Towards Model-Checking Security of Real-Time Java']Java Software

被引:5
作者
Spalazzi, Luca [1 ]
Spegni, Francesco [1 ]
Liva, Giovanni [2 ]
Pinzger, Martin [2 ]
机构
[1] Univ Politecn Marche Ancona, Dipartimento Ingn Informaz, Ancona, Italy
[2] Alpen Adria Univ Klagenfurt, Software Engn Res Grp, Klagenfurt, Austria
来源
PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS) | 2018年
关键词
model checking; security; formal verification; high performance computing;
D O I
10.1109/HPCS.2018.00106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
More and more software libraries and applications in high-performance computing and distributed systems are coded using the Java programming language. The correctness of such pieces of code w.r.t. a given set of security policies often depends on the correct handling of timing between concurrent or recurrent events. Model-checking has proven to be an effective tool for verifying the correctness of software. In spite of the growing importance of this application area of formal methods, though, no approach exists that targets the problem of verifying the correctness of real-time software w.r.t. timed specifications. The few existing works focus on very different problems, such as schedulability analysis of Java tasks. In this paper we present an approach combining rule-based static analysis together with symbolic execution of Java code to extract networks of timed automata from existing software and then use Uppaal to model-check them against timed specifications. We show through a real-world case study that this approach can be helpful in model-checking security policies of real-time Java software.
引用
收藏
页码:642 / 649
页数:8
相关论文
共 18 条
[1]  
[Anonymous], 2000, International Journal on Software Tools for Technology Transfer
[2]   The software model checker BlastApplications to software engineering [J].
Dirk Beyer ;
Thomas A. Henzinger ;
Ranjit Jhala ;
Rupak Majumdar .
International Journal on Software Tools for Technology Transfer, 2007, 9 (5-6) :505-525
[3]   Hyperproperties [J].
Clarkson, Michael ;
Schneider, Fred .
JOURNAL OF COMPUTER SECURITY, 2010, 18 (06) :1157-1210
[4]  
Corbett J. C., 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium, P439, DOI 10.1109/ICSE.2000.870434
[5]   Z3: An efficient SMT solver [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 :337-340
[6]  
Dierks H, 2007, LECT NOTES COMPUT SC, V4763, P114
[7]  
EKANAYAKE Saliya, 2016, P 24 HIGH PERF COMP, P3
[8]  
Godefroid P., 1997, Conference Record of POPL '97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, P174, DOI 10.1145/263699.263717
[9]  
Herber P., 2008, P 6 IEEE ACM IFIP IN, P131, DOI DOI 10.1145/1450135.1450166
[10]   Accuracy of Message Counting Abstraction in Fault-Tolerant Distributed Algorithms [J].
Konnov, Igor ;
Widder, Josef ;
Spegni, Francesco ;
Spalazzi, Luca .
VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2017, 2017, 10145 :347-366