Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

AADL-based system vulnerability model design method

A vulnerability and model technology, applied in the field of embedded software security modeling, can solve problems such as increasing software modeling capabilities and not being able to describe access control relationships

Pending Publication Date: 2021-05-07
NORTHWESTERN POLYTECHNICAL UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The AADL architecture model describes the components of the system and the interaction between components, but AADL does not have the ability to describe the access control relationship between components in the software system. It is necessary to increase the modeling capability of software vulnerability to meet the needs of software architecture design.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • AADL-based system vulnerability model design method
  • AADL-based system vulnerability model design method
  • AADL-based system vulnerability model design method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Now in conjunction with embodiment, accompanying drawing, the present invention will be further described:

[0045] refer to Figure 1-7 , in combination with specific examples, the specific steps of the system vulnerability model design method based on AADL proposed by the present invention are as follows:

[0046] Step 1. Establish a system architecture model. Design the system architecture model according to the design requirements of the system, including component names, component features, component attributes and component connections.

[0047] Component names refer to the names of specific system components, process components, and thread components in the system architecture model;

[0048] Component characteristics means the characteristics in the component type declaration;

[0049] Component attributes refer to the attributes of specific system components, process components, and thread components in the system architecture model;

[0050] Component conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an AADL-based system vulnerability model design method, which establishes an access control strategy on the basis of a software architecture model, carries out system vulnerability modeling, and improves the modeling capability of the AADL. According to the method, in the form of AADL appendix extension, an AADL appendix sublanguage is provided to achieve vulnerability modeling. The method comprises the following steps: (1) establishing a system architecture model; (2) establishing a system vulnerability model, including designing an access control strategy and establishing a vulnerability model appendix library and vulnerability model appendix clauses; and (3) integrating the architecture model and the vulnerability model to obtain a system model containing the vulnerability model. According to the method, a system vulnerability model is established in the software design stage, an architecture model and access control are combined, the access control relation between software system components is described, a basis is provided for detecting vulnerability defects generated in the design stage, and optimization of the system design is facilitated.

Description

technical field [0001] The invention belongs to the field of embedded software safety modeling, and specifically proposes a system vulnerability model design method based on AADL. Background technique [0002] Vulnerability refers to any deficiency or defect in the system, which can be exploited by external objects to cause damage to the system. From the perspective of access control, the access control policy specifies the access authorization of the system, and the system state is described by a triplet composed of subject, object and access matrix, and the access matrix contains the security policy of the system. Vulnerabilities arise when the system performs operations that conflict with the security policies defined by the access control matrix. In a complex software system, the interaction between subsystems is complex, and the security requirements of different subsystems are different. Defects are easy to occur in the system design stage, which leads to software vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/20G06F8/10
CPCG06F8/20G06F8/10
Inventor 曹阳董云卫段添熠
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products