contribute three building blocks. First, we extend the
UML-based Security Modeling Profile with language
constructs enabling the specification of security pro-
tocol templates. Second, we introduce an approach to
refer to such a security protocol template in scenario-
based requirements specification based on the UML-
based scenario formalism MSD. Third, we extend the
simulative validation technique play-out to support
the security protocol templates.
Our approach enables requirements engineers to
adapt existing security protocols to their context and,
thus, integrate them systematically into their applica-
tion to increase security. In addition, the integration
makes the protocols accessible to people with little
security knowledge. Finally, the simulative valida-
tion enables requirements engineers to check whether
introducing security protocols has violated other re-
quirements.
Future work encompasses three aspects. First, we
plan to conduct a user study to evaluate whether our
modeling language is intuitive and easy to use for se-
curity engineers and requirements engineers. Second,
we want to collect typical security protocol templates
in a library. Requirements engineers could search
this library and select the protocol that best suits their
needs. Third, we want to improve the security model-
ing abilities of our methodology. Therefore, we want
to introduce the concept of misuse cases and make
them analyzable by means of the play-out algorithm.
ACKNOWLEDGEMENTS
This research has been partly sponsored by the project
"AppSecure.nrw - Security-by-Design of Java-based
Applications" funded by the European Regional De-
velopment Fund (ERDF-0801379).
REFERENCES
Abrahão, S., Gravino, C., Insfran, E., Scanniello, G., and
Tortora, G. (2013). Assessing the effectiveness of se-
quence diagrams in the comprehension of functional
requirements: Results from a family of five experi-
ments. IEEE Transactions on Software Engineering,
39(3):327–342.
Blanchet, B. (11-13 June 2001). An efficient crypto-
graphic protocol verifier based on prolog rules. In
Proceedings. 14th IEEE Computer Security Founda-
tions Workshop, 2001, pages 82–96. IEEE.
Bucchiarone, A., Cabot, J., Paige, R. F., and Pierantonio, A.
(2020). Grand challenges in model-driven engineer-
ing: an analysis of the state of the research. Software
and Systems Modeling, 19(1):5–13.
Clark, J. and Jacob, J. (2002). Security protocols open
repository.
Dziwok, S., Koch, T., Merschjohann, S., Budweg, B., and
Leuer, S. (2021). AppSecure.nrw Software Security
Study. https://arxiv.org/abs/2108.11752.
Harel, D. (2001). From play-in scenarios to code: an
achievable dream. Computer, 34(5):53–60.
Harel, D. and Marelly, R. (2003). Come, Let’s Play:
Scenario-Based Programming Using LSCs and the
Play-Engine. Springer.
Hassine, J., Rilling, J., and Dssouli, R. (2010). An evalu-
ation of timed scenario notations. Journal of Systems
and Software, 83(2):326–350.
Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Bren-
ner, C., Bernijazov, R., and Sander, M. (2016).
The MechatronicUML Requirements Engineering
Method: Process and Language. Technical Report tr-
ri-16-351, Software Engineering Department, Fraun-
hofer IEM / Software Engineering Group, Heinz Nix-
dorf Institute.
Jürjens, J. (2002). UMLsec: Extending UML for Secure
Systems Development. In Jézéquel, J.-M., editor, The
unified modeling language, volume 2460 of Lecture
Notes in Computer Science, pages 412–425. Springer,
Berlin [u.a.].
Kitchenham, B., Pickard, L. M., and Pfleeger, S. L. (1995).
Case studies for method and tool evaluation. IEEE
Software, 12(4):52–62.
Koch, T., Dziwok, S., Holtmann, J., and Bodden, E.
(2020). Scenario-Based Specification of Security Pro-
tocols and Transformation to Security Model Check-
ers. In Proceedings of the 23rd ACM/IEEE Interna-
tional Conference on Model Driven Engineering Lan-
guages and Systems, MODELS ’20, page 343–353,
New York, NY, USA. Association for Computing Ma-
chinery.
Lodderstedt, T., Basin, D., and Doser, J. (2002). Se-
cureUML: A UML-Based Modeling Language for
Model-Driven Security. In Jézéquel, J.-M., Huss-
mann, H., and Cook, S., editors, ≪UML≫ 2002
— The Unified Modeling Language, pages 426–441,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Lowe, G. (1996). Breaking and fixing the needham-
schroeder public-key protocol using fdr. In Goos, G.,
Hartmanis, J., Leeuwen, J., Margaria, T., and Steffen,
B., editors, Tools and Algorithms for the Construc-
tion and Analysis of Systems, volume 1055 of Lecture
Notes in Computer Science, pages 147–166. Springer
Berlin Heidelberg, Berlin, Heidelberg.
Miller, C. and Valasek, C. (2015). Remote exploitation of
an unaltered passenger vehicle. Black Hat USA.
Mouheb, D., Talhi, C., Lima, V., Debbabi, M., Wang, L.,
and Pourzandi, M. (2009). Weaving Security Aspects
into UML 2.0 Design Models. In Proceedings of the
13th Workshop on Aspect-Oriented Modeling, AOM
’09, page 7–12, New York, NY, USA. Association for
Computing Machinery.
Object Management Group (OMG) (2017). OMG Unified
Modeling Language (OMG UML) – Version 2.5.1.
OMG Document Number: formal/2017-12-05.
MODELSWARD 2022 - 10th International Conference on Model-Driven Engineering and Software Development
24