A verification approach to applied system security

  title={A verification approach to applied system security},
  author={Achim D. Brucker and Burkhart Wolff},
  journal={International Journal on Software Tools for Technology Transfer},
  • Achim D. BruckerB. Wolff
  • Published 1 June 2005
  • Computer Science
  • International Journal on Software Tools for Technology Transfer
We present a method for the security analysis of realistic models over off-the-shelf systems and their configuration by formal, machine-checked proofs. The presentation follows a large case study based on a formal security analysis of a CVS-Server architecture.The analysis is based on an abstract architecture (enforcing a role-based access control), which is refined to an implementation architecture (based on the usual discretionary access control provided by the POSIX environment). Both… 

Specifying and Verifying Hysteresis Signature System with HOL-Z

A case-study in using the data-oriented modeling language Z to formalize a security architecture for administering digital signatures and its architectural security requirements and provides formal machine-checked proofs of the correctness of the architecture with respect to its requirements.

A model transformation semantics and analysis methodology for SecureUML

A semantics for SecureUML is presented in terms of a model transformation to standard uml/ocl, used as part of an implementation of a tool chain ranging from front-end visual modeling tools over code-generators to the interactive theorem proving environment hol-ocl.

Formal firewall conformance testing: an application of test and proof techniques

A formal model of both stateless and stateful firewalls (packet filters), including NAT, is presented to which a specification‐based conformance test case generation approach is applied and a verified optimisation technique for this approach is presented.

A Formal Security Model for Verification of Automotive Embedded Applications

This work proposes a validation methodology that assists the design of such embedded systems, and is based on a Formal Security Model that mainly targets model checking and relies on the decoupling between system design and security issues whilst all are integrated in the same framework.

POUR PDF - copie

This report presents a first case study performed on a component of a real-world medical monitoring system written in Java and shows that a specific test generation tactic is more efficient than the generic procedure.

HOL-TestGen 1.0.0 User Guide

The approach is a specification-based unit test, which shows that Dijkstra’s Verdict is no longer true under all circumstances, and that it simply does not apply in practically important situations.

HOL-TestGen 1.8.0 User Guide

The approach is a specification-based unit test, which shows that Dijkstra’s Verdict is no longer true under all circumstances, and that it simply does not apply in practically important situations.

Introductory paper

  • T. ArtsJ. V. D. Pol
  • Computer Science
    International Journal on Software Tools for Technology Transfer
  • 2005
This special section of STTT on Formal Methods for Industrial Critical Systems is named after the ERCIM working group FMICS and contains the mature full versions of the best papers from the 8th international E RCIM workshop on formal methods for industrial critical systems, held in June 2003.

Recent advances in interactive and automated analysis

  • Radu Mateescu
  • Computer Science
    International Journal on Software Tools for Technology Transfer
  • 2017
This work discusses some recent advances in the field of formal methods equipped with powerful and versatile analysis tools, and introduces five papers selected from the 22th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2016).

on Software Tools for Technology Transfer ( STTT )

132, 131, 122]. Abstraction [182, 123, 40]. ACL2 [48]. action [77]. address [63]. Advancements [152]. advances [183]. AGATHA [129]. agent [163]. agent-based [163]. aggregation [29]. aided [142].



A CVS-Server Security Architecture — Concepts and Formal Analysis

The CVS-server is uses cvsauth, that provides protection of passwords and protection of some internal data of the CVS repository and the approach can be seen as a method to give a formal underpinning for the usually tricky business of system administrators.

HOL-Z 2.0: A Proof Environment for Z-Specifications

A new proof environment for the specification language Z is presented, integrating Z into a well-known and trusted theorem prover with advanced deduction technology such as higher-order rewriting, tableaux-based provers and arithmetic decision procedures.

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state

Confidentiality-Preserving Refinement is Compositional - Sometimes

It turns out that the refinement relation is not composition in general, but the condition for compositionality can be stated in a way that builds on the analysis of subsystems thus aiding system designers in analyzing a composition.

Role-Based Access Control Models

Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.

An Introduction to Software Architecture

  • D. GarlanM. Shaw
  • Computer Science
    Advances in Software Engineering and Knowledge Engineering
  • 1993
This paper provides an introduction to the emerging field of software architecture by considering a number of common architectural styles upon which many systems are currently based and showing how different styles can be combined in a single design.

Isabelle/HOL: A Proof Assistant for Higher-Order Logic

This presentation discusses Functional Programming in HOL, which aims to provide students with an understanding of the programming language through the lens of Haskell.

The Theory and Practice of Concurrency

This book provides a detailed foundation for working with CSP, using as little mathematics as possible, and introduces the ideas behind operational, denotational and algebraic models of CSP.

Using Z - specification, refinement, and proof

The book discusses data Refinement, Relaxing and Unwinding Data Refinement and Z, and the importance of Equality and Definite Description in the application of data refinement.

Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned

The goal of the experiment is to demonstrate how group hierarchies and decentralized user-group assignment can be implemented by means of Unix setgid programs, and to implement previously published models.