skip to main content
10.1145/3555776.3577816acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Deriving metrics for software architectures from the "protected entry points" security patterns

Published:07 June 2023Publication History

ABSTRACT

Deciding, as early as the software architecture is designed, whether the resulting system will be secure is challenging. We propose three metrics inspired by a security-related design pattern in the structural architecture model, the "protected entry points" pattern. We evaluate these metrics on the real-life Bitwarden web client and server, as well as a synthetic system.

References

  1. Bandar Alshammari, Colin Fidge, and Diane Corney. 2010. Security Metrics for Object-Oriented Designs. In 2010 21st Australian Software Engineering Conference. 55--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Xiaoning Du, Bihuan Chen, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, and Yu Jiang. 2019. Leopard: identifying vulnerable code for vulnerability assessment through program metrics. In Proceedings of the 41st International Conference on Software Engineering (ICSE '19). 60--71. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Eduardo Fernandez-Buglioni. 2013. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. Wiley.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Girvan and M. E. J. Newman. 2002. Community structure in social and biological networks. Proceedings of the National Academy of Sciences 99, 12 (June 2002), 7821--7826. Google ScholarGoogle ScholarCross RefCross Ref
  5. Pratyusa K. Manadhata and Jeannette M. Wing. 2011. An Attack Surface Metric. IEEE Transactions on Software Engineering 37, 3 (May 2011), 371--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Michael Waidner, Michael Backes, and Jörn Müller-Quade. 2014. Development of Secure Software with Security By Design. Technical Report SIT-TR-2014-03. Fraunhofer Institute for Secure Information Technology.Google ScholarGoogle Scholar
  7. Koen Yskout, Riccardo Scandariato, and Wouter Joosen. 2015. Do security patterns really help designers?. In Proceedings of the 37th International Conference on Software Engineering - Volume 1 (ICSE '15). 292--302. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Deriving metrics for software architectures from the "protected entry points" security patterns

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing
          March 2023
          1932 pages
          ISBN:9781450395175
          DOI:10.1145/3555776

          Copyright © 2023 Owner/Author(s)

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 June 2023

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%
        • Article Metrics

          • Downloads (Last 12 months)28
          • Downloads (Last 6 weeks)3

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader