An Automatically Verified Prototype of the Tokeneer ID Station Specification

被引:7
作者
Cristia, Maximiliano [1 ,2 ]
Rossi, Gianfranco [3 ]
机构
[1] Univ Nacl Rosario, Rosario, Argentina
[2] CIFASIS, Rosario, Argentina
[3] Univ Parma, Parma, Italy
关键词
Tokeneer ID Station specification; Z notation; {log}; Constraint programming; Prototyping; Automated verification; Automated proof; FORMAL VERIFICATION;
D O I
10.1007/s10817-021-09602-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Tokeneer project was an initiative set forth by the National Security Agency (NSA, USA) to be used as a demonstration that developing highly secure systems can be made by applying rigorous methods in a cost-effective manner. Altran UK was selected by NSA to carry out the development of the Tokeneer ID Station. The company wrote a Z specification later implemented in the SPARK Ada programming language, which was verified using the SPARK Examiner toolset. In this paper, we show that the Z specification can be readily and naturally encoded in the {log} set constraint language, thereby generating a functional prototype. Furthermore, we show that {log}'s automated proving capabilities can discharge all the proof obligations concerning state invariants as well as important security properties. As a consequence, the prototype can be regarded as correct with respect to the verified properties. This provides empirical evidence that Z users can use {log} to generate correct prototypes from their Z specifications. In turn, these prototypes enable or simplify some verification activities discussed in the paper.
引用
收藏
页码:1125 / 1151
页数:27
相关论文
共 50 条
[1]  
Abdelhalim I, 2010, LECT NOTES COMPUT SC, V6447, P371, DOI 10.1007/978-3-642-16901-4_25
[2]  
Altran UK, 2008, TOK SOFTW PROJ DOC
[3]  
[Anonymous], 2017, COMM CRIT INF TECHN
[4]  
[Anonymous], 2011, MICROSOFT RES VERIFI
[5]  
Barnes J., 2006, 1 IEEE INT S SEC SOF
[6]  
Barnes J., 2008, TOKENEER ID STATION
[7]  
Barnes J.E., 2011, Electron. Commun. Eur. Assoc. Softw. Sci. Technol., V46
[8]   Formal Analysis of Android's Permission-Based Security Model [J].
Betarte, Gustavo ;
Campo, Juan ;
Luna, Carlos ;
Romano, Agustin .
SCIENTIFIC ANNALS OF COMPUTER SCIENCE, 2016, 26 (01) :27-68
[9]  
Bowen J.P., 1994, Z US WORKSH CAMBR UK, P267
[10]  
Cooper D., 2008, TOKENEER ID STATION