Modeling Authentication in Mal Sequence Diagram

April 26, 2020    Comment off


Proceedings of The 2nd International Conference on Future of Social Sciences

Year: 2019

DOI:

Fulltex PDF

 

Modeling Authentication in Mal Sequence Diagram

Madiha Arooja,1,∗, Muhammad Yousafb, Rizwan Bin Faizd, Samir Obaid1,1,∗

 

ABSTRACT: 

Software Requirement Specification involves both functional and Non Functional Requirements (NFRs), defines system attributes and serves as a constraint on software design. While designing software, NFR in general and security requirements in specific are neglected or poorly designed since they are not treated as an important part of designing. As a consequence of which our software is vulnerable to security threats. Modeling software threats in early stages of software engineering i.e. design can help developers to identify security threats and design their corresponding mitigation. We therefore in this paper model authentication threats e.g. skimming and replay attack in mal sequence diagram. In order to do so an extended meta-model of sequence diagram designed based upon which profile mal sequence diagram is designed. Both skimming and replay attack and their corresponding mitigation is successfully modeled upon ATM various usage scenarios of ATM case study.

Keywords: NFR modeling, security,sequence diagram, UML profiling, object constraint language

mad1

Madiha Arooj

Faculty of Computing,Riphah International University,Islamabad, Pakistan

Template 1

Muhammad Yousaf

Faculty of Computing,Riphah International University,Islamabad, Pakistan

Template 1

Rizwan Bin Faiz

Department of Software Engineering Capital University of Science and Technology, Islamabad, Pakistan

Template 1

Samir Obaid

Faculty of Computing,Riphah International University,Islamabad, Pakistan