Secure Path Verification

被引:0
|
作者
Cabodi, G. [1 ]
Camurati, P. [1 ]
Finocchiaro, S. F. [1 ]
Loiacono, C. [1 ]
Savarese, F. [1 ]
Vendraminetto, D. [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, Turin, Italy
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many embedded systems, like medical, sensing, automotive, military, require basic security functions, often referred to as "secure communications". Nowadays, interest has been growing around defining new security related properties, expressing relationships with information flow and access control. In particular, novel research works are focused on formalizing generic security requirements as propagation properties. These kinds of properties, we name them Path properties, are used to see whether it is possible to leak secure data via unexpected paths. In this paper we compare Path properties, described above, with formal security properties expressed in CTL Logic, named Taint properties. We also compare two verification techniques used to verify Path and Taint properties considering an abstraction of a Secure Embedded Architecture discussing the advantages and drawbacks of each approach.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [41] FORMAL VERIFICATION OF THE SECURE SOCKETS LAYER PROTOCOL
    Tobarra, Llanos
    Cazorla, Diego
    Pardo, J. Jose
    Cuartero, Fernando
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 246 - 252
  • [42] Formal Verification of a Secure Mobile Banking Protocol
    Huy Hoang Ngo
    Dandash, Osama
    Phu Dung Le
    Srinivasan, Bala
    Wilson, Campbell
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 410 - 421
  • [43] Verification of Secure Network Protocols in Uncertain Environments
    Damiani, Sarah
    Griffin, Christopher
    Phoha, Shashi
    Racunas, Stephan
    Rogan, Christopher
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2006, 13 (03) : 221 - 228
  • [44] Secure Accountable Dynamic Storage Integrity Verification
    Zhou, Zequan
    Wang, Yupeng
    Luo, Xiling
    Bai, Yi
    Wang, Xiaochao
    Zeng, Feng
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 440 - 447
  • [45] Efficient and secure fingerprint verification for embedded devices
    Yang, Shenglin
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    Eurasip Journal on Applied Signal Processing, 2006, 2006
  • [46] A Secure Authentication System for ePassport Detection and Verification
    Hamad, Fadi
    Zraqou, Jamal
    Maiita, Adi
    Abu Taleb, Anas
    2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, : 173 - 176
  • [47] Secure location verification using radio broadcast
    Vora, A
    Nesterenko, M
    PRINCIPLES OF DISTRIBUTED SYSTEMS, 2005, 3544 : 369 - 383
  • [48] Secure Biometric Verification in the Presence of Malicious Adversaries
    Al-Mannai, Kamela
    Bentafat, Elmahdi
    Bakiras, Spiridon
    Schneider, Jens
    IEEE ACCESS, 2025, 13 : 5284 - 5295
  • [49] Extended Verification of Secure UAANET Routing Protocol
    Maxa, Jean-Aime
    Ben Mahmoud, Mohamed Slim
    Larrieu, Nicolas
    2016 IEEE/AIAA 35TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2016,
  • [50] Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration
    Li, Mingshi
    Yin, Zhenyu
    Ma, Yue
    Wang, Chunxiao
    Chai, Anying
    Lian, Mengjia
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (19): : 13879 - 13893