Applying SDL to formal analysis of security systems

被引:0
|
作者
López, J [1 ]
Ortega, JJ [1 ]
Troya, JM [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, ETS Ingn Informat, E-29071 Malaga, Spain
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, it is widely accepted that critical systems have to be formally analyzed to achieve well-known benefits of formal methods. To study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques commonly used in communication protocols to the analysis of cryptographic ones. In particular, we have extended the design and analysis phases with security properties. Our proposal uses a specification notation based on MSC, which can be automatically translated into a generic SDL specification. This SDL system can then be used for the analysis of the desired security properties, by using an observer process schema. Apart from our main goal of providing a notation for describing the formal specification of security systems our proposal also brings additional benefits, such as the study of the possible attacks to the system, and the possibility of reusing the specifications produced to describe and analyze more complex systems.
引用
收藏
页码:300 / 316
页数:17
相关论文
共 50 条
  • [1] Applying mutation analysis to SDL specifications
    Kovács, G
    Pap, Z
    Le Viet, D
    Wu-Hen-Chang, A
    Csopaki, G
    SDL 2003: SYSTEM DESIGN, PROCEEDINGS, 2003, 2708 : 269 - 284
  • [2] Applying practical formal methods to the specification and analysis of security properties
    Heitmeyer, C
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 84 - 89
  • [3] Automatic formal model generation and analysis of SDL
    Aalto, A
    Husberg, N
    Varpaaniemi, K
    SDL 2003: SYSTEM DESIGN, PROCEEDINGS, 2003, 2708 : 285 - 299
  • [4] Formal Security Analysis of Smart Embedded Systems
    Tabrizi, Farid Molazem
    Pattabiraman, Karthik
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 1 - 15
  • [5] Applying techniques and tools for the performance engineering of SDL systems
    Hintelmann, J
    Hofmann, R
    Lemmen, F
    Mitschele-Thiel, A
    Müller-Clostermann, B
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 35 (06): : 647 - 665
  • [6] Applying Formal Methods to Specify Security Requirements in Multi-Agent Systems
    Subburaj, Vinitha Hannah
    Urban, Joseph E.
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 707 - 714
  • [7] Performance analysis of SDL systems from SDL descriptions
    Wohlin, Claes
    Proceedings of the SDL Forum, 1991,
  • [8] DESIGN AND ANALYSIS OF FORMAL SPECIFICATIONS WITH THE SDL-MACHINE
    AHRENS, K
    FISCHER, J
    HOLZ, E
    SCHIEFERDECKER, I
    SYSTEMS ANALYSIS MODELLING SIMULATION, 1991, 8 (4-5): : 327 - 342
  • [9] Formal verification of SDL systems at the Siemens mobile phone department
    Regensburger, F
    Barnard, A
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 1998, 1384 : 439 - 455
  • [10] Performance Analysis of SDL Systems
    Brumbulli, Mihal
    Gaudin, Emmanuel
    COMPLEX SYSTEMS DESIGN & MANAGEMENT (CSD&M 2016), 2017, : 233 - 233