(Ansarinia et al., 2012; Salahi and Ansarinia, 2013),
but the existing ontologies formulate only the domain
of the CWE weakness only. It still requires domain
knowledge to understand the target system. Another
approach is the use of program analysis, e.g., Sun
et al. (2014) and Son et al. (2015), but not all entries
contain code examples or resources to perform pro-
gram analysis. Most existing techniques did not take
the domain knowledge of the target into account.
For the proposals for domain-specific models on
security purposes, there are some works that at-
tempted to use DSMLs to capture the security charac-
teristics, e.g., security concerns (Silva Gallino et al.,
2012), security objectives (Saleem et al., 2012), or at-
tack surfaces (Sun et al., 2020). To the best of our
knowledge, none of work has attempted to model the
domain-specific knowledge of the two domains.
8 CONCLUSIONS
This paper proposes two DSMLs for profiling
domain-specific knowledge of the SSI system’s and
the CWE weaknesses. We also propose a method
for detecting common software weaknesses in a tar-
geting implementation of the SSI system. The pro-
posed method compares two system models utilizing
the knowledge graph. We implement a command-line
interface tool to semi-automatically process the pro-
posed method and conduct an experiment for evaluat-
ing its performance. The proposed method achieves a
certain performance that is acceptable.
However, the proposed method obscures some
of the knowledge graph’s inadequacies and seman-
tic continuity. We believe that the domain knowledge
examined and applied in this study might facilitate fu-
ture research aimed at eliminating those issues.
REFERENCES
Allen, C. (2016). The path to self-sovereign iden-
tity. http://www.lifewithalacrity.com/2016/04/
the-path-to-self-soverereign-identity.html.
Ansarinia, M., Asghari, S. A., Souzani, A., and Ghaznavi,
A. (2012). Ontology-based modeling of ddos attacks
for attack plan detection. In IST 2012, pages 993–998.
Ferdous, M. S., Chowdhury, F., and Alassafi, M. O.
(2019). In search of self-sovereign identity leverag-
ing blockchain technology. IEEE Access, 7:103059–
103079.
Haddouti, S. E. and Ech-Cherif El Kettani, M. D.
(2019). Analysis of identity management systems us-
ing blockchain technology. In CommNet 2019, pages
1–7.
Ji, S., Pan, S., Cambria, E., Marttinen, P., and Yu, P. S.
(2021). A survey on knowledge graphs: Representa-
tion, acquisition, and applications. IEEE Transactions
on Neural Networks and Learning Systems, pages 1–
21.
Liu, Y., He, D., Obaidat, M. S., Kumar, N., Khan, M. K.,
and Raymond Choo, K. K. (2020). Blockchain-based
identity management systems: A review. Journal
of Network and Computer Applications, 166(Febru-
ary):102731.
MITRE (2006). Common Weakness Enumeration (CWE).
https://cwe.mitre.org/.
M
¨
uhle, A., Gr
¨
uner, A., Gayvoronskaya, T., and Meinel, C.
(2018). A survey on essential components of a self-
sovereign identity. Computer Science Review, 30:80–
86.
Naik, N. and Jenkins, P. (2020). Governing principles of
self-sovereign identity applied to blockchain enabled
privacy preserving identity management systems. In
ISSE 2020, pages 1–6.
Object Management Group (2017). Unified Modeling Lan-
guage: Specification. Version 2.5.1. formal/17-12-05.
Panait, A.-E., Olimid, R. F., and Stefanescu, A. (2020).
Analysis of uport open, an identity management
blockchain-based solution. In TrustBus 2020, pages
3–13. Springer International Publishing.
Salahi, A. and Ansarinia, M. (2013). Predicting network
attacks using ontology-driven inference. http://arxiv.
org/abs/1304.0913.
Saleem, M. Q., Jaafar, J. B., and Hassan, M. F. (2012). A
domain-specific language for modelling security ob-
jectives in a business process models of SOA applica-
tions. Advances in Information Sciences and Service
Sciences, 4(1):353–362.
Silva Gallino, J. P., De Miguel, M., Briones, J. F., and
Alonso, A. (2012). Domain-specific multi-modeling
of security concerns in service-oriented architectures.
Lecture Notes in Computer Science, 7176:128–142.
Son, Y., Lee, Y., and Oh, S. (2015). A Software Weakness
Analysis Technique for Secure Software. Advanced
Science and Technology Letters, 93:5–8.
Sporny, M., Longley, D., and Chadwick, D. (2019). Verifi-
able credential data model v1.0. https://www.w3.org/
TR/vc-data-model/.
Sun, F., Xu, L., and Su, Z. (2014). Detecting logic vulner-
abilities in e-commerce applications. In DNSS 2014,
pages 23–26.
Sun, T., Drouot, B., Golra, F., Champeau, J., and Guerin,
S. (2020). A Domain-specific Modeling Framework
for Attack Surface Modeling. In ICISSP 2020, pages
341–348.
Tobin, A. and Reed, D. (2017). The in-
evitable rise of self-sovereign identity: A
white paper from the sovrin foundation.
https://sovrin.org/wp-content/uploads/2017/06/
The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf.
Wang, F. and De Filippi, P. (2020). Self-sovereign identity
in a globalized world: Credentials-based identity sys-
tems as a driver for economic inclusion. Frontiers in
Blockchain, 2(January):1–22.
MODELSWARD 2022 - 10th International Conference on Model-Driven Engineering and Software Development
226