Tuma, KatjaKatjaTumaScandariato, RiccardoRiccardoScandariatoBalliu, MusardMusardBalliu2021-09-022021-09-022019-03IEEE International Conference on Software Architecture (ICSA 2019)http://hdl.handle.net/11420/10258This paper presents a practical and formal approach to analyze security-centric information flow policies at the level of the design model. Specifically, we focus on data confidentiality and data integrity objectives. In its guiding principles, the approach is meant to be amenable for designers (e.g., software architects) that have very limited or no background in formal models, logics, and the like. To this aim, we provide an intuitive graphical notation, which is based on the familiar Data Flow Diagrams, and which requires as little effort as possible in terms of extra security-centric information the designer has to provide. The result of the analysis algorithm is the early discovery of design flaws in the form of violations of the intended security properties. The approach is implemented as a publicly available plugin for Eclipse and evaluated with four real-world case studies from publicly available literature.enConfidentialityData Flow DiagramIntegritySecure designFlaws in Flows: Unveiling design flaws via information flow analysisConference Paper10.1109/ICSA.2019.00028Other