Secure Path Verification

被引:0
|
作者
Cabodi, G. [1 ]
Camurati, P. [1 ]
Finocchiaro, S. F. [1 ]
Loiacono, C. [1 ]
Savarese, F. [1 ]
Vendraminetto, D. [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, Turin, Italy
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many embedded systems, like medical, sensing, automotive, military, require basic security functions, often referred to as "secure communications". Nowadays, interest has been growing around defining new security related properties, expressing relationships with information flow and access control. In particular, novel research works are focused on formalizing generic security requirements as propagation properties. These kinds of properties, we name them Path properties, are used to see whether it is possible to leak secure data via unexpected paths. In this paper we compare Path properties, described above, with formal security properties expressed in CTL Logic, named Taint properties. We also compare two verification techniques used to verify Path and Taint properties considering an abstraction of a Secure Embedded Architecture discussing the advantages and drawbacks of each approach.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [31] Efficient and Secure Fingerprint Verification for Embedded Devices
    Shenglin Yang
    Kazuo Sakiyama
    Ingrid Verbauwhede
    EURASIP Journal on Advances in Signal Processing, 2006
  • [33] Secure Location Verification Using Simultaneous Multilateration
    Chiang, Jerry T.
    Haas, Jason J.
    Choi, Jihyuk
    Hu, Yih-Chun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (02) : 584 - 591
  • [34] SPEAKER VERIFICATION USING SECURE BINARY EMBEDDINGS
    Portelo, Jose
    Raj, Bhiksha
    Boufounos, Petros
    Trancoso, Isabel
    Abad, Alberto
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [35] A Secure Framework for Location Verification in Pervasive Computing
    Liu, Dawei
    Lee, Moon-Chuen
    Wu, Dan
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 388 - 397
  • [36] Source code verification of a secure payment applet
    Jacobs, B
    Oostdijk, M
    Warnier, M
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2004, 58 (1-2): : 107 - 120
  • [37] Secure Motion Verification using the Doppler Effect
    Schaefer, Matthias
    Leu, Patrick
    Lenders, Vincent
    Schmitt, Jens
    PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 135 - 145
  • [38] Secure Embedded Architectures: Taint Properties Verification
    Cabodi, G.
    Camurati, P.
    Finocchiaro, S. F.
    Loiacono, C.
    Savarese, F.
    Vendraminetto, D.
    2016 13TH INTERNATIONAL CONFERENCE ON DEVELOPMENT AND APPLICATION SYSTEMS (DAS 2016), 2016, : 150 - 157
  • [39] Data-Provenance Verification For Secure Hosts
    Xu, Kui
    Xiong, Huijun
    Stefan, Deian
    Yao, Danfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) : 173 - 183
  • [40] Logical verification of secure electronic transactions protocol
    Chen, Qingfeng
    Wang, Ju
    Bai, Shuo
    Zhang, Shichao
    Sui, Liying
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (03): : 346 - 362