The analysis of binary file security using a hierarchical quality model

dc.contributor.advisorChairperson, Graduate Committee: Clemente Izurietaen
dc.contributor.authorJohnson, Andrew Lucasen
dc.date.accessioned2022-06-10T18:58:48Z
dc.date.available2022-06-10T18:58:48Z
dc.date.issued2022en
dc.description.abstractSoftware security is commanding significant attention from practitioners. In many organizations, security assessment has been integrated into the software development lifecycle, which allows for continuous monitoring of software weaknesses and vulnerabilities throughout the development process. One often overlooked aspect of the software development lifecycle is the end of the lifecycle. Prior to delivering software to customers, many vendors digitally sign and compile source code into a binary. In binary form, analysis may be done to reveal security flaws that were not present in the original code or that were injected at some point between the code being written and the code being compiled. Our research goal is to improve our ability to assess the security quality of a binary from different stakeholders' perspectives. While many analysis tools exist that identify security flaws, there is little work done to enable the use of multiple tools, which is necessary to identify different types of security flaws. To accomplish our goal, we approach the problem from the perspective of quality modeling. We have designed and developed a software quality model for assessing security quality in binaries (PIQUE-Bin) and operationalized the model by using PIQUE, the Platform for Investigative software Quality Understanding and Evaluation. The design of our model is based on the Microsoft STRIDE model and the software development view of the Common Weakness Enumeration (CWE). The model produces a relative and subjective security score for a binary file. An informal literature review reveals a lack of model-based security metrics targeting binary files, which helped motivate this research. To enhance the validity of this work, a sensitivity analysis assessment based on a benchmark repository of 700 binary files was performed. Model output is validated by measuring tool output sensitivity and calibrated against the presence of injected vulnerabilities. We find that our model is able to measure the security quality of binaries relative to the benchmark repository.en
dc.identifier.urihttps://scholarworks.montana.edu/handle/1/16635en
dc.language.isoenen
dc.publisherMontana State University - Bozeman, College of Engineeringen
dc.rights.holderCopyright 2022 by Andrew Lucas Johnsonen
dc.subject.lcshComputer software--Developmenten
dc.subject.lcshComputer securityen
dc.subject.lcshErrorsen
dc.subject.lcshQuality of productsen
dc.subject.lcshEvaluationen
dc.titleThe analysis of binary file security using a hierarchical quality modelen
dc.typeThesisen
mus.data.thumbpage26en
thesis.degree.committeemembersMembers, Graduate Committee: Mike Wittie; Travis Petersen
thesis.degree.departmentComputing.en
thesis.degree.genreThesisen
thesis.degree.nameMSen
thesis.format.extentfirstpage1en
thesis.format.extentlastpage112en

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
johnson-the-analysis-2021.pdf
Size:
1.61 MB
Format:
Adobe Portable Document Format
Description:
The analysis of binary file security using a hierarchical quality model (PDF)

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
826 B
Format:
Plain Text
Description:
Copyright (c) 2002-2022, LYRASIS. All rights reserved.