Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers
Sven Peldszus, Frederik Reiche, Kevin Hermann, Sophie Corallo, Thorsten Berger + 1 more
TLDR
This paper maps security design DSLs to code analyzers to bridge the abstraction gap between design and implementation security.
Key contributions
- Conducted a study of 66 security DSLs and 559 security checks from 36 code analyzers.
- Introduced the SecLan model, validated by 22 experts, to capture common security concepts.
- Found few commonalities between design-level and implementation-level security checks.
- Revealed that security experts struggle to map design DSLs to code analyzer weaknesses.
Why it matters
This research provides an empirical foundation for understanding the significant abstraction gap between security design and implementation. By highlighting the lack of commonalities and the complexity involved, it helps practitioners and researchers better address this critical challenge. It's a crucial first step towards bridging this disconnect.
Original Abstract
When assessing the potential impact of code-level vulnerabilities, e.g., discovered by automated analyzers, it is essential to consider them in the context of the system's security design. However, this is a challenging task due to the abstraction gap between security design, often specified using security DSLs, and implementation. As we will show, even security experts lack a complete understanding of this relationship. Intrigued by this gap (and the general disconnect between secure design and secure implementation) we present a study of 66 design-level security DSLs and 559 security checks from 36 code-level analyzers. We identify what concepts are common to both and capture them in the SecLan model, which has been validated by 22 security experts. Based on this, we investigate the relationship between DSLs and analyzers quantitatively and explore it qualitatively together with 9 security experts. We learn that there are few commonalities between design-level and implementation-level security; security checks are often described by overly general weaknesses, resulting in many non-obvious potential relationships between security DSLs and analyzers; and even security experts are overwhelmed by this complexity. We provide an empirical basis that helps practitioners and researchers better understand the gap and serves as a first step toward bridging it.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.