Model Checking the Information Flow Security of Real-Time Systems

被引:12
作者
Gerking, Christopher [1 ]
Schubert, David [2 ]
Bodden, Eric [1 ,2 ]
机构
[1] Paderborn Univ, Heinz Nixdorf Inst, Paderborn, Germany
[2] Fraunhofer IEM, Paderborn, Germany
来源
ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018 | 2018年 / 10953卷
关键词
Model checking; Information flow; Security; Real time; CYBER-PHYSICAL SYSTEMS; NONINTERFERENCE; ALGORITHMS; AUTOMATA;
D O I
10.1007/978-3-319-94496-8_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems are processing large amounts of sensitive information, but are increasingly often becoming the target of cyber attacks. Thus, it is essential to verify the absence of unauthorized information flow at design time before the systems get deployed. Our paper addresses this problem by proposing a novel approach to model-check the information flow security of cyber-physical systems represented by timed automata. We describe the transformation into so-called test automata, reducing the verification to a reachability test that is carried out using the off-the-shelf model checker Uppaal. Opposed to related work, we analyze the real-time behavior of systems, allowing software engineers to precisely identify timing channels that would enable attackers to draw conclusions from the system's response times. We illustrate the approach by detecting a timing channel in a simplified model of a cyber-manufacturing system.
引用
收藏
页码:27 / 43
页数:17
相关论文
共 45 条
[31]   Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach [J].
Kashyap, Vineeth ;
Wiedermann, Ben ;
Hardekopf, Ben .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :413-428
[32]  
Köpf B, 2006, LECT NOTES COMPUT SC, V4189, P243
[33]  
Lanotte R, 2001, ELECT NOTES THEOR CO, V52, P295
[34]   Time and Probability-Based Information Flow Analysis [J].
Lanotte, Ruggero ;
Maggiolo-Schettini, Andrea ;
Troina, Angelo .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (05) :719-734
[35]  
Lee EA, 2010, DES AUT CON, P737
[36]   Model-based security engineering for cyber-physical systems: A systematic mapping study [J].
Nguyen, Phu H. ;
Ali, Shaukat ;
Yue, Tao .
INFORMATION AND SOFTWARE TECHNOLOGY, 2017, 83 :116-135
[37]   Designed-in Security for Cyber-Physical Systems [J].
Peisert, Sean ;
Margulies, Jonathan ;
Nicol, David M. ;
Khurana, Himanshu ;
Sawall, Chris .
IEEE SECURITY & PRIVACY, 2014, 12 (05) :9-12
[38]   Timing-Sensitive Noninterference through Composition [J].
Rafnsson, Willard ;
Jia, Limin ;
Bauer, Lujo .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :3-25
[39]   Checking noninterference in Timed CSP [J].
Roscoe, A. W. ;
Huang, Jian .
FORMAL ASPECTS OF COMPUTING, 2013, 25 (01) :3-35
[40]   Language-based information-flow security [J].
Sabelfeld, A ;
Myers, AC .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) :5-19