A Formal Approach to Design and Security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model

被引:4
作者
Qian, Zhenjiang [1 ]
Zhong, Shan [1 ]
Sun, Gaofei [1 ]
Xing, Xiaoshuang [1 ]
Jin, Yong [1 ]
机构
[1] Changshu Inst Technol, Sch Comp Sci & Engn, Suzhou 215500, Peoples R China
关键词
Security; Memory management; Kernel; Semantics; Task analysis; Codes; Model checking; Formal methods; intelligent transportation systems (ITSs); object model; operating system (OS); configuration security; CONCURRENT; PRIVACY; VCC;
D O I
10.1109/TITS.2022.3224385
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Operating system in intelligent transportation systems (ITSs) is a complex software system whose correctness and security are not obvious. There are advances in formal description and verification of operating systems in ITSs recently and they mainly focus on bottom-up proofs in which the source codes satisfy certain expected properties expressed by logic formulae. In this paper, we propose a layered object model for operating systems in ITSs. This model includes functionality layer, refinement layer and concrete layer. We consider the operating system object model as a logic system ( $L)$ with variables representing the objects of $L$ , and a series of logic formulae for security and functional configurations in security of ITSs. We establish a mathematical structure as a domain of discourse for operating system in ITSs and accordingly, construct a mapping from operating system objects to the domain. In this way, we propose a formal method to verify the operating system security properties and configurations in ITSs. We use the virtual memory management part of our self-designed operating system VSOS as an example to illustrate the model and show that the claimed security properties can be rigorously proven for ITSs. The evaluation and verification of VSOS indicate that the proposed model implementation is feasible and achieves the security goals.
引用
收藏
页码:15459 / 15467
页数:9
相关论文
共 40 条
[1]   Applying Model Checking to Industrial-Sized PLC Programs [J].
Adiego, Borja Fernandez ;
Darvas, Daniel ;
Vinuela, Enrique Blanco ;
Tournier, Jean-Charles ;
Bliudze, Simon ;
Blech, Jan Olaf ;
Gonzalez Suarez, Victor Manuel .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) :1400-1410
[2]  
Bevier, 1987, 11 COMP LOG INC
[3]   Automatic Inference of Finite-State Plant Models From Traces and Temporal Properties [J].
Buzhinsky, Igor ;
Vyatkin, Valeriy .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :1521-1530
[4]   Static Detection of Packet Injection Vulnerabilities - A Case for Identifying Attacker-controlled Implicit Information Leaks [J].
Chen, Qi Alfred ;
Qian, Zhiyun ;
Jia, Yunhan Jack ;
Shao, Yuru ;
Mao, Z. Morley .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :388-400
[5]  
Cohen E, 2009, LECT NOTES COMPUT SC, V5674, P23, DOI 10.1007/978-3-642-03359-9_2
[6]   VCC: Contract-based Modular Verification of Concurrent C [J].
Dahlweid, Markus ;
Moskal, Michal ;
Santen, Thomas ;
Tobies, Stephan ;
Schulte, Wolfram .
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, :429-+
[7]   From L3 to seL4 What Have We Learnt in 20 Years of L4 Microkernels? [J].
Elphinstone, Kevin ;
Heiser, Gernot .
SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2013, :133-150
[8]   Preserving Privacy in the Internet of Connected Vehicles [J].
Ghane, Soheila ;
Jolfaei, Alireza ;
Kulik, Lars ;
Ramamohanarao, Kotagiri ;
Puthal, Deepak .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (08) :5018-5027
[9]  
GNU, COYOT WEBS
[10]   Building Certified Concurrent OS Kernels [J].
Gu, Ronghui ;
Shao, Zhong ;
Chen, Hao ;
Kim, Jieung ;
Koenig, Jeremie ;
Wu, Xiongnan ;
Sjoberg, Vilhelm ;
Costanzo, David .
COMMUNICATIONS OF THE ACM, 2019, 62 (10) :89-99