Model checking the observational determinism security property using PROMELA and SPIN

被引:6
|
作者
Dabaghchian, Maryam [1 ]
Azgomi, Mohammad Abdollahi [2 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran, Iran
[2] Iran Univ Sci & Technol, Sch Comp Engn, Trsutworthy Comp Lab, Tehran, Iran
基金
美国国家科学基金会;
关键词
Model checking; Linear temporal logic (LTL); Information flowsecurity; Observational determinism; SPIN; PROMELA;
D O I
10.1007/s00165-014-0331-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Observational determinism is a property that ensures the confidentiality in concurrent programs. It conveys that public variables are independent of private variables during the execution of programs, and the scheduling policy of threads. Different definitions for observational determinism have been proposed. On the other hand, observational determinism is not a standard property and it should be checked over two or more executions of a program. The self-composition approach allows comparing two different copies of a program using a single formula. In this paper, we propose a new specification for the observational determinism security property in linear temporal logic. We also present a general method to create the appropriate program model using the self-composition approach. Both the program model and the observational determinism property are encoded in embedded C codes in PROMELA using the SPIN model checker. The paper also discusses a method for the instrumentation of PROMELA code in order to encode the program model for specifying the observational determinism security property.
引用
收藏
页码:789 / 804
页数:16
相关论文
共 50 条
  • [31] Model Checking the IKEv2 Protocol Using Spin
    Ninet, Tristan
    Legay, Axel
    Maillard, Romaric
    Traonouez, Louis-Marie
    Zendra, Olivier
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 288 - 294
  • [32] Model checking in practice: Analysis of Generic Bootloader using SPIN
    Das Barman, Kuntal
    Mukhopadhyay, Debapriyay
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4789 : 232 - +
  • [33] Safety property verification using sequential SAT and bounded model checking
    Parthasarathy, G
    Iyer, MK
    Cheng, KT
    Wang, LC
    IEEE DESIGN & TEST OF COMPUTERS, 2004, 21 (02): : 132 - 143
  • [34] Model checking security pattern compositions
    Dong, Jing
    Peng, Tu
    Zhao, Yajing
    USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 80 - 89
  • [35] LTL model checking for security Protocols
    Armando, Alessandro
    Carbone, Roberto
    Compagna, Luca
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 385 - +
  • [36] Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking
    Shaikh, Eman
    Al-Ali, A. R.
    Muhammad, Shahabuddin
    Mohammad, Nazeeruddin
    Aloul, F.
    IEEE ACCESS, 2023, 11 : 26358 - 26374
  • [37] Formal security analysis of near field communication using model checking
    Alexiou, Nikolaos
    Basagiannis, Stylianos
    Petridou, Sophia
    COMPUTERS & SECURITY, 2016, 60 : 1 - 14
  • [38] Security Verification of Industrial Control Systems using Partial Model Checking
    Kulik, Tomas
    Boudjadar, Jalil
    Tran-Jorgensen, Peter W. V.
    2020 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON FORMAL METHODS IN SOFTWARE ENGINEERING, FORMALISE, 2020, : 98 - 108
  • [39] Security Verification for Cyber-Physical Systems Using Model Checking
    Chan, Ching-Chieh
    Yang, Cheng-Zen
    Fan, Chin-Feng
    IEEE ACCESS, 2021, 9 : 75169 - 75186
  • [40] Security analysis of RFID authentication for pervasive systems using model checking
    Kim, Hyun-Seok
    Oh, Jeong-Hyun
    Choi, Jin-Young
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +