Applying SDL to formal analysis of security systems

被引:0
|
作者
López, J [1 ]
Ortega, JJ [1 ]
Troya, JM [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, ETS Ingn Informat, E-29071 Malaga, Spain
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, it is widely accepted that critical systems have to be formally analyzed to achieve well-known benefits of formal methods. To study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques commonly used in communication protocols to the analysis of cryptographic ones. In particular, we have extended the design and analysis phases with security properties. Our proposal uses a specification notation based on MSC, which can be automatically translated into a generic SDL specification. This SDL system can then be used for the analysis of the desired security properties, by using an observer process schema. Apart from our main goal of providing a notation for describing the formal specification of security systems our proposal also brings additional benefits, such as the study of the possible attacks to the system, and the possibility of reusing the specifications produced to describe and analyze more complex systems.
引用
收藏
页码:300 / 316
页数:17
相关论文
共 50 条
  • [31] How formal analysis and verification add security to blockchain-based systems
    Matsuo, Shin'ichiro
    PROCEEDINGS OF THE 17TH CONFERENCE ON FORMAL METHODS IN COMPUTER AIDED DESIGN (FMCAD 2017), 2017, : 1 - 4
  • [32] Formal Methods for Socio-technical Security (Formal and Automated Analysis of Security Ceremonies)
    Vigano, Luca
    COORDINATION MODELS AND LANGUAGES, 2022, 13271 : 3 - 14
  • [33] Formal enforcement of security policies on concurrent systems
    Langar, Mahjoub
    Mejri, Mohamed
    Adi, Kamel
    JOURNAL OF SYMBOLIC COMPUTATION, 2011, 46 (09) : 997 - 1016
  • [34] Applying formal concept analysis to description logics
    Baader, F
    Sertkaya, B
    CONCEPT LATTICES, PROCEEDINGS, 2004, 2961 : 261 - 286
  • [35] Formal analysis of modern security protocols
    Yasinsac, A
    Childs, J
    INFORMATION SCIENCES, 2005, 171 (1-3) : 189 - 211
  • [36] Formal Verification and Security Analysis of AMQP
    Liu, Huiying
    Dong, Wenting
    Zhu, Huibiao
    Su, Ziqing
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2177 - 2182
  • [37] Formal Vulnerability Analysis of Security Components
    Feiten, Linus
    Sauer, Matthias
    Schubert, Tobias
    Tomashevich, Victor
    Polian, Ilia
    Becker, Bernd
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (08) : 1358 - 1369
  • [38] Formal Analysis of Security Metrics and Risk
    Krautsevich, Leanid
    Martinelli, Fabio
    Yautsiukhin, Artsiom
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 304 - 319
  • [39] Formal method for the analysis of security protocols
    Lu, Laifeng
    Ma, Jianfeng
    ICIC Express Letters, 2011, 5 (10): : 3785 - 3789
  • [40] Formal Procedural Security Modeling and Analysis
    Weldemariam, Komminist
    Villafiorita, Adolfo
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 249 - +