A model checking-based approach for security policy verification of mobile systems

被引:13
|
作者
Braghin, Chiara [1 ]
Sharygina, Natasha [2 ]
Barone-Adesi, Katerina [2 ]
机构
[1] Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, Italy
[2] Univ Svizzera Italiana, Fac Informat, Lugano, Switzerland
关键词
Software verification; Program security and safety; Mobile systems; Security policies; Access control; Information flow; SLAM;
D O I
10.1007/s00165-010-0159-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.
引用
收藏
页码:627 / 648
页数:22
相关论文
共 50 条
  • [1] A model checking-based security analysis framework for IoT systems
    Fang, Zheng
    Fu, Hao
    Gu, Tianbo
    Qian, Zhiyun
    Jaeger, Trent
    Hu, Pengfei
    Mohapatra, Prasant
    HIGH-CONFIDENCE COMPUTING, 2021, 1 (01):
  • [2] Model checking-based verification of Web application
    Miao, Huaikou
    Zeng, Hongwei
    12TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 47 - +
  • [3] Model Checking-based Safety Verification of a Petri Net Representation of Train Interlocking Systems
    Aristyo, B.
    Pradityo, K.
    Tamba, T. A.
    Nazaruddin, Y. Y.
    Widyotriatmo, A.
    2018 57TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2018, : 392 - 397
  • [4] A Model Checking-based Analysis Framework for Systems Biology Models
    Liu, Bing
    Safa, Sara
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [5] Model checking-based safety verification for railway signal safety protocol-I
    Mei Meng
    Xu Zhongwei
    Wang Xi
    Wan Yongbing
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2013, 46 (03) : 195 - 202
  • [6] Model checking-based safety verification for railway signal safety protocol-I
    School of Electronics and Information Engineering, Tongji University, No. 4800 Cao'an Highway, Shanghai, China
    Meng, M. (mei_meng@163.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (46):
  • [7] Model Checking-Based Testing of Web Applications
    ZENG Hongwei
    Wuhan University Journal of Natural Sciences, 2007, (05) : 922 - 926
  • [8] Optimization of model checking-based test generation
    Zeng, Hongwei
    Miao, Huaikou
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2011, 23 (03): : 496 - 502
  • [9] Towards a Probabilistic Model Checking-based Approach for Medical Device Risk Assessment
    Cicotti, Giuseppe
    Coronato, Antonio
    2015 IEEE INTERNATIONAL SYMPOSIUM ON MEDICAL MEASUREMENTS AND APPLICATIONS (MEMEA) PROCEEDINGS, 2015, : 180 - 185
  • [10] Verification method of security model based on UML and model checking
    Cheng, Liang
    Zhang, Yang
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 699 - 708