Automated verification of security pattern compositions

被引:25
|
作者
Dong, Jing [1 ]
Peng, Tu [1 ]
Zhao, Yajing [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
关键词
Design pattern; Security; Logics; Process algebra; Model checking;
D O I
10.1016/j.infsof.2009.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software security becomes a critically important issue for software development when more and more malicious attacks explore the security holes in software systems. To avoid security problems, a large software system design may reuse good security solutions by applying security patterns. Security patterns document expert solutions to common security problems and capture best practices on secure software design and development. Although each security pattern describes a good design guideline, the compositions of these security patterns may be inconsistent and encounter problems and flaws. Therefore, the compositions of security patterns may be even insecure. In this paper, we present an approach to automated verification of the compositions of security patterns by model checking. We formally define the behavioral aspect of security patterns in CCS through their sequence diagrams. We also prove the faithfulness of the transformation from a sequence diagram to its CCS representation. In this way, the properties of the security patterns can be checked by a model checker when they are composed. Composition errors and problems can be discovered early in the design stage. We also use two case studies to illustrate our approach and show its capability to detect composition errors. (c) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:274 / 295
页数:22
相关论文
共 50 条
  • [41] Automated Compositional Verification
    Giannakopoulou, Dimitra
    Pasareanu, Corina S.
    IET SOFTWARE, 2010, 4 (03) : 179 - 180
  • [42] Security specification and verification
    Fenkam, P
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 434 - 434
  • [43] Verification of Security Protocols
    Cortier, Veronique
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
  • [44] The VALU3S ECSEL project: Verification and validation of automated systems safety and security
    Agirre J.A.
    Etxeberria L.
    Barbosa R.
    Basagiannis S.
    Giantamidis G.
    Bauer T.
    Ferrari E.
    Labayen Esnaola M.
    Orani V.
    Öberg J.
    Pereira D.
    Proença J.
    Schlick R.
    Smrčka A.
    Tiberti W.
    Tonetta S.
    Bozzano M.
    Yazici A.
    Sangchoolie B.
    Microprocessors and Microsystems, 2021, 87
  • [45] Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders
    Nigam, Vivek
    Talcott, Carolyn
    Urquiza, Abraao Aires
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 450 - 470
  • [46] The VALU3S ECSEL Project: Verification and Validation of Automated Systems Safety and Security
    Barbosa, R.
    Basagiannis, S.
    Giantamidis, G.
    Becker, H.
    Ferrari, E.
    Jahic, J.
    Kanak, A.
    Esnaola, M. Labayen
    Orani, V
    Pereira, D.
    Pomante, L.
    Schlick, R.
    Smrcka, A.
    Yazici, A.
    Folkesson, P.
    Sangchoolie, B.
    2020 23RD EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2020), 2020, : 352 - 359
  • [47] Enterprise security pattern: a new type of security pattern
    Moral-Garcia, Santiago
    Moral-Rubio, Santiago
    Rosado, David G.
    Fernandez, Eduardo B.
    Fernandez-Medina, Eduardo
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1670 - 1690
  • [48] Packing a binary pattern in compositions
    Freij, Ragnar
    Mansour, Toufik
    JOURNAL OF COMBINATORICS, 2011, 2 (01) : 111 - 137
  • [49] A Formal Language of Pattern Compositions
    Bayley, Ian
    Zhu, Hong
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCES ON PERVASIVE PATTERNS AND APPLICATIONS (PATTERNS 2010), 2010, : 1 - 6
  • [50] Security Enforcement on Web Services Compositions
    Boumlik, Laila
    Mejri, Mohamed
    2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 1010 - 1015