{"id":1008,"date":"2021-07-21T13:14:31","date_gmt":"2021-07-21T17:14:31","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?page_id=1008"},"modified":"2026-01-26T10:41:48","modified_gmt":"2026-01-26T15:41:48","slug":"tools","status":"publish","type":"page","link":"https:\/\/carleton.ca\/cybersea\/tools\/","title":{"rendered":"Software Tools"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Software Tools\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>The CyberSEA has developed a variety of software tools.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/carleton.ca\/cybersea\/compass\/\">Compass<\/a>: A one-stop-shop toolkit to support system architects, developers, evaluators, and researchers to design secure software systems. Compass is designed based on a service-oriented architecture to house heterogeneous secure system design tools.\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/carleton.ca\/cybersea\/merak\/\">Merak<\/a>:\u00a0A web-based threat analysis tool that estimates a software system\u2019s asset threat landscape by leveraging external security data sources such as National Vulnerability Database, MITRE\u2019s ATT&amp;CK, and the Canadian Centre for Cyber Security Alerts and Advisories.<\/li>\n\n\n\n<li><a href=\"https:\/\/carleton.ca\/cybersea\/polaris\/\">Polaris<\/a>: A web-based system modelling and analysis tool to design, analyze, and manage the structural security posture of a software system.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/carleton.ca\/cybersea\/security-metrics-soundness-evaluation-tool\/\">Security Metrics Soundness Evaluation Tool<\/a>: A spreadsheet tool designed as a series of Yes\/No questions to evaluate the definition, sufficiency, progression, and reproducibility properties of a security metric under consideration. Based on the responses, the tool provides a conclusion on the soundness of a security metric.<\/li>\n\n\n\n<li><a id=\"user-content-implicit-interactions-analysis-tool\" class=\"anchor\" href=\"#implicit-interactions-analysis-tool\" aria-hidden=\"true\"><a href=\"https:\/\/carleton.ca\/cybersea\/implicit-interactions-analysis-tool\/\">Implicit Interactions Analysis Tool<\/a>: Automates the methods and approaches for identifying and analyzing the existence of implicit interactions in system designs and specifications. The tool supports system designers and integrators in identifying and analyzing implicit interactions in critical systems that have been specified using the Communicating Concurrent Kleene Algebra (C<sup>2<\/sup>KA) modelling framework. It identifies the set of implicit interactions given the C<sup>2<\/sup>KA specification of a system and the specification of the set of intended interactions. It also computes the severity, exploitability, and the set of attack scenarios for the identified set of implicit interactions.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The CyberSEA has developed a variety of software tools.<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[],"class_list":["post-1008","page","type-page","status-publish","hentry"],"acf":{"cu_post_thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1008"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1008\/revisions"}],"predecessor-version":[{"id":1189,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1008\/revisions\/1189"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1008"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_page_type?post=1008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}