Evolution of a Secure Voice Communication System

Examensarbete för masterexamen

Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.12380/232339
Download file(s):
There are no files associated with this item.
Type: Examensarbete för masterexamen
Master Thesis
Title: Evolution of a Secure Voice Communication System
Authors: Sundin, Gustav
Abstract: In order to maintain a system’s security properties during evolution, it is important to follow a principled way of evolution. Doing so will decrease both the time needed to be spent on evolution as well as the number of security risks and other errors that might arise during the process. One such principled way of evolution is to use change patterns. A change pattern always covers the evolution of two closely intertwined artifacts on different levels of abstraction (such as requirements and software architecture), and gives a principled way of evolving one of the artifacts based on the changes made to the other. In this master’s thesis, a VoIP system known as Cryptify Call is evolved with the purpose of identifying at least one such change pattern. The goal of the thesis is more specifically to find a general solution on how to evolve a system from secure one-to-one into secure many-to-many communication, without violating any of the system’s security requirements along the way. Two alternative solutions to this problem are identified for the Cryptify Call system, which are then expressed as abstract and context-free change patterns. This ensures that the identified solutions are applicable not only to the Cryptify Call system or other VoIP applications, but to any type of system with a suitable software architecture. Both of the identified change patterns cover how the system’s software architecture has to evolve due to changes made to the system’s functional requirements. In order to identify these change patterns, the Cryptify Call system’s software architecture and security requirements had to be modeled using UML and SI* notation respectively, both before and after evolution. The most important roles in the software architecture for each of the solutions were then mapped to a template showing the architectural-level transformation necessary to apply that change pattern. While two alternative change patterns are given in the thesis, only one of them was actually implemented in the Cryptify Call system.
Keywords: Data- och informationsvetenskap;Computer and Information Science
Issue Date: 2016
Publisher: Chalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)
Chalmers University of Technology / Department of Computer Science and Engineering (Chalmers)
URI: https://hdl.handle.net/20.500.12380/232339
Collection:Examensarbeten för masterexamen // Master Theses

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.