Formal specification and verification of resource bound security using PVS

被引:0
|
作者
Yu, WJ [1 ]
Mok, AK [1 ]
机构
[1] Univ Texas, Dept Comp Sci, Austin, TX 78712 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Resource usage abuse is a major security concern for computer systems that run programs uploaded from other computers. In the absence of any guarantee on resource usage bounds, we cannot have any confidence that the external codes have been supplied by trustworthy computers or the codes have not been tempered with by a third party. In a previous report [1], we described the TINMAN security architecture and a tool set for enforcing resource safety of external C code. In this paper, we detail the formalization of resource specification and verification of the resource safety properties. This formal framework is based on an extended Hoare logic with resource usage variables. We formalize the construct (tasks) and resource safety assertions (resource specifications) in a proof system that is built on the PVS theorem prover. We also discuss the proof strategies for different types of resource usage verification tasks that are important for the mechanization of TINMAN.
引用
收藏
页码:113 / 133
页数:21
相关论文
共 50 条
  • [41] FORMAL SPECIFICATION OF SECURITY REQUIREMENTS USING THE THEORY OF NORMATIVE POSITIONS
    JONES, AJI
    SERGOT, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 103 - 121
  • [42] Security Protocol For Distributed Networks using Formal Method Specification
    Nandewal, Arun
    Mahendra, Deepesh
    Chandrasekaran, K.
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [43] Formal verification of security model using SPR tool
    Kim, Il-Gon
    Kang, Miyoung
    Choi, Jin-Young
    Zegzhda, Peter D.
    Kalinin, Maxim O.
    Zegzhda, Dmitry P.
    Kang, Inhye
    COMPUTING AND INFORMATICS, 2006, 25 (05) : 353 - 368
  • [45] Formal Specification and Validation of Security Policies
    Bourdier, Tony
    Cirstea, Horatiu
    Jaume, Mathieu
    Kirchner, Helene
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 148 - +
  • [46] Formal specification and verification of a team formation protocol using TLA+
    Niyogi, Rajdeep
    Nath, Amar
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (06): : 961 - 984
  • [47] Formal specification and verification of the MISSI sender and local cache using SPIN
    Barjaktarovic, M
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 232 - 241
  • [48] A Survey of Smart Contract Formal Specification and Verification
    Tolmach, Palina
    Li, Yi
    Lin, Shang-Wei
    Liu, Yang
    Li, Zengxiang
    ACM COMPUTING SURVEYS, 2021, 54 (07)
  • [49] Formal Specification and Verification of Mobile Agent Systems
    Kahloul, L.
    Grira, M.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2014, 9 (03) : 292 - 304
  • [50] A formal specification for web services composition and verification
    Shi, YL
    Zhang, L
    Liu, B
    Liu, FF
    Lin, LL
    Shi, BL
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 252 - 256