Skip to content

Latest commit

 

History

History
 
 

3.3

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Task 3.3 “Software Development Lifecycle” of CyberSec4Europe had as one of its main goals to identify research challenges, requirements and approaches in all stages of the lifecycle of software.

Research Challenges in Secure Software Lifecycle

One of the main outcomes was the following set of research challenges related to security and privacy issues in the lifecycle of software:

  1. Assessing Security and Privacy Through the Life Cycle Short-term research
  2. Assessing Privacy Properties of Complex Systems Short-term research
  3. Privacy protection and User Empowerment in IoT Short-term research
  4. Securing Unsafe and Legacy Software Short-term research
  5. Protecting Leaked Credentials Short-term research
  6. Secure Access Control in Heterogeneous Systems Short-term research
  7. Manageable and Understandable Security Engineering Short-term research
  8. Unreliable Risk Estimates Short-term research
  9. Automated and Verified Network Security Configuration in Highly Dynamic Environments
  10. Scalable and Private Industrial Blockchain Short-term research
  11. Scaling TEEs for Cloud Applications Short-term research

The challenges are described in detail in the document D3.9 Research challenges and requirements for secure software development.

Proactive approaches for secure software development

The analysis of the research challenges lead to the identification of promising tool-supported approaches to be developed in order to address the challenges. A total of 13 tools to support different activities in the lifecycle of software was developed and demonstrated on a common smart-cities scenario as illustrated in the figure below.

Tools for Secure Software Lifecycle

Summary:

Sobek

Hermes

  • Tool: https://github.com/rolandomar/hermes
  • Main publications: João Soares, R. F. (2021). ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols. 15th International Conference on Network and System Security - NSS 2021. Springer - Lecture Notes in Computer Science (LNCS) series.

RisQFLan

Pleak

  • Tool: https://github.com/pleak-tools
  • Main publications: Dumas, Marlon, et al. "Multi-level privacy analysis of business processes: the Pleak toolset." International Journal on Software Tools for Technology Transfer (2021): 1-21.
  • Videos: tool demo

Verefoo

  • Tool: https://github.com/netgroup-polito/verefoo
  • Main publications: D. Bringhenti, G. Marchetto, R. Sisto, F. Valenza, J. Yusupov, ”A novel approach for security function graph configuration and deployment”, 7th IEEE Conference on Network Softwarization (NetSoft), 2021.
  • Videos: tool demo

CORAS

  • Tool: https://stverdal.github.io/#/
  • Main publications: Erdogan, Gencer, et al. "A Systematic Mapping Study on Approaches for Al-Supported Security Risk Assessment."2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2021.
  • Videos: tool demo

PVS

  • Tool: https://www.isa- afp.org/entries/Automated_Stateful_Protocol_Verification.html
  • Main publications: Hess, Andreas V., et al. "Performing Security Proofs of Stateful Protocols." 34th IEEE Computer Security Foundations Symposium (CSF). IEEE, 2021.
  • Videos: tool demo

BowTiePlus

HoneyGen

VTPin

  • Tool: https://github.com/uberspot/VTPin
  • Main publications: Sarbinowski, Pawel, et al. "VTPin: practical VTable hijacking protection for binaries." Proceedings of the 32nd Annual Conference on Computer Security Applications. 2016.

Modssl-hmac

  • Tool: https://bitbucket.org/srecgrp/modssl-hmac-public/
  • Main publications: Diomedous, Constantinos, and Elias Athanasopoulos. "Practical password hardening based on TLS." International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, Cham, 2019.
  • Videos: tool demo

SEMCO

  • Tool: https://doi.org/10.1109/ICECCS.2019.00033
  • Main publications: Rouland, Quentin, Brahim Hamid, and Jason Jaskolka. "Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support." Journal of Systems Architecture 117 (2021): 102073.
  • Videos: tool demo

Further details about the tools and their demonstration can be found in Deliverable D3.15: Proactive Approaches For Software Development. Accompanying videos for each tool can be found on a dedicated YouTube channel.

Subsequent work has lead to additional tools:

Lethe

  • Tool: https://bitbucket.org/srecgrp/lethe-public/
  • Main publications: Dionysiou, Antreas, and Athanasopoulos, Elias. "Lethe: Practical Data Breach Detection with Zero Persistent Secret State." European Symposium on Security and Privacy, IEEE. 2022.

Research Roadmap for Secure Software Lifecycle

The research carried out within the task lead to the identification of long-term research avenues within Secure Software Lifecycle:

  • Lightweight formal methods for industrial compliance
  • Holistic approaches to privacy, utility and efficiency
  • Privacy protection in untrusted IoT environments
  • Hardening by design
  • Credentials-protecting authentication
  • Scalable formal models, verification and synthesis Lightweight run-time security verification
  • Ensure continuous service and minimal maintenance Pivoting attacks
  • Risk estimates with dynamic data sources
  • Automated verified configuration for large-scale networks Autonomic elicitation of security policies
  • Industry-ready scalable, privacy-preserving blockchains
  • Adaptable by-design TEEs

Cybersecurity Research and Areas Priority

--- Governance and Capacity Building Trustworthy Ecosystems of Systems Trust-Building Blocks Disruptive Emerging Development
Example Asset ✔️ - - ✔️
SOBEK --- --- ✔️ ---
HERMES --- --- ✔️ ---
RisQFlan --- ✔️ ✔️ ---
Pleak --- --- ✔️ ---
Verefoo --- --- ✔️ ---
CORAS --- ✔️ ✔️ ---
PVS --- --- ✔️ ---
BowTiePlus --- ✔️ ✔️ ---
HoneyGen --- --- ✔️ ---
VTPin --- --- ✔️ ---
Modssl-hmac --- --- ✔️ ---
Lethe --- --- ✔️ ---
SEMCO --- --- ✔️ ---
--- Collaborative Networks Education & Training Certification Secure Platforms of Platforms Infrastructure Protection Holistic Data Protection AI-based Security Systems Security & Security Lifetime Management Secure Architectures for Next Generation Communication Secure Quantum Technologies Secure AI Systems Personalized Privacy Protection
SOBEK --- --- --- --- ✔️ --- --- ✔️ --- --- --- ✔️
HERMES --- --- --- --- ✔️ --- --- ✔️ --- --- --- ---
RisQFlan --- --- --- --- --- --- --- ✔️ --- --- --- ---
Pleak --- --- --- --- --- --- --- ✔️ --- --- --- ✔️
Verefoo --- --- --- --- --- --- --- ✔️ --- --- --- ---
CORAS --- --- --- --- --- --- --- ✔️ --- --- --- ---
PVS --- --- ✔️ --- --- --- --- ✔️ --- --- --- ---
BowTiePlus --- --- --- --- --- --- --- ✔️ --- --- --- ---
HoneyGen --- --- --- --- --- --- --- ✔️ --- --- --- ---
VTPin --- --- --- --- --- --- --- ✔️ --- --- --- ---
Modssl-hmac --- --- --- --- --- --- --- ✔️ --- --- --- ---
Lethe --- --- --- --- --- --- --- ✔️ --- --- --- ---
SEMCO --- --- --- --- --- --- --- ✔️ --- --- --- ---