Undertaking the Tokeneer Challenge in Event-B

被引:0
|
作者
Rivera, Victor [1 ]
Bhattacharya, Sukriti [2 ]
Catano, Nestor [1 ]
机构
[1] Innopolis Univ, Innopolis, Russia
[2] UCL, London, England
关键词
Event-B; EventB2[!text type='Java']Java[!/text; !text type='Java']Java[!/text; JUnit Testing; Safety Critical Systems; Tokeneer;
D O I
10.1145/2897667.2897671
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper describes a case study on the use of a formal methods tool for checking security properties of Tokeneer, a U. S. National Security Agency (NSA) project developed by Praxis, and released in 2008. We modelled Tokeneer as a series of abstract mathematical models related re fi nement steps in Event-B. We used the Rodin toolset for modelling Tokeneer in Event-B and for discharging associated proof obligations, and we used the EventB2Java code generator to generate Java code for the Event-B model of Tokeneer. After that, we wrote a series of JUnit tests to validate if the Java implementation of Tokeneer adhered to the security properties of Tokeneer described in the documentation provided by Praxis. To the best of our knowledge, modelling Tokeneer in Event-B and checking that its implementation adheres to those security properties is something that hasn't been attempted before.
引用
收藏
页码:8 / 14
页数:7
相关论文
共 50 条
  • [11] Decomposition tool for Event-B
    Silva, Renato
    Pascal, Carine
    Thai Son Hoang
    Butler, Michael
    SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (02): : 199 - 208
  • [12] Decomposition Structures for Event-B
    Butler, Michael
    INTEGRATED FORMAL METHODS, PROCEEDINGS, 2009, 5423 : 20 - 38
  • [13] Loose Observation in Event-B
    Hallerstede, Stefan
    RIGOROUS STATE-BASED METHODS, ABZ 2024, 2024, 14759 : 105 - 122
  • [14] Code Generation for Event-B
    Furst, Andreas
    Hoang, Thai Son
    Basin, David
    Desai, Krishnaji
    Sato, Naoto
    Miyazaki, Kunihiko
    INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 323 - 338
  • [15] Code generation for Event-B
    Víctor Rivera
    Néstor Cataño
    Tim Wahls
    Camilo Rueda
    International Journal on Software Tools for Technology Transfer, 2017, 19 : 31 - 52
  • [16] Refinement for Pipelining in Event-B
    Evans, Neil
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 214 : 183 - 202
  • [17] Enabling analysis for Event-B
    Dobrikov, Ivaylo
    Leuschel, Michael
    SCIENCE OF COMPUTER PROGRAMMING, 2018, 158 : 81 - 99
  • [18] Trace preservation in B and Event-B refinements
    Stock, Sebastian
    Mashkoor, Atif
    Leuschel, Michael
    Egyed, Alexander
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2024, 137
  • [19] Proving Quicksort Correct in Event-B
    Hallerstede, Stefan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 259 : 47 - 65
  • [20] Modeling of TCP Protocol in Event-B
    Wang, Xue-Jing
    Zhang, Hong
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1156 - 1159