Automated verification of security pattern compositions

被引:25
|
作者
Dong, Jing [1 ]
Peng, Tu [1 ]
Zhao, Yajing [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
Design pattern; Security; Logics; Process algebra; Model checking;
D O I
10.1016/j.infsof.2009.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security becomes a critically important issue for software development when more and more malicious attacks explore the security holes in software systems. To avoid security problems, a large software system design may reuse good security solutions by applying security patterns. Security patterns document expert solutions to common security problems and capture best practices on secure software design and development. Although each security pattern describes a good design guideline, the compositions of these security patterns may be inconsistent and encounter problems and flaws. Therefore, the compositions of security patterns may be even insecure. In this paper, we present an approach to automated verification of the compositions of security patterns by model checking. We formally define the behavioral aspect of security patterns in CCS through their sequence diagrams. We also prove the faithfulness of the transformation from a sequence diagram to its CCS representation. In this way, the properties of the security patterns can be checked by a model checker when they are composed. Composition errors and problems can be discovered early in the design stage. We also use two case studies to illustrate our approach and show its capability to detect composition errors. (c) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:274 / 295
页数:22
相关论文
共 50 条
  • [11] Formal analysis and verification of security for automated trust negotiation
    Liu, Xin-Xin
    Tang, Shao-Hua
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2013, 41 (01): : 77 - 82
  • [12] Automated Verification of Timed Security Protocols with Clock Drift
    Li, Li
    Sun, Jun
    Dong, Jin Song
    FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530
  • [13] Experiments on the pattern recognition system for validation and security verification
    Javidi, B
    Zhang, GS
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES, 1996, 2659 : 136 - 140
  • [14] FORMAL VERIFICATION OF SECURITY PATTERN COMPOSITION: APPLICATION TO SCADA
    Obeid, Fadi
    Dhaussy, Philippe
    COMPUTING AND INFORMATICS, 2019, 38 (05) : 1149 - 1180
  • [15] A Framework for Network Security Verification of Automated Vehicles in the Agricultural Domain
    Gaggero, Giovanni Battista
    Fausto, Alessandro
    Patrone, Fabio
    Marchese, Mario
    PROCEEDINGS OF 26TH INTERNATIONAL CONFERENCE ELECTRONICS 2022, 2022,
  • [16] Combining ProVerif and Automated Theorem Provers for Security Protocol Verification
    Li, Di Long
    Tiu, Alwen
    AUTOMATED DEDUCTION, CADE 27, 2019, 11716 : 354 - 365
  • [17] POSTER: Towards Precise and Automated Verification of Security Protocols in Coq
    Palombo, Hernan M.
    Zheng, Hao
    Ligatti, Jay
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2567 - 2569
  • [18] AN INDUSTRIAL AND ACADEMIC JOINT EXPERIMENT ON AUTOMATED VERIFICATION OF A SECURITY PROTOCOL
    Heen, Olivier
    Genet, Thomas
    Geller, Stephane
    Prigent, Nicolas
    MOBILE AND WIRELESS NETWORKS SECURITY, PROCEEDINGS, 2008, : 39 - +
  • [19] Automated Verification Methodology of Security Events Based on Heuristic Analysis
    Song, Jungsuk
    Lee, Younsu
    Kim, Kyuil
    Kim, Seokhun
    Kim, SooKyun
    Choi, Sang-Soo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [20] An Approach for Verification of Secure Access Control Using Security Pattern
    Gupta, Charu
    Singh, Rakesh Kumar
    Mohapatra, Amar Kumar
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022