A Proof Calculus for Attack Trees in Isabelle

被引:5
|
作者
Kammueller, Florian [1 ,2 ]
机构
[1] Middlesex Univ London, London, England
[2] Tech Univ Berlin, Berlin, Germany
基金
英国工程与自然科学研究理事会;
关键词
INSIDER THREATS;
D O I
10.1007/978-3-319-67816-0_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attack trees are an important modeling formalism to identify and quantify attacks on security and privacy. They are very useful as a tool to understand step by step the ways through a system graph that lead to the violation of security policies. In this paper, we present how attacks can be refined based on the violation of a policy. To that end we provide a formal definition of attack trees in Isabelle's Higher Order Logic: a proof calculus that defines how to refine sequences of attack steps into a valid attack. We use a notion of Kripke semantics as formal foundation that then allows to express attack goals using branching time temporal logic CTL. We illustrate the use of the mechanized Isabelle framework on the example of a privacy attack to an IoT healthcare system.
引用
收藏
页码:3 / 18
页数:16
相关论文
共 50 条
  • [31] A Formal Proof of Properties of a Presentation System using Isabelle
    Panchenko, Taras
    Ivanov, Ievgen
    2017 IEEE FIRST UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON), 2017, : 1155 - 1160
  • [32] Proof of the basic theorem on concept lattices in Isabelle/HOL
    Sertkaya, B
    Oguztüzün, H
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2004, PROCEEDINGS, 2004, 3280 : 976 - 985
  • [33] Linear logic with Isabelle: Pruning the proof search tree
    deGroote, P
    THEOREM PROVING WITH ANALYTIC TABLEAUX AND RELATED METHODS, 1995, 918 : 263 - 277
  • [34] A proof system of the CaIT calculus
    Ningning Chen
    Huibiao Zhu
    Frontiers of Computer Science, 2024, 18
  • [35] A proof system of the CaIT calculus
    Chen, Ningning
    Zhu, Huibiao
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [36] AN ELEMENTARY PROOF OF A THEOREM IN CALCULUS
    RICHMOND, DE
    AMERICAN MATHEMATICAL MONTHLY, 1985, 92 (08): : 589 - 590
  • [37] Analysis of the Xedni calculus attack
    Jacobson, MJ
    Koblitz, N
    Silverman, JH
    Stein, A
    Teske, E
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (01) : 41 - 64
  • [38] Analysis of the Xedni Calculus Attack
    Michael J. Jacobson
    Neal Koblitz
    Joseph H. Silverman
    Andreas Stein
    Edlyn Teske
    Designs, Codes and Cryptography, 2000, 20 : 41 - 64
  • [39] Integration of Formal Proof into Unified Assurance Cases - With Isabelle/SACM
    Foster, Simon
    Nemouchi, Yakoub
    Gleirscher, Mario
    Wei, Ran
    Kelly, Tim
    ITNOW, 2021, 63 (03)
  • [40] Explanations and proof trees
    Ferrand, Gerard
    Lesaint, Willy
    Tessier, Alexandre
    COMPUTING AND INFORMATICS, 2006, 25 (2-3) : 105 - 125