Applying SDL to formal analysis of security systems

被引:0
|
作者
López, J [1 ]
Ortega, JJ [1 ]
Troya, JM [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, ETS Ingn Informat, E-29071 Malaga, Spain
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, it is widely accepted that critical systems have to be formally analyzed to achieve well-known benefits of formal methods. To study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques commonly used in communication protocols to the analysis of cryptographic ones. In particular, we have extended the design and analysis phases with security properties. Our proposal uses a specification notation based on MSC, which can be automatically translated into a generic SDL specification. This SDL system can then be used for the analysis of the desired security properties, by using an observer process schema. Apart from our main goal of providing a notation for describing the formal specification of security systems our proposal also brings additional benefits, such as the study of the possible attacks to the system, and the possibility of reusing the specifications produced to describe and analyze more complex systems.
引用
收藏
页码:300 / 316
页数:17
相关论文
共 50 条
  • [41] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [42] SDL specification of a security architecture for WorldFIP
    Chávez, ML
    Henríquez, FR
    14TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND COMPUTERS, PROCEEDINGS, 2004, : 149 - 154
  • [43] Validation of SDL systems
    Hogrefe, D
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1996, 28 (12): : 1659 - 1667
  • [44] ns+SDL -: The network simulator for SDL systems
    Kuhn, T
    Geraldy, A
    Gotzhein, R
    Rothländer, F
    SDL 2005: MODEL DRIVEN, PROCEEDINGS, 2005, 3530 : 103 - 116
  • [45] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [46] A Framework of Applying BI to Social Security Systems
    Wu Zhong
    Fan Jun-hui
    Li Cheng
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL 2, PROCEEDINGS, 2008, : 189 - 193
  • [47] Design and validate embedded SW with the formal language SDL
    Conquet, E
    Touet, G
    DATA SYSTEMS IN AEROSPACE - PROCEEDINGS, 1998, : 33 - 39
  • [48] Generating a compiler for SDL from the formal language definition
    Prinz, A
    von Löwis, M
    SDL 2003: SYSTEM DESIGN, PROCEEDINGS, 2003, 2708 : 150 - 165
  • [49] Formal Automated Transformation of SDL Specifications to Lotos Specifications
    El-Gendy, Hazem
    El Kadhi, Nabil
    Debnath, Narayan
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 1117 - +
  • [50] Formal automated transformation of lotos specifications to SDL specifications
    El-Gendy, H
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: INDUSTRIAL SYSTEMS, 2004, : 237 - 241