A model checking-based approach for security policy verification of mobile systems

被引:13
|
作者
Braghin, Chiara [1 ]
Sharygina, Natasha [2 ]
Barone-Adesi, Katerina [2 ]
机构
[1] Univ Milan, Dipartimento Tecnol Informaz, I-26013 Crema, Italy
[2] Univ Svizzera Italiana, Fac Informat, Lugano, Switzerland
关键词
Software verification; Program security and safety; Mobile systems; Security policies; Access control; Information flow; SLAM;
D O I
10.1007/s00165-010-0159-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.
引用
收藏
页码:627 / 648
页数:22
相关论文
共 41 条
  • [31] A Formal Model-Based Approach to Engineering Systems-of-Systems
    Fitzgerald, John
    Bryans, Jeremy
    Payne, Richard
    COLLABORATIVE NETWORKS IN THE INTERNET OF SERVICES, 2012, 380 : 53 - 62
  • [32] Model-checking trace-based information flow properties for infinite-state systems
    D'Souza, Deepak
    Raghavendra, K. R.
    JOURNAL OF COMPUTER SECURITY, 2016, 24 (05) : 617 - 643
  • [33] A Language-based Approach to Analysing Flow Security Properties in Virtualised Computing Systems
    Mu, Chunyan
    2020 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2020), 2020, : 185 - 192
  • [34] An Automated Software Verification Tool for Model-based Development of Embedded Systems with Simulink®
    Boercsoek, Josef
    Chaaban, Walid
    Schwarz, Michael
    Sheng, Huiyun
    Sheleh, Oleksandr
    Batchuluun, Batsuren
    2009 XXII INTERNATIONAL SYMPOSIUM ON INFORMATION, COMMUNICATION AND AUTOMATION TECHNOLOGIES, 2009, : 45 - 50
  • [35] A formal role-based access control model for security policies in multi-domain mobile networks
    Unal, D.
    Caglayan, M. U.
    COMPUTER NETWORKS, 2013, 57 (01) : 330 - 350
  • [36] An integrated holistic model for an eHealth system: A national implementation approach and a new cloud-based security model
    Al-Sharhan, Salah
    Omran, Esraa
    Lari, Kamran
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2019, 47 : 121 - 130
  • [37] Advancing Interoperable IoT-Based Access Control Systems: A Unified Security Approach in Diverse Environments
    Penica, Mihai
    Bhattacharya, Mangolika
    O'Brien, William
    Mcgrath, Sean
    Hayes, Martin
    O'Connell, Eoin
    IEEE ACCESS, 2025, 13 : 27767 - 27782
  • [38] An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems
    Heydari, Mohammad
    Sadough, Seyed Mohammad Sajad
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Mahmood, Khalid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (12) : 14225 - 14245
  • [39] Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems
    Saxena, Urvashi Rahul
    Alam, Taj
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2023, 17 (04) : 239 - 257
  • [40] A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach
    Figueroa-Lorenzo, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    SENSORS, 2019, 19 (20)