Apply Model Checking to Security Analysis in Trust Management

Author(s):  
Mark Reith ◽  
Jianwei Niu ◽  
William H. Winsborough
2007 ◽  
Author(s):  
Mark G. Reith ◽  
Jianwei Niu ◽  
William H. Winsborough

2021 ◽  
pp. 100004
Author(s):  
Zheng Fang ◽  
Hao Fu ◽  
Tianbo Gu ◽  
Zhiyun Qian ◽  
Trent Jaeger ◽  
...  

Author(s):  
Florian Kammüller ◽  
Christian W. Probst ◽  
Franco Raimondi

In this chapter, the authors give a short overview of the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular model checking. Based on prior experience with safety analysis—in particular the TWIN elevator (ThyssenKrupp) case study—the current case study ventures into the rising field of social engineering attacks on security. This main focus and original contribution of this chapter considers the security analysis of an insider attack illustrating the benefits of model checking with belief logics and actor system modeling.


First Monday ◽  
2006 ◽  
Author(s):  
Rohit Khare ◽  
Adam Rifkin

This paper is included in the First Monday Special Issue: Commercial Applications of the Internet, published in July 2006. For author reflections on this paper, visit the Special Issue. As once-proprietary mission-specific information systems migrate onto the Web, traditional security analysis cannot sufficiently protect each subsystem atomically. The Web encourages open, decentralized systems that span multiple administrative domains. Trust Management (TM) is an emerging framework for decentralizing security decisions that helps developers and others in asking "why" trust is granted rather than immediately focusing on "how" cryptography can enforce it. In this paper, we recap the basic elements of Trust Management: principles, principals, and policies. We present pragmatic details of Web-based TM technology for identifying principals, labeling resources, and enforcing policies. We sketch how TM might be integrated into Web applications for document authoring and distribution, content filtering, and mobile code security. Finally, we measure today's Web protocols, servers, and clients against this model, culminating in a call for stakeholders' support in bringing automatable TM to the Web.


2018 ◽  
Vol 17 ◽  
pp. 03026 ◽  
Author(s):  
Zhi Xu ◽  
Deming Zhong ◽  
Weigang Li ◽  
Hao Huang ◽  
And Yigang Sun

Software security is an important and challenging research topic in developing dynamic hybrid embedded software systems. Ensuring the correct behavior of these systems is particularly difficult due to the interactions between the continuous subsystem and the discrete subsystem. Currently available security analysis methods for system risks have been limited, as they rely on manual inspections of the individual subsystems under simplifying assumptions. To improve this situation, a new approach is proposed that is based on the symbolic model checking tool NuSMV. A dual PID system is used as an example system, for which the logical part and the computational part of the system are modeled in a unified manner. Constraints are constructed on the controlled object, and a counter-example path is ultimately generated, indicating that the hybrid system can be analyzed by the model checking tool.


2016 ◽  
Vol 60 ◽  
pp. 1-14 ◽  
Author(s):  
Nikolaos Alexiou ◽  
Stylianos Basagiannis ◽  
Sophia Petridou

Sign in / Sign up

Export Citation Format

Share Document