Design of Software Security Verification with Formal Method Tools

نویسندگان

  • Seung-Ju Jang
  • Jungwoo Ryoo
  • ChangYeol Lee
چکیده

Formal methods ensure the stability and reliability of soft-ware systems by using mathematical principles and proving conformance to a given set of requirements. The stable and reliable operation of software is especially important for system applications dealing with security. Although very effective in identifying a non-conformance in security requirements, formal methods typically involve a steep learning curve before full adoption. Automated tools can be used to alleviate difficulties associated with formal methods. An observation is made that the existing attempts to apply formal methods to check conformance to security requirements, have not efficiently taken advantage of such tools. Therefore, this paper proposes a novel methodology to leverage well-known formal method tools to verify how closely a security software product satisfies its requirements. More specifically, this paper formally verifies an Access Control System (ACS) using RoZ and Z/EVES, two of the many verification tools available for ensuring the integrity of software applications. For this, a UML model of ACS with Z annotations is first created. Next, the model is transformed into a Z specification which is, in turn, verified by the Z/EVES prover. Using this process, one can also find security vulnerabilities created during a development process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

On Formal Specification of a Proof Tool

Tools and methods for the specification and design of computer systems are increasing in sophistication. Much current research and development is attempting to exploit this sophistication to improve the effectiveness of systems development practices. It is becoming feasible to offer much higher assurance than hitherto that systems meet critical requirements, e.g. concerning safety or security. ...

متن کامل

From goal-driven security requirements engineering to secure design

Security of intelligent software systems is an important area of research. Although security is traditionally considered a technical issue; security is in fact a two dimensional problem, which involves technical as well as social challenges. Goal-Driven Requirements Engineering (GDRE) has been proposed in the literature as a suitable paradigm for the analysis of security issues and elicitation ...

متن کامل

Tools for Traceable Security Verification

Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work towards addressing this challenge which focusses on one facet of dependability, namely data security: We give an overview on an approach for modelbased security verification which provides a traceability link to the implemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006