A model checking-based approach for security policy verification of mobile systems

被引:13
|
作者
Braghin, Chiara [1 ]
Sharygina, Natasha [2 ]
Barone-Adesi, Katerina [2 ]
机构
[1] Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, Italy
[2] Univ Svizzera Italiana, Fac Informat, Lugano, Switzerland
关键词
Software verification; Program security and safety; Mobile systems; Security policies; Access control; Information flow; SLAM;
D O I
10.1007/s00165-010-0159-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.
引用
收藏
页码:627 / 648
页数:22
相关论文
共 41 条
  • [1] Parameterized model checking for security policy analysis
    Silvio Ranise
    Anh Truong
    Riccardo Traverso
    International Journal on Software Tools for Technology Transfer, 2016, 18 : 559 - 573
  • [2] Parameterized model checking for security policy analysis
    Ranise, Silvio
    Anh Truong
    Traverso, Riccardo
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2016, 18 (05) : 559 - 573
  • [3] Model checking for combined logics with an application to mobile systems
    Franceschet M.
    Montanari A.
    De Rijke M.
    Automated Software Engineering, 2004, 11 (3) : 289 - 321
  • [4] Security policy verification for multi-domains in cloud systems
    Gouglidis, Antonios
    Mavridis, Ioannis
    Hu, Vincent C.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 97 - 111
  • [5] Spatiotemporal model checking of location and mobility related security policy specifications
    Unal, Devrim
    Caglayan, Mehmet Ufuk
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2013, 21 (01) : 144 - 173
  • [6] A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures
    Kotenko, Igor
    Saenko, Igor
    Levshun, Dmitry
    PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19), 2020, 1156 : 165 - 175
  • [7] Dynamic security framework for mobile agent systems: Specification, verification and enforcement
    Loulou, Monia
    Jmaiel, Mohamed
    Mosbah, Mohamed
    International Journal of Information and Computer Security, 2009, 3 (3-4) : 321 - 336
  • [8] Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus
    Unal, Devrim
    Akar, Ozan
    Caglayan, M. Ufuk
    COMPUTER NETWORK SECURITY, 2010, 6258 : 155 - 168
  • [9] Model Checking the Information Flow Security of Real-Time Systems
    Gerking, Christopher
    Schubert, David
    Bodden, Eric
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 27 - 43
  • [10] A Practical Approach to Verification of Mobile Systems Using Net Unfoldings
    Meyer, Roland
    Khomenko, Victor
    Strazny, Tim
    FUNDAMENTA INFORMATICAE, 2009, 94 (3-4) : 439 - 471