{"id":1843,"date":"2024-10-28T16:07:20","date_gmt":"2024-10-28T20:07:20","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?page_id=1843"},"modified":"2026-01-26T10:42:04","modified_gmt":"2026-01-26T15:42:04","slug":"dubhe","status":"publish","type":"page","link":"https:\/\/carleton.ca\/cybersea\/dubhe\/","title":{"rendered":"Dubhe: Behavioural Security Posture Analysis Tool"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Dubhe: Behavioural Security Posture Analysis Tool\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<h2 id=\"dubhe-behavioural-security-posture-analysis-tool\" class=\"wp-block-heading\">Dubhe: Behavioural Security Posture Analysis Tool<\/h2>\n\n\n\n<p><em>Dubhe<\/em> is an automated tool that can determine a system&#8217;s behavioural security posture by analyzing UML activity diagrams. Requiring a single XMI file for analysis, Dubhe offloads as much responsibility from designers to perform system security analysis.<\/p>\n\n\n\n<p>Dubhe works by calculating two security metrics: Critical Element Risk Index (CERI) and Corruption Propagation Potential (CPP). These metrics are used to inform a system\u2019s behavioural security posture, which is a representation of a system\u2019s hardness against element-based and flow-based threats targeting a system\u2019s behavioural representation. As part of determining these metrics, Dubhe will analyze and identify threatening element patterns within UML activity diagrams and report any unmitigated threats back to the designer. CERI can be used to prioritize the hardening of system elements that are detected to be participating in the most unmitigated threat patterns, while CPP can be used to prioritize the placement of mitigations against data corruption attacks. This information is summarized by Dubhe and presented to the designer as a savable report that they can use to make modifications to their behavioural system designs.<\/p>\n\n\n\n<h3 id=\"related-publications\" class=\"wp-block-heading\">Related Publications<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>John Breton, Jason Jaskolka, and George O.M. Yee. <a href=\"https:\/\/doi.org\/10.1007\/978-3-031-57537-2_24\">Hardening systems against data corruption attacks at design time<\/a>. In <i>Proceedings of the 16th International Symposium on Foundations &amp; Practice of Security<\/i>, FPS 2023, pages 391\u2013407, Bordeaux, France, 2023.<\/li>\n\n\n\n<li>John Breton. Analyzing the Behavioural Security Posture of Software Systems. Master&#8217;s Thesis, Carleton University, Ottawa, ON, Canada, 2024.<\/li>\n<\/ul>\n\n\n\n<h3 id=\"try-dubhe\" class=\"wp-block-heading\">Try Dubhe<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/dubhe.compass.carleton.ca\/\">https:\/\/dubhe.compass.carleton.ca\/<\/a><\/li>\n<\/ul>\n\n\n\n<h3 id=\"screenshots\" class=\"wp-block-heading\">Screenshots<\/h3>\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" data-id=\"1845\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Landing.png\" class=\"wp-image-1845\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Landing.png 1280w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Landing-160x90.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Landing-240x135.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Landing-768x432.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Landing-400x225.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Landing-360x203.png 360w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" data-id=\"1847\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Upload.png\" class=\"wp-image-1847\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Upload.png 1280w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Upload-160x90.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Upload-240x135.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Upload-768x432.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Upload-400x225.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Upload-360x203.png 360w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" data-id=\"1844\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Analysis.png\" class=\"wp-image-1844\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Analysis.png 1280w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Analysis-160x90.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Analysis-240x135.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Analysis-768x432.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Analysis-400x225.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Analysis-360x203.png 360w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" data-id=\"1846\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Report.png\" class=\"wp-image-1846\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Report.png 1280w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Report-160x90.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Report-240x135.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Report-768x432.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Report-400x225.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Dubhe-Report-360x203.png 360w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/figure>","protected":false},"excerpt":{"rendered":"<p>Dubhe: Behavioural Security Posture Analysis Tool Dubhe is an automated tool that can determine a system&#8217;s behavioural security posture by analyzing UML activity diagrams. Requiring a single XMI file for analysis, Dubhe offloads as much responsibility from designers to perform system security analysis. Dubhe works by calculating two security metrics: Critical Element Risk Index (CERI) [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[52],"class_list":["post-1843","page","type-page","status-publish","hentry","cu_page_type-tools"],"acf":{"cu_post_thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1843"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1843\/revisions"}],"predecessor-version":[{"id":1852,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/1843\/revisions\/1852"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1843"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_page_type?post=1843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}