Verification method of security model based on UML and model checking

被引:0
|
作者
Cheng, Liang [1 ,2 ]
Zhang, Yang [2 ]
机构
[1] Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei 230027, China
[2] Stale Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
来源
关键词
Formal verification - Unified Modeling Language;
D O I
10.3724/SP.J.1016.2009.00699
中图分类号
学科分类号
摘要
As the development of security operating system, the formal analysis and verification of the security models has been one of the hottest topics now. A new method to verify the correctness of security models is proposed in this paper based on the study of predecessors' work, which made use of the Unified Modeling Language (UML) and model checking. This approach first used the UML to specify the security model in the form of finite state machine diagrams and the class diagrams, and then translated these UML diagrams to the input language of model checkers. And it used the model checker to verify the model's correctness or the violation of security properties for the last step. The authors demonstrate the violation of confidentiality of the DBLP and SLCF model by the new approach.
引用
收藏
页码:699 / 708
相关论文
共 50 条
  • [1] Security Requirements Verification for Existing Systems with Model Checking Technique and UML
    Matsuura, Saeko
    Ogata, Shinpei
    Aoki, Yoshitaka
    [J]. MODELSWARD: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2017, : 529 - 535
  • [2] Verification of UML-based security policy model
    Park, SC
    Kwon, G
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 973 - 982
  • [3] Fairness Verification Method of Tree-based Model Based on Probabilistic Model Checking
    Wang, Yan
    Hou, Zhe
    Huang, Yan-Hong
    Shi, Jian-Qi
    Zhang, Ge-Lin
    [J]. Ruan Jian Xue Bao/Journal of Software, 2022, 33 (07): : 2482 - 2498
  • [4] Automatic Verification of Behavior of UML Requirements Specifications using Model Checking
    Matsuura, Saeko
    Ikeda, Sae
    Yokotae, Kasumi
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD), 2020, : 158 - 166
  • [5] A model checking-based approach for security policy verification of mobile systems
    Braghin, Chiara
    Sharygina, Natasha
    Barone-Adesi, Katerina
    [J]. FORMAL ASPECTS OF COMPUTING, 2011, 23 (05) : 627 - 648
  • [6] Extending UML for Model Checking
    Shu, Xinfeng
    Wang, Mengnan
    Wang, Xiaobing
    [J]. STRUCTURED OBJECT-ORIENTED FORMAL LANGUAGE AND METHOD, SOFL+MSVL 2017, 2018, 10795 : 88 - 107
  • [7] Model checking UML statecharts
    Dong, W
    Wang, J
    Qi, X
    Qi, ZC
    [J]. APSEC 2001: EIGHTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2001, : 363 - 370
  • [8] A model-based method for security configuration verification
    Sakaki, Hiroshi
    Yanoo, Kazuo
    Ogawa, Ryuichi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 60 - 75
  • [9] A Model Checking Based Approach for Containment Checking of UML Sequence Diagrams
    Muram, Faiz Ul
    Tran, Huy
    Zdun, Uwe
    [J]. 2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 73 - 80
  • [10] Verifying Security Requirements using Model Checking Technique for UML-Based Requirements Specification
    Aoki, Yoshitaka
    Matsuura, Saeko
    [J]. 2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET), 2014, : 18 - 25