Formal specification and verification of resource bound security using PVS

被引:0
|
作者
Yu, WJ [1 ]
Mok, AK [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Austin, TX 78712 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Resource usage abuse is a major security concern for computer systems that run programs uploaded from other computers. In the absence of any guarantee on resource usage bounds, we cannot have any confidence that the external codes have been supplied by trustworthy computers or the codes have not been tempered with by a third party. In a previous report [1], we described the TINMAN security architecture and a tool set for enforcing resource safety of external C code. In this paper, we detail the formalization of resource specification and verification of the resource safety properties. This formal framework is based on an extended Hoare logic with resource usage variables. We formalize the construct (tasks) and resource safety assertions (resource specifications) in a proof system that is built on the PVS theorem prover. We also discuss the proof strategies for different types of resource usage verification tasks that are important for the mechanization of TINMAN.
引用
下载
收藏
页码:113 / 133
页数:21
相关论文
共 50 条
  • [21] Formal Specification and Verification of CRDTs
    Zeller, Peter
    Bieniusa, Annette
    Poetzsch-Heffter, Arnd
    FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, 2014, 8461 : 33 - 48
  • [22] FORMAL FOUNDATION FOR SPECIFICATION AND VERIFICATION
    LAMPORT, L
    SCHNEIDER, FB
    LECTURE NOTES IN COMPUTER SCIENCE, 1985, 190 : 203 - 285
  • [23] Security specification and verification
    Fenkam, P
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 434 - 434
  • [24] Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
    Huang, Hejiao
    Kirchner, Helene
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 852 - 865
  • [25] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [26] Formal Specification of Multi-Window User Interface in PVS
    Singh, Kalyani
    Auernheimer, Brent
    HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I, 2016, 617 : 144 - 149
  • [27] Towards Formal Verification of Business Process using a Graphical Specification
    El Hichami, Outman
    El Mohajir, Badr Eddine
    Al Achhab, Mohammed
    Berrada, Ismail
    Oucheikh, Rachid
    2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, : 12 - 17
  • [28] Formal Specification and Verification of CSMA/CD Protocol Using Z
    Shukur, Zarina
    Alias, Nursyahidah
    Idrus, Bahari
    Halip, Mohd Hazali Mohamed
    JURNAL KEJURUTERAAN, 2009, 21 : 85 - 96
  • [29] Web Service Choreography Verification Using Z Formal Specification
    Rastegari, Y.
    Sajadi, Z.
    Shams, F.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2016, 29 (11): : 1549 - 1557
  • [30] FORMAL SPECIFICATION AND VERIFICATION OF MICROPROCESSOR SYSTEMS
    JOYCE, JJ
    MICROPROCESSING AND MICROPROGRAMMING, 1988, 24 (1-5): : 371 - 378