共查询到20条相似文献,搜索用时 0 毫秒
1.
Achim D. Brucker Burkhart Wolff 《International Journal on Software Tools for Technology Transfer (STTT)》2005,7(3):233-247
We present a method for the security analysis of realistic models over off-the-shelf systems and their configuration by formal, machine-checked proofs. The presentation follows a large case study based on a formal security analysis of a CVS-Server architecture.The analysis is based on an abstract architecture (enforcing a role-based access control), which is refined to an implementation architecture (based on the usual discretionary access control provided by the POSIX environment). Both architectures serve as a skeleton to formulate access control and confidentiality properties.Both the abstract and the implementation architecture are specified in the language Z. Based on a logical embedding of Z into Isabelle/HOL, we provide formal, machine-checked proofs for consistency properties of the specification, for the correctness of the refinement, and for security properties. 相似文献
2.
Jim Woodcock Susan Stepney David Cooper John Clark Jeremy Jacob 《Formal Aspects of Computing》2008,20(1):5-19
Ten years ago the Mondex electronic purse was certified to ITSEC Level E6, the highest level of assurance for secure systems.
This involved building formal models in the Z notation, linking them with refinement, and proving that they correctly implement
the required security properties. The work has been revived recently as a pilot project for the international Grand Challenge
in Verified Software. This paper records the history of the original project and gives an overview of the formal models and
proofs used.
C. B. Jones 相似文献
3.
We describe our experiences in mechanising the specification, refinement, and proof of the Mondex Electronic Purse using the Z/Eves theorem prover. We took a conservative approach and mechanised the original LaTEX sources without changing their technical content, except to correct errors. We found problems in the original specification
and some missing invariants in the refinements. Based on these experiences, we present novel and detailed guidance on how
to drive Z/Eves successfully. The work contributes to the Repository for the Verified Software Grand Challenge.
C. B. Jones 相似文献
4.
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired
security properties. The specification is developed by stepwise refinement using the RAISE formal specification language,
RSL, and the proofs are made by translation to PVS and SAL. The work is part of a year-long project contributing to the international
grand challenge in verified software engineering.
J. C. P. Woodcock 相似文献
5.
David BasinCarlos Caleiro Jaime RamosLuca Viganò 《Theoretical computer science》2011,412(31):4007-4043
The distributed temporal logic DTL is an expressive logic, well suited for formalizing properties of concurrent, communicating agents. We show how DTL can be used as a metalogic to reason about and relate different security protocol models. This includes reasoning about model simplifications, where models are transformed to have fewer agents or behaviors, and verifying model reductions, where to establish the validity of a property it suffices to consider its satisfaction on only a subset of models.We illustrate how DTL can be used to formalize security models, protocols, and properties, and then present three concrete examples of metareasoning. First, we prove a general theorem about sufficient conditions for data to remain secret during communication. Second, we prove the equivalence of two models for guaranteeing message-origin authentication. Finally, we relate channel-based and intruder-centric models, showing that it is sufficient to consider models in which the intruder completely controls the network. While some of these results belong to the folklore or have been shown, mutatis mutandis, using other formalisms, DTL provides a uniform means to prove them within the same formalism. It also allows us to clarify subtle aspects of these model transformations that are often neglected or cannot be specified in the first place. 相似文献
6.
To enable the verification of authentication protocols, Schneider formulated the rank function approach which could be used, under suitable circumstances, to verify protocols modelled using the process algebra CSP. We develop this theoretical result and extend it to a practical framework which can be used to model and analyse a wider variety of security protocols with respect to a wider range of security specifications than were hitherto possible. These results are achieved using PVS, which also provides tool support for the rank function approach. 相似文献
7.
We present a formal verification method for concurrent systems. The technique is to show a correspondence between state machines representing an implementation and specification behavior. The correspondence is called asimulation relation, and is particularly well suited for theorem provers. Since the method does not rely on enumerating all the states, it can be applied to systems with an infinite or unknown number of states. The method is illustrated by proving the correctness of a particularly subtle example that is likely to be of increasing importance: a directory based multiprocessor cache protocol. The proof is carried out using the HOL (higher-order logic) theorem prover. 相似文献
8.
Bahareh Badban Wan Fokkink Jan Friso Groote Jun Pang Jaco van de Pol 《Formal Aspects of Computing》2005,17(3):342-388
We prove the correctness of a sliding window protocol with an arbitrary finite window size n and sequence numbers modulo 2n. The correctness consists of showing that the sliding window protocol is branching bisimilar to a queue of capacity 2n. The proof is given entirely on the basis of an axiomatic theory, and has been checked in the theorem prover PVS.
Received November 2004
Revised June 2005
Accepted July 2005 by J. V. Tucker 相似文献
9.
?erif Bahtiyar Mehmet Ufuk Ça?layan 《Journal of Network and Computer Applications》2012,35(1):480-490
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments. 相似文献
10.
Summary. We set out a modal logic for reasoning about multilevel security of probabilistic systems. This logic contains expressions
for time, probability, and knowledge. Making use of the Halpern-Tuttle framework for reasoning about knowledge and probability,
we give a semantics for our logic and prove it is sound. We give two syntactic definitions of perfect multilevel security
and show that their semantic interpretations are equivalent to earlier, independently motivated characterizations. We also
discuss the relation between these characterizations of security and between their usefulness in security analysis. 相似文献
11.
A conceptual workflow model specifies the control flow of a workflow together with abstract data information. This model is later on refined by adding specific data information, resulting in an executable workflow which is then run on an information system. It is desirable that correctness properties of the conceptual workflow are transferable to its refinements. In this paper, we present classical workflow nets extended with data operations as a conceptual workflow model. For these nets, we develop a novel technique to verify soundness. An executable workflow is sound if from every reachable state it is always possible to terminate properly. Our technique allows us to analyze a conceptual workflow and to conclude whether there exists at least one sound refinement of it, and whether any refinement of a conceptual workflow model is sound. The positive answer to the first question in combination with the negative answer to the second question means that sound and unsound refinements for the conceptual workflow in question are possible. 相似文献
12.
13.
We report on an experiment in combining the theorem prover Isabelle with automatic first-order arithmetic provers to increase
automation on the verification of distributed protocols. As a case study for the experiment we verify several averaging clock
synchronization algorithms. We present a formalization of Schneider’s generalized clock synchronization protocol [Sch87] in
Isabelle/HOL. Then, we verify that the convergence functions used in two clock synchronization algorithms, namely, the Interactive
Convergence Algorithm (ICA) of Lamport and Melliar-Smith [LMS85] and the Fault-tolerant Midpoint algorithm of Lundelius–Lynch
[LL84], satisfy Schneider’s general conditions for correctness. The proofs are completely formalized in Isabelle/HOL. We identify
parts of the proofs which are not fully automatically proven by Isabelle built-in tactics and show that these proofs can be
handled by automatic first-order provers with support for arithmetics. 相似文献
14.
15.
Carlos BlancoAuthor Vitae Rafael Valencia-GarcíaAuthor Vitae 《Computer Standards & Interfaces》2011,33(4):372-388
The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved as a critical aspect and many related topics have been developed, this paper applies the method of systematic review for identifying, extracting and analyzing the principal proposals for security ontologies. The most mature proposals have been selected and compared by using a formal framework, extracting the key requirements that an integrated and unified security ontology should have, and providing the first steps towards its definition. 相似文献
16.
High quality of security service is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distributed systems disregard security requirements of applications. To address this issue, in this paper, we introduce security heterogeneity concept for our scheduling model in the context of distributed systems. Based on the concept, we propose a novel heuristic scheduling algorithm, or SATS, which strives to maximize the probability that all tasks are executed without any risk of being attacked. Extensive experimental studies using real-world traces indicate that the scheduling performance is affected by heterogeneities of security and computational power. Additionally, empirical results demonstrate that with respect to security and performance, the proposed scheduling algorithm outperforms existing approaches under a wide spectrum of workload conditions. 相似文献
17.
Analysis of a biphase mark protocol with Uppaal and PVS 总被引:1,自引:1,他引:0
The biphase mark protocol is a convention for representing both a string of bits and clock edges in a square wave. The protocol is frequently used for communication at the physical level of the ISO/OSI hierarchy, and is implemented on microcontrollers such as the Intel 82530 Serial Communications Controller. An important property of the protocol is that bit strings of arbitrary length can be transmitted reliably, despite differences in the clock rates of sender and receiver (drift), variations of the clock rates (jitter), and distortion of the signal after generation of an edge. In this article, we show how the protocol can be modelled naturally in terms of timed automata. We use the model checker Uppaal to derive the maximal tolerances on the clock rates, for different instances of the protocol, and to support the general parametric verification that we formalized using the proof assistant PVS. Based on the derived parameter constraints we propose instances of BMP that are correct (at least in our model) but have a faster bit rate than the instances that are commonly implemented in hardware.F.W. Vaandrager was supported by EU IST project IST-2001-35304 Advanced Methods for Timed Systems (AMETIST).lA.L. de Groot was supported by NWO project 612.062.000 Architecture for Structuring the requirements Specification of Embedded Safety-critical Systems (ASSESS). 相似文献
18.
电子商务的快速发展加强了电子商务协议的新类型的需求,尤其对各种复杂协议的需求,这使得协议本身安全性的证明变得更为困难。为了证明电子商务协议的可靠性,研究人员已设计了各种方法。为了更加清楚地描述需要证明的电子商务协议的安全目标,研究者们已经提出了几种标志性属性,其中之一是较著名的原子性犤8犦,但这并不能完全描述电子商务协议的全部安全性定义。在犤1犦里,研究员对一项有研究价值的新属性进行了研究,称为“保护个人的利益”,并且提出一个手工验证的模型。该模型虽然有效,但是实用性较差。文章提出了一个基于模型检验这种技术的自动验证方法。 相似文献
19.
Based on the semi-group property of Chebyshev chaotic map and time-stamp, we propose an enhanced chaotic maps-based key agreement protocol, which is more secure than the original one and can resist the replaying attack. 相似文献
20.
Verification of the randomized consensus algorithm of Aspnes and Herlihy: a case study 总被引:1,自引:0,他引:1
Summary. The Probabilistic I/O Automaton model of [31] is used as the basis for a formal presentation and proof of the randomized
consensus algorithm of Aspnes and Herlihy. The algorithm guarantees termination within expected polynomial time. The Aspnes-Herlihy
algorithm is a rather complex algorithm. Processes move through a succession of asynchronous rounds, attempting to agree at
each round. At each round, the agreement attempt involves a distributed random walk. The algorithm is hard to analyze because
of its use of nontrivial results of probability theory (specifically, random walk theory which is based on infinitely many
coin flips rather than on finitely many coin flips), because of its complex setting, including asynchrony and both nondeterministic
and probabilistic choice, and because of the interplay among several different sub-protocols. We formalize the Aspnes-Herlihy
algorithm using probabilistic I/O automata. In doing so, we decompose it formally into three subprotocols: one to carry out
the agreement attempts, one to conduct the random walks, and one to implement a shared counter needed by the random walks.
Properties of all three subprotocols are proved separately, and combined using general results about automaton composition.
It turns out that most of the work involves proving non-probabilistic properties (invariants, simulation mappings, non-probabilistic
progress properties, etc.). The probabilistic reasoning is isolated to a few small sections of the proof. The task of carrying
out this proof has led us to develop several general proof techniques for probabilistic I/O automata. These include ways to
combine expectations for different complexity measures, to compose expected complexity properties, to convert probabilistic
claims to deterministic claims, to use abstraction mappings to prove probabilistic properties, and to apply random walk theory
in a distributed computational setting. We apply all of these techniques to analyze the expected complexity of the algorithm.
Received: February 1999 / Accepted: March 2000 相似文献