Modeling Authentication in Mal Sequence Diagram

April 26, 2020    0 comment


Proceedings of The 2nd International Conference on Future of Social Sciences

Year: 2019

DOI:

Fulltex PDF

 

Modeling Authentication in Mal Sequence Diagram

Madiha Arooja,1,∗, Muhammad Yousafb, Rizwan Bin Faizd, Samir Obaid1,1,∗

 

ABSTRACT: 

Software Requirement Specification involves both functional and Non Functional Requirements (NFRs), defines system attributes and serves as a constraint on software design. While designing software, NFR in general and security requirements in specific are neglected or poorly designed since they are not treated as an important part of designing. As a consequence of which our software is vulnerable to security threats. Modeling software threats in early stages of software engineering i.e. design can help developers to identify security threats and design their corresponding mitigation. We therefore in this paper model authentication threats e.g. skimming and replay attack in mal sequence diagram. In order to do so an extended meta-model of sequence diagram designed based upon which profile mal sequence diagram is designed. Both skimming and replay attack and their corresponding mitigation is successfully modeled upon ATM various usage scenarios of ATM case study.

Keywords: NFR modeling, security,sequence diagram, UML profiling, object constraint language

mad1

Madiha Arooj

Faculty of Computing,Riphah International University,Islamabad, Pakistan

Template 1

Muhammad Yousaf

Faculty of Computing,Riphah International University,Islamabad, Pakistan

Template 1

Rizwan Bin Faiz

Department of Software Engineering Capital University of Science and Technology, Islamabad, Pakistan

Template 1

Samir Obaid

Faculty of Computing,Riphah International University,Islamabad, Pakistan

Leave a reply

Sign up in the newsletter form below to receive the latest news and updates about this Conference

About Cookies on This Site

We use cookies to give you the best experience on our website. By continuing to browse our website, you agree to our cookie policy