Formal Specification of Security Guidelines for Program Certification

被引:0
|
作者
Zhioua, Zeineb [1 ]
Roudier, Yves [2 ]
Ameur-Boulifa, Rabea [3 ]
机构
[1] EURECOM, Biot, France
[2] Univ Nice Sophia Antipolis, CNRS, I3S, UCA, Nice, France
[3] Univ Paris Saclay, Telecom ParisTech, LTCI, Paris, France
关键词
Security Guidelines; Security Best Practices; Program Certification; Information Flow Analysis; Model Checking; Labelled Transition Systems;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure software can be obtained out of two distinct processes: security by design, and security by certification. The former approach has been quite extensively formalized as it builds upon models, which are verified to ensure security properties are attained and from which software is then derived manually or automatically. In contrast, the latter approach has always been quite informal in both specifying security best practices and verifying that the code produced conforms to them. In this paper, we focus on the latter approach and describe how security guidelines might be captured by security experts and verified formally by developers. Our technique relies on abstracting actions in a program based on modularity, and on combining model checking together with information flow analysis. Our goal is to formalize the existing body of knowledge in security best practices using formulas in the MCL language and to conduct formal verifications of the conformance of programs with such security guidelines. We also discuss our first results in creating a methodology for the formalization of security guidelines.
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [1] Formal Specification and Verification of Security Guidelines
    Zhioua, Zeineb
    Roudier, Yves
    Ameur, Rabea Boulifa
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
  • [2] Trustable Formal Specification for Software Certification
    Mery, Dominique
    Singh, Neeraj Kumar
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT II, 2010, 6416 : 312 - 326
  • [3] Formal specification of program slicing
    Wu, Fangjun
    ACM SIGPLAN NOTICES, 2006, 41 (12) : 18 - 27
  • [4] Formal Specification and Validation of Security Policies
    Bourdier, Tony
    Cirstea, Horatiu
    Jaume, Mathieu
    Kirchner, Helene
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 148 - +
  • [5] Formal specification and prototyping of a program specializer
    Blazy, S
    Facon, P
    TAPSOFT '95: THEORY AND PRACTICE OF SOFTWARE DEVELOPMENT, 1995, 915 : 666 - 680
  • [6] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
  • [7] Panel on languages for formal specification of security protocols
    Meadows, C
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 96 - 96
  • [8] A formal specification of the MIDP 2.0 security model
    Beguelin, Santiago Zanella
    Betarte, Gustavo
    Luna, Carlos
    FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 220 - +
  • [9] Formal Specification of Software Architecture Security Tactics
    Wyeth, Andrew
    Zhang, Cui
    22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 172 - 175
  • [10] Formal specification and integration of distributed security policies
    Mejri, Mohamed
    Yahyaoui, Hamdi
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2017, 49 : 1 - 35