A model checking-based approach for security policy verification of mobile systems

被引:13
|
作者
Braghin, Chiara [1 ]
Sharygina, Natasha [2 ]
Barone-Adesi, Katerina [2 ]
机构
[1] Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, Italy
[2] Univ Svizzera Italiana, Fac Informat, Lugano, Switzerland
关键词
Software verification; Program security and safety; Mobile systems; Security policies; Access control; Information flow; SLAM;
D O I
10.1007/s00165-010-0159-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.
引用
收藏
页码:627 / 648
页数:22
相关论文
共 50 条
  • [31] Synthesizing, correcting and improving code, using model checking-based genetic programming
    Katz, Gal
    Peled, Doron
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2017, 19 (04) : 449 - 464
  • [32] Parameterized model checking for security policy analysis
    Silvio Ranise
    Anh Truong
    Riccardo Traverso
    International Journal on Software Tools for Technology Transfer, 2016, 18 : 559 - 573
  • [33] Parameterized model checking for security policy analysis
    Ranise, Silvio
    Anh Truong
    Traverso, Riccardo
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2016, 18 (05) : 559 - 573
  • [34] A model-checking verification environment for mobile processes
    Ferrari, GL
    Gnesi, S
    Montanari, U
    Pistore, M
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2003, 12 (04) : 440 - 473
  • [35] Verification of Mobile SMS Application with Model Checking Agent
    Bujang, Siti Dianah Abdul
    Selamat, Ali
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 217 - 222
  • [36] Verification of Mobile SMS Application with Model Checking Agent
    Bujang, Siti Dianah Abdul
    Selamat, Ali
    2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 361 - 365
  • [37] A security policy model transformation and verification approach for software defined networking
    Meng, Yunfei
    Huang, Zhiqiu
    Shen, Guohua
    Ke, Changbo
    COMPUTERS & SECURITY, 2021, 100
  • [38] Probabilistic Model Checking-Based Survivability Analysis in Vehicle-to-Vehicle Networks
    Jin, Li
    Zhang, Guoan
    Wang, Jue
    CHINA COMMUNICATIONS, 2018, 15 (01) : 118 - 127
  • [39] Model checking-based decision support system for fault management: A comprehensive framework and application in electric power systems
    Chen, Guangyao
    He, Peilin
    Wang, Ziqi
    Teng, Zixin
    Jiang, Zhihao
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 247
  • [40] Formal Specification and Verification of an Extended Security Policy Model for Database Systems
    Hong, Zhu
    Yi, Zhu
    Li Chenyang
    Jie, Shi
    Ge, Fu
    Wang Yuanzhen
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 132 - 141