Automated verification of security pattern compositions

被引:25
|
作者
Dong, Jing [1 ]
Peng, Tu [1 ]
Zhao, Yajing [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
Design pattern; Security; Logics; Process algebra; Model checking;
D O I
10.1016/j.infsof.2009.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security becomes a critically important issue for software development when more and more malicious attacks explore the security holes in software systems. To avoid security problems, a large software system design may reuse good security solutions by applying security patterns. Security patterns document expert solutions to common security problems and capture best practices on secure software design and development. Although each security pattern describes a good design guideline, the compositions of these security patterns may be inconsistent and encounter problems and flaws. Therefore, the compositions of security patterns may be even insecure. In this paper, we present an approach to automated verification of the compositions of security patterns by model checking. We formally define the behavioral aspect of security patterns in CCS through their sequence diagrams. We also prove the faithfulness of the transformation from a sequence diagram to its CCS representation. In this way, the properties of the security patterns can be checked by a model checker when they are composed. Composition errors and problems can be discovered early in the design stage. We also use two case studies to illustrate our approach and show its capability to detect composition errors. (c) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:274 / 295
页数:22
相关论文
共 50 条
  • [31] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
    Computing Department, Open University, United Kingdom
    Electron. Notes Theor. Comput. Sci., 1 (123-136):
  • [32] Automated verification of wireless security protocols using layered proving trees
    Data Communication Security Laboratory, University of Limerick, Limerick, Ireland
    WSEAS Trans. Commun., 2006, 2 (252-258):
  • [33] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
    Jurjens, Jan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 250 (01) : 123 - 136
  • [34] Automated Verification of Pattern-Based Interaction Invariants in Ajax Applications
    Maezawa, Yuta
    Washizaki, Hironori
    Tanabe, Yoshinori
    Honiden, Shinichi
    2013 28TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2013, : 158 - 168
  • [35] Isadora: automated information-flow property generation for hardware security verification
    Deutschbein, Calvin
    Meza, Andres
    Restuccia, Francesco
    Kastner, Ryan
    Sturton, Cynthia
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (04) : 391 - 407
  • [36] Isadora: automated information-flow property generation for hardware security verification
    Calvin Deutschbein
    Andres Meza
    Francesco Restuccia
    Ryan Kastner
    Cynthia Sturton
    Journal of Cryptographic Engineering, 2023, 13 : 391 - 407
  • [37] VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering
    Richter-Brockmann J.
    Feldtkeller J.
    Sasdrich P.
    Güneysu T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 255 - 284
  • [38] Commutativity in Automated Verification
    Farzan, Azadeh
    2023 38TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, LICS, 2023,
  • [39] Automated Hypersafety Verification
    Farzan, Azadeh
    Vandikas, Anthony
    COMPUTER AIDED VERIFICATION, CAV 2019, PT I, 2019, 11561 : 200 - 218
  • [40] Automated Deduction for Verification
    Shankar, Natarajan
    ACM COMPUTING SURVEYS, 2009, 41 (04)