Formal Verification of Security Specifications with Common Criteria

被引:0
|
作者
Morimoto, Shoichi [1 ]
Shigematsu, Shinjiro [2 ]
Goto, Yuichi [2 ]
Cheng, Jingde [2 ]
机构
[1] Adv Inst Ind Technol, Sch Ind Technol, Shinagawa Ku, 1-10-40 Higashi Oi, Tokyo 1400011, Japan
[2] Saitama Univ, Dept Informat & Comp Sci, Sakura Ku, Saitama 3388570, Japan
关键词
ISO/IEC; 15408; Z notation; Theorem-proving;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes a formalization and verification technique for security specifications, based on common criteria. Generally, it is difficult to define reliable security properties that should be applied to validate an information system. Therefore, we have applied security functional requirements that are defined in the ISO/IEC 15408 common criteria to the formal verification of security specifications. We formalized the security criteria of ISO/IEC 15408 and developed a pro cess, using Z notation, for verifying security specifications. We also demonstrate some examples of the verification instances using the theorem prover Z/EVES. In the verification process, one can verify strictly whether specifications satisfy the security criteria defined in ISO/IEC 15408.
引用
下载
收藏
页码:1506 / +
页数:2
相关论文
共 50 条
  • [21] Towards automatic generation of formal specifications for CML consistency verification
    Sharbaf, Mohammadreza
    Zamani, Bahman
    Ladani, Behrouz Tork
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 860 - 865
  • [22] Formal verification of module interfaces against real time specifications
    Chakrabarti, A
    Dasgupta, P
    Chakrabarti, R
    Banerjee, A
    39TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2002, 2002, : 141 - 145
  • [23] Semi-formal specifications and formal verification improving the digital design: some statistics
    Torres, D.
    Cortez, J.
    Gonzalez, R. E.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2009, 7 (01) : 15 - 40
  • [24] Formal Verification of Security Protocols: ProVerif and Extensions
    Yao, Jiangyuan
    Xu, Chunxiang
    Li, Deshun
    Lin, Shengjun
    Cao, Xingcan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 500 - 512
  • [25] Formal Verification of the Security for Dual Connectivity in LTE
    Ben Henda, Noomene
    Norrman, Karl
    Pfeffer, Katharina
    2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING, 2015, : 13 - 19
  • [26] Formal Security Verification of Industry 4.0 Applications
    Nigam, Vivek
    Talcott, Carolyn
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 1043 - 1050
  • [27] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [28] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [29] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [30] Generating network security protocol implementations from formal specifications
    Tobler, B
    Hutchison, ACM
    Certification and Security in Inter-Organizational E-Services, 2005, 177 : 33 - 53