Formal Specification of Security Guidelines for Program Certification

被引:0
|
作者
Zhioua, Zeineb [1 ]
Roudier, Yves [2 ]
Ameur-Boulifa, Rabea [3 ]
机构
[1] EURECOM, Biot, France
[2] Univ Nice Sophia Antipolis, CNRS, I3S, UCA, Nice, France
[3] Univ Paris Saclay, Telecom ParisTech, LTCI, Paris, France
关键词
Security Guidelines; Security Best Practices; Program Certification; Information Flow Analysis; Model Checking; Labelled Transition Systems;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure software can be obtained out of two distinct processes: security by design, and security by certification. The former approach has been quite extensively formalized as it builds upon models, which are verified to ensure security properties are attained and from which software is then derived manually or automatically. In contrast, the latter approach has always been quite informal in both specifying security best practices and verifying that the code produced conforms to them. In this paper, we focus on the latter approach and describe how security guidelines might be captured by security experts and verified formally by developers. Our technique relies on abstracting actions in a program based on modularity, and on combining model checking together with information flow analysis. Our goal is to formalize the existing body of knowledge in security best practices using formulas in the MCL language and to conduct formal verifications of the conformance of programs with such security guidelines. We also discuss our first results in creating a methodology for the formalization of security guidelines.
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [21] Applying practical formal methods to the specification and analysis of security properties
    Heitmeyer, C
    INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 84 - 89
  • [22] FORMAL SPECIFICATION OF SECURITY REQUIREMENTS USING THE THEORY OF NORMATIVE POSITIONS
    JONES, AJI
    SERGOT, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 103 - 121
  • [23] Formal specification and verification of resource bound security using PVS
    Yu, WJ
    Mok, AK
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 113 - 133
  • [24] Towards a formal specification method for enterprise information system security
    Sengupta, Anirban
    Barik, Mridul Sankar
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 373 - +
  • [25] Formal specification and management of security policies with collective group obligations
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Elrakaiby, Yehia
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (01) : 149 - 190
  • [26] Security requirements specification by formal methods: a research metadata analysis
    Aditya Dev Mishra
    Khurram Mustafa
    Multimedia Tools and Applications, 2024, 83 : 41847 - 41866
  • [27] Security requirements specification by formal methods: a research metadata analysis
    Mishra, Aditya Dev
    Mustafa, Khurram
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 41847 - 41866
  • [28] Security Protocol For Distributed Networks using Formal Method Specification
    Nandewal, Arun
    Mahendra, Deepesh
    Chandrasekaran, K.
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [29] A Formal Security Framework for Mobile Agent Systems: Specification and Verification
    Loulou, Monia
    Kacem, Ahmed Hadj
    Mosbah, Mohamed
    Jmaiel, Mohamed
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 69 - 76
  • [30] First Results of a Formal Analysis of the Network Time Security Specification
    Teichel, Kristof
    Sibold, Dieter
    Milius, Stefan
    SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 218 - 245