Secure Path Verification

被引:0
|
作者
Cabodi, G. [1 ]
Camurati, P. [1 ]
Finocchiaro, S. F. [1 ]
Loiacono, C. [1 ]
Savarese, F. [1 ]
Vendraminetto, D. [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, Turin, Italy
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many embedded systems, like medical, sensing, automotive, military, require basic security functions, often referred to as "secure communications". Nowadays, interest has been growing around defining new security related properties, expressing relationships with information flow and access control. In particular, novel research works are focused on formalizing generic security requirements as propagation properties. These kinds of properties, we name them Path properties, are used to see whether it is possible to leak secure data via unexpected paths. In this paper we compare Path properties, described above, with formal security properties expressed in CTL Logic, named Taint properties. We also compare two verification techniques used to verify Path and Taint properties considering an abstraction of a Secure Embedded Architecture discussing the advantages and drawbacks of each approach.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [21] Formal Verification of Secure Boot Process
    Vasudevan, Sriram
    Ravi, Prasanna
    Jati, Arpan
    Bhasin, Shivam
    Chattopadhyay, Anupam
    2024 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2024,
  • [22] Secure embedded verification of print signatures
    Idrissa, Abdourhamane
    Fournel, Thierry
    Aubert, Alain
    2009 INTERNATIONAL WORKSHOP ON INFORMATION OPTICS, 2010, 206
  • [23] Secure verification by multifactor optical validation
    Millan, Maria S.
    Perez-Cabre, Elisabet
    Javidi, Bahrain
    OPTICAL INFORMATION SYSTEMS IV, 2006, 6311
  • [24] PATH CALCULUS IN PROGRAM VERIFICATION
    BRAND, D
    JOURNAL OF THE ACM, 1978, 25 (04) : 630 - 651
  • [25] Secure interoperation of secure distributed databases - An architecture verification case study
    Gilham, F
    Riemenschneider, RA
    Stavridou, V
    FM'99-FORMAL METHODS, 1999, 1708 : 701 - 717
  • [26] Improvements to Multiple Path Secure Copy
    Guilfoos, Brian J.
    Humphrey, Laura R.
    Unpingco, Jose
    PROCEEDINGS OF THE HPCMP USERS GROUP CONFERENCE 2008, 2008, : 376 - 378
  • [27] Secure image verification in jointed frequency domains
    Tataru, Relu-Laurentiu
    International Journal of Computer Science and Applications, 2015, 12 (02) : 99 - 119
  • [28] POSTER: Privacy Enhanced Secure Location Verification
    Akand, Md Mamunur Rashid
    Safavi-Naini, Reihaneh
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1793 - 1795
  • [29] An architecture for secure generation and verification of electronic coupons
    Garg, R
    Mittal, P
    Agarwal, V
    Modani, N
    USENIX ASSOCIATION PROCEEDINGS OF THE 2001 USENIX ANNUAL TECHNICAL CONFERENCE, 2001, : 51 - 63
  • [30] A secure authentication scheme for VANETs with batch verification
    Bayat, Majid
    Barmshoory, Mostafa
    Rahimi, Majid
    Aref, Mohammd Reza
    WIRELESS NETWORKS, 2015, 21 (05) : 1733 - 1743