Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nina Moebius is active.

Publication


Featured researches published by Nina Moebius.


availability, reliability and security | 2009

SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications

Nina Moebius; Kurt Stenzel; Holger Grandy; Wolfgang Reif

In this paper we introduce our model-driven software engineering method, called SecureMDD, which facilitates the development of security-critical applications that are based on cryptographic protocols. The approach seamlessly integrates the generation of code and formal methods. Starting with a platform-independent UML model of a system under development, we generate executable Java (Card) code as well as a formal model from the UML model. Subsequent to this, the formal model is used to verify the security of the modeled system. Our goal is to prove that the generated code is correct w.r.t. the generated formal model in terms of formal refinement. The approach is tailored to the domain of security-critical systems, e.g. smart card applications.


Rigorous Methods for Software Construction and Analysis | 2009

A systematic verification approach for mondex electronic purses using ASMs

Gerhard Schellhorn; Holger Grandy; Dominik Haneberg; Nina Moebius; Wolfgang Reif

In previous work we solved the challenge to mechanically verify the Mondex challenge about the specification and refinement of an electronic purse, using the given data refinement framework. In this paper we show that using ASM refinement and generalized forward simulations instead of the original approach allows to find a more systematic proof. Our technique of past and future invariants and simulations avoids the need to define a lot of properties for intermediate states during protocol runs. The new proof can be better automated in KIV. The systematic development of a generalized forward simulation uncovered a weakness of the protocol that could be exploited in a denial of service attack. We show a modification of the protocol that avoids this weakness, and that is even slightly easier to verify.


Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems | 2009

Generating formal specifications for security-critical applications - A model-driven approach

Nina Moebius; Kurt Stenzel; Wolfgang Reif

The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under development. This model-driven approach is focused on security-critical applications that are based on cryptographic protocols, esp. Java Card applications. In this paper we describe the generation of the formal specification from the UML model which is then used as input for our interactive verification system KIV. The formal specification is based on abstract state machines and algebraic specifications. It allows to formulate and to prove application-specific security properties.


annual software engineering workshop | 2012

Model-Driven Development of Secure Service Applications

Marian Borek; Nina Moebius; Kurt Stenzel; Wolfgang Reif

The development of a secure service application is a difficult task and designed protocols are very error-prone. To develop a secure SOA application, application-independent protocols (e.g. TLS or Web service security protocols) are used. These protocols guarantee standard security properties like integrity or confidentiality but the critical properties are applicationspecific (e.g. “a ticket can not be used twice”). For that, security has to be integrated in the whole development process and application-specific security properties have to be guaranteed. This paper illustrates the modeling of a security-critical service application with UML. The modeling is part of an integrated software engineering approach that encompasses model-driven development. Using the approach, an application based on service-oriented architectures (SOA) is modeled with UML. From this model executable code as well as a formal specification to prove the security of the application is generated automatically. Our approach, called SecureMDD, supports the development of security-critical applications and integrates formal methods to guarantee the security of the system. The modeling guidelines are demonstrated with an online banking example.


australian software engineering conference | 2009

Model-Driven Code Generation for Secure Smart Card Applications

Nina Moebius; Kurt Stenzel; Holger Grandy; Wolfgang Reif

SecureMDD is a model-driven approach to develop secure systems with a special focus on smart card applications. Based on a platform-independent UML model of the system under development we generate a platform-specific model, and finally executable code. The Secure MDD approach also allows to generate a formal specification where security properties can be proven formally. In this paper we describe the automatic generation of Java Card code from UML class and activity diagrams in detail. The full coderunning on the smart card is generated which is not trivial because of the limitations of smart cards and the specialties of Java Card.


international conference on software engineering advances | 2007

A Modeling Framework for the Development of Provably Secure E-Commerce Applications

Nina Moebius; Dominik Haneberg; Wolfgang Reif; Gerhard Schellhorn

Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology for developing security-critical e-commerce applications. We present an approach to model these applications with the Unified Modeling Language (UML) [1] extended by a UML profile to tailor our models to security applications. Our intent is to (semi-) automatically generate a formal specification suitable for verification as well as an implementation from the model. Therefore we offer a development method seamlessly integrating semi-formal and formal methods as well as the implementation. This is a significant advantage compared to other approaches not dealing with all aspects from abstract models down to code. Based on this approach we can prove security properties on the abstract protocol level as well as the correctness of the protocol implementation in Java with respect to the formal model using the refinement approach. In this paper we concentrate on the modeling with UML and some details regarding the transformation of this model into the formal specification. We illustrate our approach on an electronic payment system called Mondex [10]. Mondex has become famous for being the target of the first ITSEC evaluation of the highest level E6 which requires formal specification and verification.


international conference on software engineering | 2013

Model Checking of Security-Critical Applications in a Model-Driven Approach

Marian Borek; Nina Moebius; Kurt Stenzel; Wolfgang Reif

This paper illustrates the integration of model checking in SecureMDD, a model-driven approach for the development of security-critical applications. In addition to a formal model for interactive verification as well as executable code, a formal system specification for model checking is generated automatically from a UML model. Model checking is used to find attacks automatically and interactive verification is used by an expert to guarantee security properties. We use AVANTSSAR for model checking and KIV for interactive verification. The integration of AVANTSSAR in SecureMDD and the advantages and disadvantages over interactive verification with KIV are demonstrated with a smart card based electronic ticketing example.


Proceedings of the Workshop on Model-Driven Security | 2012

Incremental development of large, secure smart card applications

Nina Moebius; Kurt Stenzel; Marian Borek; Wolfgang Reif

SecureMDD is a model-driven approach to develop security-critical applications. The focus lies on the development of smart card and service applications. Those are inherently security-critical and are based on cryptographic protocols. These protocols are difficult to design and error-prone. To guarantee the security of an application, formal verification is an inherent part of our software engineering approach. In this paper we illustrate that the SecureMDD approach is applicable for the development of large and complex applications as well. To handle the size and complexity, an incremental development method is suggested. This is illustrated with the German electronic health card application as case study.


Software and Systems Modeling | 2015

Formal verification of QVT transformations for code generation

Kurt Stenzel; Nina Moebius; Wolfgang Reif

We present a formal calculus for operational QVT. The calculus is implemented in the interactive theorem prover KIV and allows to prove properties of QVT transformations for arbitrary meta models. Additionally, we present a framework for provably correct Java code generation. The framework uses a meta model for a Java abstract syntax tree as the target of QVT transformations. This meta model is mapped to a formal Java semantics in KIV. This makes it possible to formally prove (interactively) with the QVT calculus that a transformation always generates a Java model (i.e. a program) that is type correct and has certain semantical properties. The Java model can be used to generate source code by a model-to-text transformation or byte code directly.


2013 3rd International Workshop on Model-Driven Requirements Engineering (MoDRE) | 2013

Security requirements formalized with OCL in a model-driven approach

Marian Borek; Nina Moebius; Kurt Stenzel; Wolfgang Reif

Security requirements are properties that have to be guaranteed for an application. Such guarantees can be given using verification. But there is a huge gap between security requirements expressed with human language and formal security properties that can be verified. This paper presents the use of OCL to formalize security requirements in a model-driven approach for security-critical applications. SecureMDD is such a model-driven approach. It uses UML to model the application and OCL to specify the security requirements. From the application model and the contained OCL constraints, a formal specification of the application including the security properties is generated automatically. This specification is used to verify application-specific security properties that matches a lot of security requirements much better than application-independent security properties like secrecy, integrity and confidentiality. We demonstrate how to concretize security requirements as well as the use of OCL constraints to specify security requirements, the transformation from OCL constraints into algebraic specifications and the use of those specifications to verify the security requirements using an electronic ticketing system as a case study.

Collaboration


Dive into the Nina Moebius's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peer Stechert

Folkwang University of the Arts

View shared research outputs
Top Co-Authors

Avatar

Peter Fischer

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge