Abstracting Security-Critical Applications for Model Checking in a Model-Driven Approach

被引:0
|
作者
Borek, Marian [1 ]
Stenzel, Kurt [1 ]
Katkalov, Kuzman [1 ]
Reif, Wolfgang [1 ]
机构
[1] Univ Augsburg, Dept Software Engn, Augsburg, Germany
关键词
UML; model checking; security-critical systems; model-driven development; transformations; SecureMDD; VALIDATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Model checking at the design level makes it possible to find protocol flaws in security-critical applications automatically. But depending on the size of the application and especially on the abstraction of the application model, model checking may need a lot of resources, primarily time. To reduce the complexity, the application models are usually highly abstracted. But in a model-driven approach with automatic generation of runnable applications the application models need to be detailed and are often too complex to check in reasonable time. In this paper we describe an approach to handle this problem by using additional UML models to restrict the protocol runs, the attacker abilities and the numbers of participants. This makes model checking of large applications in our model-driven approach called SecureMDD possible without manual abstraction of the generated specifications. For model checking we use AVANTSSAR and show how the restrictions modeled within UML are translated. We demonstrate our approach with a smart card based electronic ticketing example.
引用
收藏
页码:11 / 14
页数:4
相关论文
共 50 条
  • [1] Model Checking of Security-Critical Applications in a Model-Driven Approach
    Borek, Marian
    Moebius, Nina
    Stenzel, Kurt
    Reif, Wolfgang
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 76 - 90
  • [2] Generating Formal Specifications for Security-Critical Applications - A Model-Driven Approach
    Moebius, Nina
    Stenzel, Kurt
    Reif, Wolfgang
    [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 68 - 74
  • [3] Integration and Exchangeability of External Security-Critical Web Services in a Model-Driven Approach
    Borek, Marian
    Stenzel, Kurt
    Katkalov, Kuzman
    Reif, Wolfgang
    [J]. ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 63 - 73
  • [4] A Model-Driven Approach to Web Applications
    Kozlovics, Sergejs
    [J]. DATABASES AND INFORMATION SYSTEMS IX, 2016, 291 : 73 - 86
  • [5] A Model-Driven approach to Information Security Compliance
    Correia, Anacleto
    Goncalves, Antonio
    Filomena Teodoro, M.
    [J]. APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2017, 1836
  • [6] A Model-driven Approach to Trace Checking of Temporal Properties with Aggregations
    Boufaied, Chaima
    Bianculli, Domenico
    Briand, Lionel
    [J]. JOURNAL OF OBJECT TECHNOLOGY, 2019, 18 (02):
  • [7] Trusted Compliance Checking on Blockchain with Commitments: A Model-Driven Approach
    Bertolini, Marcello
    Meroni, Giovanni
    Plebani, Pierluigi
    [J]. BUSINESS PROCESS MANAGEMENT FORUM, BPM 2023 FORUM, 2023, 490 : 3 - 19
  • [8] A Model-driven Approach to Representing and Checking RBAC Contextual Policies
    Ben Fadhel, Ameni
    Bianculli, Domenico
    Briand, Lionel
    Hourte, Benjamin
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 243 - 253
  • [9] A security model for an operating system for security-critical applications in small office and home environment
    Janacek, Jaroslav
    [J]. Communications - Scientific Letters of the University of Žilina, 2009, 11 (03):
  • [10] A usability model for mobile applications generated with a model-driven approach
    Ammar, Lassaad Ben
    [J]. International Journal of Advanced Computer Science and Applications, 2019, 10 (02): : 140 - 146