Model Checking the Information Flow Security of Real-Time Systems

被引:12
作者
Gerking, Christopher [1 ]
Schubert, David [2 ]
Bodden, Eric [1 ,2 ]
机构
[1] Paderborn Univ, Heinz Nixdorf Inst, Paderborn, Germany
[2] Fraunhofer IEM, Paderborn, Germany
来源
ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018 | 2018年 / 10953卷
关键词
Model checking; Information flow; Security; Real time; CYBER-PHYSICAL SYSTEMS; NONINTERFERENCE; ALGORITHMS; AUTOMATA;
D O I
10.1007/978-3-319-94496-8_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems are processing large amounts of sensitive information, but are increasingly often becoming the target of cyber attacks. Thus, it is essential to verify the absence of unauthorized information flow at design time before the systems get deployed. Our paper addresses this problem by proposing a novel approach to model-check the information flow security of cyber-physical systems represented by timed automata. We describe the transformation into so-called test automata, reducing the verification to a reachability test that is carried out using the off-the-shelf model checker Uppaal. Opposed to related work, we analyze the real-time behavior of systems, allowing software engineers to precisely identify timing channels that would enable attackers to draw conclusions from the system's response times. We illustrate the approach by detecting a timing channel in a simplified model of a cyber-manufacturing system.
引用
收藏
页码:27 / 43
页数:17
相关论文
共 45 条
[1]  
Aceto L, 1998, LECT NOTES COMPUT SC, V1384, P263, DOI 10.1007/BFb0054177
[2]  
Agat J., 2000, POPL 2000, p[40, 124], DOI [10.1007/978-3-540-27755-23, DOI 10.1007/978-3-540-27755-23]
[3]   Analysis of information flow security in cyber-physical systems [J].
Akella, Ravi ;
Tang, Han ;
McMillin, Bruce M. .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2010, 3 (3-4) :157-173
[4]   A THEORY OF TIMED AUTOMATA [J].
ALUR, R ;
DILL, DL .
THEORETICAL COMPUTER SCIENCE, 1994, 126 (02) :183-235
[5]   MODEL-CHECKING IN DENSE REAL-TIME [J].
ALUR, R ;
COURCOUBETIS, C ;
DILL, D .
INFORMATION AND COMPUTATION, 1993, 104 (01) :2-34
[6]  
Barbuti R, 2003, FUND INFORM, V54, P137
[7]   Secure information flow by self-composition [J].
Barthe, Gilles ;
D'Argenio, Pedro R. ;
Rezk, Tamara .
MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2011, 21 (06) :1207-1252
[8]   Control and synthesis of non-interferent timed systems [J].
Benattar, Gilles ;
Cassez, Franck ;
Lime, Didier ;
Roux, Olivier H. .
INTERNATIONAL JOURNAL OF CONTROL, 2015, 88 (02) :217-236
[9]  
Bengtsson J., 1996, Hybrid Systems III. Verification and Control, P232, DOI 10.1007/BFb0020949
[10]   Timed automata: Semantics, algorithms and tools [J].
Bengtsson, J ;
Yi, W .
LECTURES ON CONCURRENCY AND PETRI NETS: ADVANCES IN PETRI NETS, 2004, 3098 :87-124