Automated verification of security pattern compositions

被引:25
|
作者
Dong, Jing [1 ]
Peng, Tu [1 ]
Zhao, Yajing [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
Design pattern; Security; Logics; Process algebra; Model checking;
D O I
10.1016/j.infsof.2009.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security becomes a critically important issue for software development when more and more malicious attacks explore the security holes in software systems. To avoid security problems, a large software system design may reuse good security solutions by applying security patterns. Security patterns document expert solutions to common security problems and capture best practices on secure software design and development. Although each security pattern describes a good design guideline, the compositions of these security patterns may be inconsistent and encounter problems and flaws. Therefore, the compositions of security patterns may be even insecure. In this paper, we present an approach to automated verification of the compositions of security patterns by model checking. We formally define the behavioral aspect of security patterns in CCS through their sequence diagrams. We also prove the faithfulness of the transformation from a sequence diagram to its CCS representation. In this way, the properties of the security patterns can be checked by a model checker when they are composed. Composition errors and problems can be discovered early in the design stage. We also use two case studies to illustrate our approach and show its capability to detect composition errors. (c) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:274 / 295
页数:22
相关论文
共 50 条
  • [1] Model checking security pattern compositions
    Dong, Jing
    Peng, Tu
    Zhao, Yajing
    USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 80 - 89
  • [2] Automated Verification of Accountability in Security Protocols
    Kuennemann, Robert
    Esiyok, Ilkan
    Backes, Michael
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413
  • [3] Challenges in the automated verification of security protocols
    Comon-Lundh, Hubert
    AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
  • [4] Automated verification of selected equivalences for security protocols
    Blanchet, B
    Abadi, M
    Fournet, C
    LICS 2005: 20TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE - PROCEEDINGS, 2005, : 331 - 340
  • [5] Automated verification of UMLsec models for security requirements
    Jürjens, J
    Shabalin, P
    UML 2004 - THE UNIFIED MODELING LANGUAGE: MODELING LANGUAGES AND APPLICATIONS, PROCEEDINGS, 2004, 3273 : 365 - 379
  • [6] Automated verification of security policies in mobile code
    Braghin, Chiara
    Sharygina, Natasha
    Barone-Adesi, Katerina
    INTEGRATED FORMAL METHODS, PROCEEDINGS, 2007, 4591 : 37 - 53
  • [7] Automated verification of selected equivalences for security protocols
    Blanchet, Bruno
    Abadi, Martin
    Fournet, Cedric
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51
  • [8] Pattern-Based Design and Verification of Secure Service Compositions
    Pino, Luca
    Spanoudakis, George
    Krotsiani, Maria
    Mahbub, Khaled
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 515 - 528
  • [9] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [10] Fuzzing for Automated SoC Security Verification: Challenges and Solution
    Hossain, Muhammad Monir
    Azar, Kimia Zamiri
    Rahman, Fahim
    Farahmandi, Farimah
    Tehranipoor, Mark M.
    IEEE DESIGN & TEST, 2024, 41 (04) : 7 - 16