A model checking-based approach for security policy verification of mobile systems

被引:13
|
作者
Braghin, Chiara [1 ]
Sharygina, Natasha [2 ]
Barone-Adesi, Katerina [2 ]
机构
[1] Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, Italy
[2] Univ Svizzera Italiana, Fac Informat, Lugano, Switzerland
关键词
Software verification; Program security and safety; Mobile systems; Security policies; Access control; Information flow; SLAM;
D O I
10.1007/s00165-010-0159-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.
引用
收藏
页码:627 / 648
页数:22
相关论文
共 41 条
  • [21] Verifying Security Requirements using Model Checking Technique for UML-Based Requirements Specification
    Aoki, Yoshitaka
    Matsuura, Saeko
    2014 IEEE 1ST INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND TESTING (RET), 2014, : 18 - 25
  • [22] A Novel RVFL-Based Algorithm Selection Approach for Software Model Checking
    Cao, Weipeng
    Wu, Yuhao
    Wang, Qiang
    Zhang, Jiyong
    Zhang, Xingjian
    Qiu, Meikang
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2022, PT III, 2022, 13370 : 414 - 425
  • [23] Towards Language Support for Model-based Security Policy Engineering
    Amthor, Peter
    Schlegel, Marius
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 513 - 521
  • [24] Policy-based access control model for mobile agent system
    Chen Xiao-su
    Lin Zhi
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1222 - 1225
  • [25] A new Chinese Wall Security Policy Model Based On the Subject's Wall and Object's Wall
    Fehis, Saad
    Nouali, Omar
    Kechadi, Tahar
    2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 90 - 95
  • [26] A mobile agent-based approach to building mobile systems for health care management
    Pour, G
    Mishra, A
    Mishra, L
    EEE '05: Proceedings of the 2005 International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, 2005, : 111 - 119
  • [27] An automated verification method for distributed systems software based on model extraction
    Holzmann, GJ
    Smith, MH
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (04) : 364 - 377
  • [28] A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data
    Gope, Prosanta
    Amin, Ruhul
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [29] A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data
    Prosanta Gope
    Ruhul Amin
    Journal of Medical Systems, 2016, 40
  • [30] Software Model Checking for Distributed Systems with Selector-Based, Non-blocking Communication
    Artho, Cyrille
    Hagiya, Masami
    Potter, Richard
    Tanabe, Yoshinori
    Weitl, Franz
    Yamamoto, Mitsuharu
    2013 28TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2013, : 169 - 179