineering and Information Security   9
Complex Application Domain
     • Ongoing developments in the Air Traffic Management domain
     • The SESAR (Single European Sky ATM Research) project is the
       European air traffic control infrastructure modernisation programme.
       SESAR aims at developing the new generation Air Traffic
       Management system capable of ensuring the safety and fluidity of air
       transport worldwide over the next 30 years
     • Overall features
           – Large-Scale... European (and beyond) wide systems
           – Complex ICT
           – Stringent security requirements                     along      side   other   key
             Performance Indicators (e.g. Safety)
           – Deployments of new ICT involving operational changes
           – Human factors, changes in ICT affecting work practices


Massimo Felici © 2012       Software Engineering and Information Security                        10
Air Traffic Management
Today                                                The SESAR ATM System




                                              [SESAR Release, SESAR Joint Undertaking 2011]

Massimo Felici © 2012   Software Engineering and Information Security                    11
System Wide Information Management
      SWIM Infrastructure                           System Security Design




Massimo Felici © 2012   Software Engineering and Information Security        12
Research
   SOFTWARE ENGINEERING AND
   INFORMATION SECURITY

Massimo Felici © 2012   Software Engineering and Information Security   13
Ensuring Trustworthiness and Security in Service Composition


       Socio-Technical Security Requirements
                          Problem: ensuring trustworthiness and
                          security in service composition

                                                                        Modelling and Validation:
                                                                        socio-technical security requirements


Context: operational accounts of ATM
practice highlight information exchange




  Massimo Felici © 2012             Software Engineering and Information Security                               14
Requirements Evolution
 Problem: understanding requirements
 changes, requirements evolution
                                                            • Avionics case study
                                                            • Safety-critical software
                                                            • Empirical analysis of
                                                              requirements changes
                                                            • Functional analysis of
                                                              requirements changes
                                                            • Architecture stability
                                                            • Quantitative accounts of
                                                              requirements changes
                                                            • Requirements evolution
                                                              modelling
                                                                                    [Felici, 2004]

Massimo Felici © 2012        Software Engineering and Information Security                     15
Security Engineering for Lifelong Evolvable Systems




     Security Model-Driven Risk Analysis
   Problem: assessing impact of changes                                               [Felici et al., 2011]
   on critical security properties




   Modelling: structured (CORAS) models
   elicited to perform risk analysis




                                                              Validation: shift of risk perceptions

Massimo Felici © 2012             Software Engineering and Information Security                               16
Interdisciplinary Research Collaboration in                             Interdisciplinary Design and
            Dependability of Computer-Based Systems                                 Evaluation of Dependability



     Emerging Technological Risk
                                                             • Provides a multidisciplinary
                                                               account of technology risk
                                                             • Reviews different case
                                                               studies
                                                             • Identifies classes of socio-
                                                               technical hazards
                                                                   – how technological risk crosses
                                                                     organizational boundaries
                                                                   – how technological trajectories
     S. Anderson, M. Felici
                                                                     and evolution develop
     Emerging Technological Risk
     Underpinning the Risk of Technology Innovation
                                                                   – how social behaviour shapes,
                                                                     and is shaped by, technology
     Springer, 2012




Massimo Felici © 2012               Software Engineering and Information Security                          17
System Engineering for Security & Dependability




     Security & Dependability Patterns
Problem: Security & Dependability                              Context: supporting organisational work
Patterns to design and implement ICT                           practice to deal with emerging threats




  Validation: Security & Dependability
  Patterns enabling resilient processes



Massimo Felici © 2012           Software Engineering and Information Security                            18
Trust Observations
        Problem: validating new operational
        concepts and system configurations

     • Empirical analysis of an operational account of trust in
       validation exercises
     • Trust observations highlight how                                    different      system
       configurations support work practices




                                                                                  [Felici et al., 2011]
Massimo Felici © 2012          Software Engineering and Information Security                              19
Summary
     • Information security is a real problem in different complex
       application domains
           – Air Traffic Management
     • Research Perspectives
           – Requirements problems: validation and evolution
           – Socio-technical Risk Analysis: modelling and social
             perspectives of risk analysis
           – Validation: Dependability, Resilience, Trust




Massimo Felici © 2012      Software Engineering and Information Security   20
Research Considerations
   SOFTWARE ENGINEERING AND
   INFORMATION SECURITY

Massimo Felici © 2012   Software Engineering and Information Security   21
Research Remarks
     • Engineering software systems for security and trustworthiness
       requires dealing with subtle complexities
     • It is necessary to combine diverse methodologies
       throughout software development and deployment
     • My research is concerned with supporting engineering
       software and understanding software complexities (e.g. in
       terms of critical features) in different development phases
       (e.g. validation) and application domains
           – Multidisciplinary research
           – Socio-technical systems
           – Dependability, Risk, Trust



Massimo Felici © 2012      Software Engineering and Information Security   22
Research Impact: ATM Community
     • Exploited PhD on          requirements             evolution       within   the   EU
       SecureChange project
     • Exploited Dependability, Risk and Trust studies to support SME in
       related EU ICT projects
     • Conducted case studies drawn from the ATM domain
     • Led Edinburgh University engagement in the INNOVATE (INNOvation
       through Validation for Air Transportation in Europe) consortium,
       Modelling Support to Validation, Associate Partners of SESAR JU




     • Visibility: Work on Trust published, and also linked in SKYbrary (the
       online ATM reference collection for aviation safety knowledge)
     • Visibility: Consulting Editor for the US FAA (Federal Aviation
       Administration) International Journal of Applied Aviation
Massimo Felici © 2012     Software Engineering and Information Security                       23
Supporting European Commission
     • Co-organised a networking session, on Privacy, Identity Management
       and Dependability in Emerging ICT-based Interaction Scenarios:
       Trustworthy Fulfillment of Requirements beyond purely Technological
       Innovation, at ICT 2008
     • Appointed by the European Commission, Information Society and
       Media Directorate, Trust and Security, as Independent
       Expert/Reviewer for industry-led ICT projects
           – PrimeLife, Privacy and Identity Management in Europe for Life




           – WebSand, Server-driven Outbound Web-application Sandboxing




Massimo Felici © 2012       Software Engineering and Information Security    24
Another Application Domain: Healthcare
     Recently, started collaborating and extending research work in
     Healthcare domains
     • Centre for Population Health Sciences, The University of Edinburgh
        Anderson, S., Fairbrother, P., Felici, M., Hanley, J., McKinstry, B. Ure,
        J.: From Hazards to Resilience in Socio-Technical Healthcare
        Systems. In Hollnagel, E., Rigaud, E., Besnard, D. (Eds.),
        Proceedings of the fourth Resilience Engineering Symposium, pp.15-
        21 (2011)
     • Warwick Medical School, The University of Warwick
        Sujan, M.-A., Felici, M.: Combining Failure Mode and Functional
        Resonance Analyses in Healthcare Settings. In Proceedings of
        SAFECOMP 2012, the 31st International Conference on Computer
        Safety, Reliability and Security, LNCS, Springer-Verlag (to appear)




Massimo Felici © 2012       Software Engineering and Information Security           25
Supporting Research Communities
• SAFECOMP, International Conference on Computer Safety, Reliability and Security




• DSN, IEEE/IFIP International Conference on Dependable Systems and Networks




• SERE, IEEE International Conference on Software Security and Reliability
• ISARCS, International ACM SigSoft Symposium on Architecting Critical Systems
...and many others

Massimo Felici © 2012      Software Engineering and Information Security            26
Future Research
     • Software Engineering Foundations
           – Empirical investigation of software engineering models (e.g.
             requirements and design models)
           – Further understanding evolution (e.g. requirements evolution)
           – Modelling support to validation – INNOVATE (INNOvation
             through Validation for Air Transportation in Europe)
     • Security and Trust Observations
           – Security and Trust as deployment strategies that offers a rich
             range of trade-offs
           – Empirical investigation and validation of different Security and
             Trust models
     • Dependability Benchmarking and Risk Analysis
           – Socio-technical risk analysis
           – Operational validation

Massimo Felici © 2012        Software Engineering and Information Security      27
THANK YOU


Massimo Felici © 2012   Software Engineering and Information Security   28

Más contenido relacionado

La actualidad más candente

Software Engineering Unit 1
Software Engineering Unit 1Software Engineering Unit 1
Software Engineering Unit 1Abhimanyu Mishra
 
Inversion of Control
Inversion of ControlInversion of Control
Inversion of ControlGlen Alleman
 
Chapter 4 software project planning
Chapter 4 software project planningChapter 4 software project planning
Chapter 4 software project planningPiyush Gogia
 
Unit 6- Development Evolution model
Unit 6- Development Evolution model Unit 6- Development Evolution model
Unit 6- Development Evolution model arvind pandey
 
1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-rev1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-revFajar Baskoro
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes arvind pandey
 
SE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and SpecificationSE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and SpecificationAmr E. Mohamed
 
Quality Attribute: Testability
Quality Attribute: TestabilityQuality Attribute: Testability
Quality Attribute: TestabilityPranay Singh
 
Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Ahmed Alageed
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Dhairya Joshi
 
CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5SIMONTHOMAS S
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4Mohammed Romi
 
eUnit 2 software process model
eUnit 2  software process modeleUnit 2  software process model
eUnit 2 software process modelPreeti Mishra
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyGaditek
 

La actualidad más candente (20)

Ch1
Ch1Ch1
Ch1
 
Software Engineering Unit 1
Software Engineering Unit 1Software Engineering Unit 1
Software Engineering Unit 1
 
Unit1
Unit1Unit1
Unit1
 
Inversion of Control
Inversion of ControlInversion of Control
Inversion of Control
 
Chapter 4 software project planning
Chapter 4 software project planningChapter 4 software project planning
Chapter 4 software project planning
 
Unit 6- Development Evolution model
Unit 6- Development Evolution model Unit 6- Development Evolution model
Unit 6- Development Evolution model
 
1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-rev1 sad-01-introduction-june2015-rev
1 sad-01-introduction-june2015-rev
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
SE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and SpecificationSE18_Lec 04_Requirements Analysis and Specification
SE18_Lec 04_Requirements Analysis and Specification
 
Quality Attribute: Testability
Quality Attribute: TestabilityQuality Attribute: Testability
Quality Attribute: Testability
 
Component level design
Component   level designComponent   level design
Component level design
 
Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3Requirement Engineering Lec.1 & 2 & 3
Requirement Engineering Lec.1 & 2 & 3
 
Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7Software engg. pressman_ch-6 & 7
Software engg. pressman_ch-6 & 7
 
CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5
 
2 feasibility-study
2 feasibility-study2 feasibility-study
2 feasibility-study
 
Reqdet
ReqdetReqdet
Reqdet
 
Ian Sommerville, Software Engineering, 9th Edition Ch 4
Ian Sommerville,  Software Engineering, 9th Edition Ch 4Ian Sommerville,  Software Engineering, 9th Edition Ch 4
Ian Sommerville, Software Engineering, 9th Edition Ch 4
 
eUnit 2 software process model
eUnit 2  software process modeleUnit 2  software process model
eUnit 2 software process model
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information Technology
 

Destacado

analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information systemRenu Sharma
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1Boeun Tim
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information Systemnayanav
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAamir Abbas
 

Destacado (6)

ATM Concept 4D ASAS and TFM
ATM Concept 4D ASAS and TFMATM Concept 4D ASAS and TFM
ATM Concept 4D ASAS and TFM
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
 
analysis and design of information system
analysis and design of information systemanalysis and design of information system
analysis and design of information system
 
System Design and Analysis 1
System Design and Analysis 1System Design and Analysis 1
System Design and Analysis 1
 
System Analysis And Design Management Information System
System Analysis And Design Management Information SystemSystem Analysis And Design Management Information System
System Analysis And Design Management Information System
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 

Similar a Software Engineering and Information Security

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216William Linder
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216William Linder
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Luca Moroni ✔✔
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...CSCJournals
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkiaemedu
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkiaemedu
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkIAEME Publication
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering frameworkiaemedu
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteAntonio Fontes
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Sverige
 

Similar a Software Engineering and Information Security (20)

PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Linder,William H IT Auditor 0216
Linder,William H IT  Auditor 0216Linder,William H IT  Auditor 0216
Linder,William H IT Auditor 0216
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Appsec Introduction
Appsec IntroductionAppsec Introduction
Appsec Introduction
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Software Engineering and Information Security

  • 1. Software Engineering and Information Security R&D Perspectives Massimo Felici Massimo Felici © 2012 Software Engineering and Information Security 1
  • 2. Overview • Background and Experience • Software Engineering and Information Security: Rationale • Complex Application Domain: Air Traffic Management • Research Perspectives – Requirements – Risk Analysis – Design and Validation • Research Considerations – Research Impact • Future Research Massimo Felici © 2012 Software Engineering and Information Security 2
  • 3. Background and Experience Massimo Felici © 2012 Software Engineering and Information Security 3
  • 4. Rationale SOFTWARE ENGINEERING AND INFORMATION SECURITY Massimo Felici © 2012 Software Engineering and Information Security 4
  • 5. Sony Security Cyber Attack • “Sony of Japan revealed that names, addresses, passwords and possibly credit-card details of 77 million accounts were stolen when hackers gained access to the network it runs in 60 countries for its PlayStation online-gaming system” [The Economist, Apr 28th 2011] • “Sony warns of almost 25 million extra user detail theft” [BBC News, 3 May 2011] Massimo Felici © 2012 Software Engineering and Information Security 5
  • 6. Security Attacks Attacker Types and Techniques Attach Type, Time and Impact [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report] Massimo Felici © 2012 Software Engineering and Information Security 6
  • 7. Vulnerability Disclosures [IBM Security Solutions, IBM X-Force® 2011 Mid-year Trend and Risk Report] Massimo Felici © 2012 Software Engineering and Information Security 7
  • 8. Who should worry? • Security is a concern across different domains and countries • “An investigation of targeted intrusions into more than 70 global companies, governments, and non-profit organizations during the last five years” [McAfee, 2011] Massimo Felici © 2012 Software Engineering and Information Security 8
  • 9. Scenario AIR TRAFFIC MANAGEMENT Massimo Felici © 2012 Software Engineering and Information Security 9
  • 10. Complex Application Domain • Ongoing developments in the Air Traffic Management domain • The SESAR (Single European Sky ATM Research) project is the European air traffic control infrastructure modernisation programme. SESAR aims at developing the new generation Air Traffic Management system capable of ensuring the safety and fluidity of air transport worldwide over the next 30 years • Overall features – Large-Scale... European (and beyond) wide systems – Complex ICT – Stringent security requirements along side other key Performance Indicators (e.g. Safety) – Deployments of new ICT involving operational changes – Human factors, changes in ICT affecting work practices Massimo Felici © 2012 Software Engineering and Information Security 10
  • 11. Air Traffic Management Today The SESAR ATM System [SESAR Release, SESAR Joint Undertaking 2011] Massimo Felici © 2012 Software Engineering and Information Security 11
  • 12. System Wide Information Management SWIM Infrastructure System Security Design Massimo Felici © 2012 Software Engineering and Information Security 12
  • 13. Research SOFTWARE ENGINEERING AND INFORMATION SECURITY Massimo Felici © 2012 Software Engineering and Information Security 13
  • 14. Ensuring Trustworthiness and Security in Service Composition Socio-Technical Security Requirements Problem: ensuring trustworthiness and security in service composition Modelling and Validation: socio-technical security requirements Context: operational accounts of ATM practice highlight information exchange Massimo Felici © 2012 Software Engineering and Information Security 14
  • 15. Requirements Evolution Problem: understanding requirements changes, requirements evolution • Avionics case study • Safety-critical software • Empirical analysis of requirements changes • Functional analysis of requirements changes • Architecture stability • Quantitative accounts of requirements changes • Requirements evolution modelling [Felici, 2004] Massimo Felici © 2012 Software Engineering and Information Security 15
  • 16. Security Engineering for Lifelong Evolvable Systems Security Model-Driven Risk Analysis Problem: assessing impact of changes [Felici et al., 2011] on critical security properties Modelling: structured (CORAS) models elicited to perform risk analysis Validation: shift of risk perceptions Massimo Felici © 2012 Software Engineering and Information Security 16
  • 17. Interdisciplinary Research Collaboration in Interdisciplinary Design and Dependability of Computer-Based Systems Evaluation of Dependability Emerging Technological Risk • Provides a multidisciplinary account of technology risk • Reviews different case studies • Identifies classes of socio- technical hazards – how technological risk crosses organizational boundaries – how technological trajectories S. Anderson, M. Felici and evolution develop Emerging Technological Risk Underpinning the Risk of Technology Innovation – how social behaviour shapes, and is shaped by, technology Springer, 2012 Massimo Felici © 2012 Software Engineering and Information Security 17
  • 18. System Engineering for Security & Dependability Security & Dependability Patterns Problem: Security & Dependability Context: supporting organisational work Patterns to design and implement ICT practice to deal with emerging threats Validation: Security & Dependability Patterns enabling resilient processes Massimo Felici © 2012 Software Engineering and Information Security 18
  • 19. Trust Observations Problem: validating new operational concepts and system configurations • Empirical analysis of an operational account of trust in validation exercises • Trust observations highlight how different system configurations support work practices [Felici et al., 2011] Massimo Felici © 2012 Software Engineering and Information Security 19
  • 20. Summary • Information security is a real problem in different complex application domains – Air Traffic Management • Research Perspectives – Requirements problems: validation and evolution – Socio-technical Risk Analysis: modelling and social perspectives of risk analysis – Validation: Dependability, Resilience, Trust Massimo Felici © 2012 Software Engineering and Information Security 20
  • 21. Research Considerations SOFTWARE ENGINEERING AND INFORMATION SECURITY Massimo Felici © 2012 Software Engineering and Information Security 21
  • 22. Research Remarks • Engineering software systems for security and trustworthiness requires dealing with subtle complexities • It is necessary to combine diverse methodologies throughout software development and deployment • My research is concerned with supporting engineering software and understanding software complexities (e.g. in terms of critical features) in different development phases (e.g. validation) and application domains – Multidisciplinary research – Socio-technical systems – Dependability, Risk, Trust Massimo Felici © 2012 Software Engineering and Information Security 22
  • 23. Research Impact: ATM Community • Exploited PhD on requirements evolution within the EU SecureChange project • Exploited Dependability, Risk and Trust studies to support SME in related EU ICT projects • Conducted case studies drawn from the ATM domain • Led Edinburgh University engagement in the INNOVATE (INNOvation through Validation for Air Transportation in Europe) consortium, Modelling Support to Validation, Associate Partners of SESAR JU • Visibility: Work on Trust published, and also linked in SKYbrary (the online ATM reference collection for aviation safety knowledge) • Visibility: Consulting Editor for the US FAA (Federal Aviation Administration) International Journal of Applied Aviation Massimo Felici © 2012 Software Engineering and Information Security 23
  • 24. Supporting European Commission • Co-organised a networking session, on Privacy, Identity Management and Dependability in Emerging ICT-based Interaction Scenarios: Trustworthy Fulfillment of Requirements beyond purely Technological Innovation, at ICT 2008 • Appointed by the European Commission, Information Society and Media Directorate, Trust and Security, as Independent Expert/Reviewer for industry-led ICT projects – PrimeLife, Privacy and Identity Management in Europe for Life – WebSand, Server-driven Outbound Web-application Sandboxing Massimo Felici © 2012 Software Engineering and Information Security 24
  • 25. Another Application Domain: Healthcare Recently, started collaborating and extending research work in Healthcare domains • Centre for Population Health Sciences, The University of Edinburgh Anderson, S., Fairbrother, P., Felici, M., Hanley, J., McKinstry, B. Ure, J.: From Hazards to Resilience in Socio-Technical Healthcare Systems. In Hollnagel, E., Rigaud, E., Besnard, D. (Eds.), Proceedings of the fourth Resilience Engineering Symposium, pp.15- 21 (2011) • Warwick Medical School, The University of Warwick Sujan, M.-A., Felici, M.: Combining Failure Mode and Functional Resonance Analyses in Healthcare Settings. In Proceedings of SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability and Security, LNCS, Springer-Verlag (to appear) Massimo Felici © 2012 Software Engineering and Information Security 25
  • 26. Supporting Research Communities • SAFECOMP, International Conference on Computer Safety, Reliability and Security • DSN, IEEE/IFIP International Conference on Dependable Systems and Networks • SERE, IEEE International Conference on Software Security and Reliability • ISARCS, International ACM SigSoft Symposium on Architecting Critical Systems ...and many others Massimo Felici © 2012 Software Engineering and Information Security 26
  • 27. Future Research • Software Engineering Foundations – Empirical investigation of software engineering models (e.g. requirements and design models) – Further understanding evolution (e.g. requirements evolution) – Modelling support to validation – INNOVATE (INNOvation through Validation for Air Transportation in Europe) • Security and Trust Observations – Security and Trust as deployment strategies that offers a rich range of trade-offs – Empirical investigation and validation of different Security and Trust models • Dependability Benchmarking and Risk Analysis – Socio-technical risk analysis – Operational validation Massimo Felici © 2012 Software Engineering and Information Security 27
  • 28. THANK YOU Massimo Felici © 2012 Software Engineering and Information Security 28