The analysis of binary file security using a hierarchical quality model
dc.contributor.advisor | Chairperson, Graduate Committee: Clemente Izurieta | en |
dc.contributor.author | Johnson, Andrew Lucas | en |
dc.date.accessioned | 2022-06-10T18:58:48Z | |
dc.date.available | 2022-06-10T18:58:48Z | |
dc.date.issued | 2022 | en |
dc.description.abstract | Software security is commanding significant attention from practitioners. In many organizations, security assessment has been integrated into the software development lifecycle, which allows for continuous monitoring of software weaknesses and vulnerabilities throughout the development process. One often overlooked aspect of the software development lifecycle is the end of the lifecycle. Prior to delivering software to customers, many vendors digitally sign and compile source code into a binary. In binary form, analysis may be done to reveal security flaws that were not present in the original code or that were injected at some point between the code being written and the code being compiled. Our research goal is to improve our ability to assess the security quality of a binary from different stakeholders' perspectives. While many analysis tools exist that identify security flaws, there is little work done to enable the use of multiple tools, which is necessary to identify different types of security flaws. To accomplish our goal, we approach the problem from the perspective of quality modeling. We have designed and developed a software quality model for assessing security quality in binaries (PIQUE-Bin) and operationalized the model by using PIQUE, the Platform for Investigative software Quality Understanding and Evaluation. The design of our model is based on the Microsoft STRIDE model and the software development view of the Common Weakness Enumeration (CWE). The model produces a relative and subjective security score for a binary file. An informal literature review reveals a lack of model-based security metrics targeting binary files, which helped motivate this research. To enhance the validity of this work, a sensitivity analysis assessment based on a benchmark repository of 700 binary files was performed. Model output is validated by measuring tool output sensitivity and calibrated against the presence of injected vulnerabilities. We find that our model is able to measure the security quality of binaries relative to the benchmark repository. | en |
dc.identifier.uri | https://scholarworks.montana.edu/handle/1/16635 | en |
dc.language.iso | en | en |
dc.publisher | Montana State University - Bozeman, College of Engineering | en |
dc.rights.holder | Copyright 2022 by Andrew Lucas Johnson | en |
dc.subject.lcsh | Computer software--Development | en |
dc.subject.lcsh | Computer security | en |
dc.subject.lcsh | Errors | en |
dc.subject.lcsh | Quality of products | en |
dc.subject.lcsh | Evaluation | en |
dc.title | The analysis of binary file security using a hierarchical quality model | en |
dc.type | Thesis | en |
mus.data.thumbpage | 26 | en |
thesis.degree.committeemembers | Members, Graduate Committee: Mike Wittie; Travis Peters | en |
thesis.degree.department | Computing. | en |
thesis.degree.genre | Thesis | en |
thesis.degree.name | MS | en |
thesis.format.extentfirstpage | 1 | en |
thesis.format.extentlastpage | 112 | en |
Files
Original bundle
1 - 1 of 1
- Name:
- johnson-the-analysis-2021.pdf
- Size:
- 1.61 MB
- Format:
- Adobe Portable Document Format
- Description:
- The analysis of binary file security using a hierarchical quality model (PDF)
License bundle
1 - 1 of 1