Cloud Software Security Engineering

Cloud Software Security Engineering

I have become very interested in software security engineering techniques and tools. This includes model-driven approaches to generating security solutions from high-level definitions, domain-specific languages to augment requirements and design notations to capture security properties and their cross-cutting impacts, and platform-level security including autonomic virtual machine monitoring and protection.

More details can be found off Mohamed Almorsy's home page here.

Models@Runtime-style Adaptive Software Security Support:

  • Almorsy, M., Grundy, J.C., Ibrahim, A., Adaptable, Model-driven Security Engineering for SaaS Cloud-based Applications, Automated Software Engineering, Springer.

  • -- Final publication available at http://link.springer.com DOI Author pre-published version PDF

Cloud Security Landscape Analysis:

  • Ibrahim, A., Hamlyn-Harris, J. and Grundy, J.C., Emerging Security Challenges of Cloud Virtual Infrastructure, In Proceedings of the 2010 Asia Pacific Cloud Workshop 2010 (co-located with APSEC2010), Sydney, Nov 30 2010. PDF

  • Almorsy, M., Grundy, J.C., and Mueller, I., An analysis of the cloud computing security problem, In Proceedings of the 2010 Asia Pacific Cloud Workshop 2010 (co-located with APSEC2010), Sydney, Nov 30 2010. PDF

Vulnerability analysis:

  • Almorsy, M., Grundy, J.C. and Ibrahim, A., Automated Software Architecture Security Risk Analysis Using Formalized Signatures, 2013 IEEE/ACM International Conference on Software Engineering (ICSE 2013), San Franciso, May 2013, IEEE CS Press PDF

  • Almorsy, M., Grundy, J.C. and Ibrahim, A. Supporting Automated Vulnerability Analysis using Formalized Vulnerability Signatures, 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), Sept 3-7 2012, Essen, Germany, ACM Press PDF

Multi-tenancy security support:

  • Almorsy, M., Grundy, J.C., Ibrahim, A., SMURF: Supporting Multi-tenancy Using Re-Aspects Framework, 17th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2012), Paris, France, July 2012, IEEE CS Press. PDF

  • He, Q., Han, J., Yang, Y., Grundy, J.C., Jin, H., QoS-Driven Service Selection for Multi-Tenant SaaS, 5th IEEE Conference on Cloud Computing (Cloud 2012), IEEE CS Press, Waikiki, Hawai, USA, June 24-29 2012. PDF

  • Almorsy, M. and Grundy, J.C. TOSSMA: A Tenant-Oriented SaaS Security Management Architecture, 5th IEEE Conference on Cloud Computing (CLOUD 2012), IEEE CS Press, Waikiki, Hawai, USA, June 24-29 2012. PDF

  • Almorsy, M., Grundy, J.C. and Imbrahim, A. Collaboration-Based Cloud Computing Security Management Framework, In Proceedings of 2011 IEEE International Conference on Cloud Computing (CLOUD 2011), Washington DC, USA on 4 July – 9 July, 2011, IEEE. DOI PDF

IaaS Virtual Machine Monitoring and Protection:

  • Ibrahim, A., Hamlyn-Harris, J., Grundy, J.C. and Almorsy, M., DIGGER: Identifying OS Kernel Objects for Run-time Security Analysis, International Journal on Internet and Distributed Computing Systems, vol 3, no. 1, January 2013, pp 184-194 PDF

  • Ibrahim, A., Hamlyn-Harris, J., Grundy, J.C. and Almorsy, M., Supporting Operating System Kernel Data Disambiguation using Points-to Analysis, 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), Sept 3-7 2012, Essen, Germany, ACM Press. PDF

  • Imbrahim, A., Hamlyn-Harris J., Grundy, J.C. and Almorsy, M., CloudSec: A Security Monitoring Appliance for Virtual Machines in the IaaS Cloud Model, In Proceedings of the 5th International Conference on Network and System Security (NCC 2011), Milan, Italy, September 5-7 2011, IEEE Press. DOI PDF