Secure Path Verification

被引:0
|
作者
Cabodi, G. [1 ]
Camurati, P. [1 ]
Finocchiaro, S. F. [1 ]
Loiacono, C. [1 ]
Savarese, F. [1 ]
Vendraminetto, D. [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, Turin, Italy
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many embedded systems, like medical, sensing, automotive, military, require basic security functions, often referred to as "secure communications". Nowadays, interest has been growing around defining new security related properties, expressing relationships with information flow and access control. In particular, novel research works are focused on formalizing generic security requirements as propagation properties. These kinds of properties, we name them Path properties, are used to see whether it is possible to leak secure data via unexpected paths. In this paper we compare Path properties, described above, with formal security properties expressed in CTL Logic, named Taint properties. We also compare two verification techniques used to verify Path and Taint properties considering an abstraction of a Secure Embedded Architecture discussing the advantages and drawbacks of each approach.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [1] Drone Path Planning for Secure Positioning and Secure Position Verification
    Perazzo, Pericle
    Sorbelli, Francesco Betti
    Conti, Mauro
    Dini, Gianluca
    Pinotti, Cristina M.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (09) : 2478 - 2493
  • [2] Embedded Systems Secure Path Verification at the Hardware/Software Interface
    Cabodi, Gianpiero
    Camurati, Paolo
    Finocchiaro, Sebastiano F.
    Savarese, Francesco
    Vendraminetto, Danilo
    IEEE DESIGN & TEST, 2017, 34 (05) : 38 - 46
  • [3] A plan-commit-prove protocol for secure verification of traversal path
    Ghosh, SK
    Ghosh, A
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 458 - 462
  • [4] The Verifier Bee: a Path Planner for Drone-Based Secure Location Verification
    Perazzo, Pericle
    Ariyapala, Kanishka
    Conti, Mauro
    Dini, Gianluca
    2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2015,
  • [5] Secure Track Verification
    Schaefer, Matthias
    Lenders, Vincent
    Schmitt, Jens
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 199 - 213
  • [6] Secure iris verification
    Yang, Shenglin
    Verbauwhede, Ingrid
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 133 - +
  • [7] Modelling and Verification of Secure Exams
    Marmsoler, Diego
    FORMAL ASPECTS OF COMPUTING, 2022, 34 (02)
  • [8] Watermarking protocol of secure verification
    Zhang, Jun
    Kou, Weidong
    Fan, Kai
    Ye, Lei
    JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (04)
  • [9] Blockchain for secure location verification
    Nosouhi, Mohammad Reza
    Yu, Shui
    Zhou, Wanlei
    Grobler, Marthie
    Keshtiar, Habiba
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 136 : 40 - 51
  • [10] Secure watermark verification scheme
    Liu, YL
    Wen, G
    Yao, HX
    Song, YX
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 477 - 484