A security modeling and verification method of embedded software based on Z and MARTE

被引:8
作者
Hu, Xinwen [1 ]
Zhuang, Yi [1 ]
Zhang, Fuyuan [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, 29 Jiangjun Rd, Nanjing 211106, Jiangsu, Peoples R China
[2] Max Planck Inst Software Syst, Grp Pract Formal Methods, Paul Ehrlich Str G26, D-67663 Kaiserslautern, Germany
基金
中国国家自然科学基金;
关键词
Embedded software; Security; Z; UML/MARTE; Model Checking;
D O I
10.1016/j.cose.2019.101615
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing modeling and verification methods for embedded software are insufficient towards the increasingly prominent security requirements. In this paper, aiming at high security requirements of embedded software, a security modeling and verification framework of embedded software based on semiformal and formal methods is proposed. An extensible security model ZMsec (Z-MARTE security model), which extends Z with elements of MARTE (Modeling and Analysis of Real-Time and Embedded systems) and FSA (Finite State Automata), is presented to describe three dimensions of software: security usecases, static structures and dynamic behaviors. Further on, this paper designs ZMsecTL (ZMsecTemporal Logic) formulas to describe security properties, and proposes ZMCA (ZMsec Model Checking Algorithm), a security model checking algorithm on ZMsec model, to verify security properties in ZMsecTL formulas. In order to provide an intuitive state transition diagram for model checking, a depth-first ZMsecSD (ZMsecState Diagram) generation algorithm is designed. Drawing on the abstract framework, this paper develops a prototype implementation of ZMV (ZMsec Modeling and Verification tool), a tool for ZMsec integrated with modeling and verification phases. We finally discuss an embedded software example with ZMV, which illustrates and validates the security modeling and verification method proposed in this paper. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:22
相关论文
共 65 条
  • [1] Reconstructing a formal security model
    Ahn, GJ
    Hong, SP
    Shin, ME
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (11) : 649 - 657
  • [2] Amthor P., 2013, The 18th ACM Symposium, P137, DOI DOI 10.1145/2462410.2462413
  • [3] WorSE: A Workbench for Model-based Security Engineering
    Amthor, Peter
    Kuehnhauser, Winfried E.
    Poelck, Anja
    [J]. COMPUTERS & SECURITY, 2014, 42 : 40 - 55
  • [4] [Anonymous], [No title captured]
  • [5] [Anonymous], [No title captured]
  • [6] [Anonymous], [No title captured]
  • [7] [Anonymous], [No title captured]
  • [8] [Anonymous], [No title captured]
  • [9] [Anonymous], [No title captured]
  • [10] [Anonymous], [No title captured]