Formal Specification of Security Guidelines for Program Certification

被引:0
|
作者
Zhioua, Zeineb [1 ]
Roudier, Yves [2 ]
Ameur-Boulifa, Rabea [3 ]
机构
[1] EURECOM, Biot, France
[2] Univ Nice Sophia Antipolis, CNRS, I3S, UCA, Nice, France
[3] Univ Paris Saclay, Telecom ParisTech, LTCI, Paris, France
关键词
Security Guidelines; Security Best Practices; Program Certification; Information Flow Analysis; Model Checking; Labelled Transition Systems;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure software can be obtained out of two distinct processes: security by design, and security by certification. The former approach has been quite extensively formalized as it builds upon models, which are verified to ensure security properties are attained and from which software is then derived manually or automatically. In contrast, the latter approach has always been quite informal in both specifying security best practices and verifying that the code produced conforms to them. In this paper, we focus on the latter approach and describe how security guidelines might be captured by security experts and verified formally by developers. Our technique relies on abstracting actions in a program based on modularity, and on combining model checking together with information flow analysis. Our goal is to formalize the existing body of knowledge in security best practices using formulas in the MCL language and to conduct formal verifications of the conformance of programs with such security guidelines. We also discuss our first results in creating a methodology for the formalization of security guidelines.
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [31] Security Testing and Formal Methods for High Levels Certification of Smart Cards
    Chetali, Boutheina
    TESTS AND PROOFS, PROCEEDINGS, 2009, 5668 : 1 - 5
  • [32] ANALYSIS OF APPROACHES TO FORMAL SPECIFICATION OF CORPORATE SECURITY RULES ON THE ONTOLOGY BASIS
    Kozyrev, O. R.
    Klimova, N. A.
    BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2010, 13 (03): : 28 - +
  • [33] Formal Specification and Verification of an Extended Security Policy Model for Database Systems
    Hong, Zhu
    Yi, Zhu
    Li Chenyang
    Jie, Shi
    Ge, Fu
    Wang Yuanzhen
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 132 - 141
  • [34] Agent Coordination Contexts for the formal specification and enactment of coordination and security policies
    Omicini, Andrea
    Ricci, Alessandro
    Viroli, Mirko
    SCIENCE OF COMPUTER PROGRAMMING, 2006, 63 (01) : 88 - 107
  • [35] A formal framework for agent itinerary specification, security reasoning and logic analysis
    Lu, SY
    Xu, CZ
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 580 - 586
  • [36] A formal policy specification language for an 802.11 WLAN with enhanced security network
    Çalikli, HG
    Çaglayan, U
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2005, PROCEEDINGS, 2005, 3733 : 183 - 192
  • [37] FORMAL SPECIFICATION
    BROKATE, K
    COMPUTER JOURNAL, 1988, 31 (02): : 190 - 190
  • [38] A FORMAL APPROACH ON SPECIFICATION MODELING TO SUPPORT INDUSTRIAL PLC PROGRAM VERIFICATION
    De, Soumen
    Sethuraman, Nagarajan
    Yuan, Chengyin
    IMECE 2008: PROCEEDINGS OF THE ASME INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, VOL 7: EMERGING TECHNOLOGIES RECENT ADVANCES IN ENGINEERING, 2009, : 59 - 67
  • [39] Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
    Huang, Hejiao
    Kirchner, Helene
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 852 - 865
  • [40] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334