KIT | KIT-Bibliothek | Impressum | Datenschutz

Elicitation and Classification of Security Requirements for EVerest

Marettek, Debora Maria

Abstract (englisch):

Incomplete and unverified requirements can lead to misunderstandings and misconceptions. Specifically in security, violated requirements can be indicators for potential vulnerabilities. To avoid vulnerabilities, security reuqirements are linked to their implementations. For further verification, security analyses can be used to check whether a software design fulfills its required properties. Therefore, specific attributes of requirements have to be identified and linked to the design. In this thesis, security requirements for the open-source software EVerest are elicited. EVerest provides a full stack environment for electric vehicle charging stations. For the elicitation, a two-step approach is used. First, a questionnaire is developed that elicits coarse-grained requirements of the security categories confidentiality, integrity, availability, and authentication. Afterwards, four EVerest software developers are interviewed to refine the coarse-grained requirements to 93 design-level security requirements. Prompt engineering and fine-tuning are used to classify design elements and extract their respective mentions from the retrieved requirements. ... mehr


Volltext §
DOI: 10.5445/IR/1000171735
Veröffentlicht am 17.06.2024
Cover der Publikation
Zugehörige Institution(en) am KIT Institut für Informationssicherheit und Verlässlichkeit (KASTEL)
Institut für Programmstrukturen und Datenorganisation (IPD)
Publikationstyp Hochschulschrift
Publikationsdatum 13.05.2024
Sprache Englisch
Identifikator KITopen-ID: 1000171735
Verlag Karlsruher Institut für Technologie (KIT)
Umfang 104 S.
Art der Arbeit Abschlussarbeit - Master
Prüfungsdaten 13.05.2024
Relationen in KITopen
Referent/Betreuer Corallo, Sophie
Hey, Tobias
Koziolek, Anne
KIT – Die Forschungsuniversität in der Helmholtz-Gemeinschaft
KITopen Landing Page