首页 > 最新文献

2011 Fifth International Conference on Secure Software Integration and Reliability Improvement最新文献

英文 中文
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems 一种基于特征的混合门禁系统建模方法
Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, S. Park, Suntae Kim
Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) are widely used access control models. They are often used together in domains where both data integrity and information flow are concerned. There is much work on combined use of RBAC and MAC policies at the kernel level, which focuses on enforcing hybrid policies at run-time. However, there is little work on techniques for developing hybrid systems of RBAC and MAC from a development perspective. In this work, we present a feature-based modeling approach for developing hybrid access control systems. In the approach, RBAC and MAC are designed in terms of features and features are configured based on requirements. Configured features are then composed to produce a design model that supports hybrid access control. The approach enables systematic development of hybrid systems of RBAC and MAC and reduces development complexity and errors through need-based configuration of features in early development phases. We use a hospital system to demonstrate the approach. Tool support for the approach is also discussed.
基于角色的访问控制(RBAC)和强制访问控制(MAC)是目前应用最广泛的访问控制模型。它们经常在涉及数据完整性和信息流的领域中一起使用。有很多工作是关于在内核级别结合使用RBAC和MAC策略的,重点是在运行时执行混合策略。然而,从开发的角度对RBAC和MAC混合系统的开发技术研究很少。在这项工作中,我们提出了一种基于特征的建模方法来开发混合访问控制系统。在该方法中,RBAC和MAC是根据特性进行设计的,特性是根据需求进行配置的。然后组合已配置的特性以生成支持混合访问控制的设计模型。该方法实现了RBAC和MAC混合系统的系统开发,并通过在早期开发阶段基于需求的特性配置降低了开发的复杂性和错误。我们用一个医院系统来演示这种方法。对该方法的工具支持也进行了讨论。
{"title":"A Feature-Based Modeling Approach for Building Hybrid Access Control Systems","authors":"Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, S. Park, Suntae Kim","doi":"10.1109/SSIRI.2011.16","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.16","url":null,"abstract":"Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) are widely used access control models. They are often used together in domains where both data integrity and information flow are concerned. There is much work on combined use of RBAC and MAC policies at the kernel level, which focuses on enforcing hybrid policies at run-time. However, there is little work on techniques for developing hybrid systems of RBAC and MAC from a development perspective. In this work, we present a feature-based modeling approach for developing hybrid access control systems. In the approach, RBAC and MAC are designed in terms of features and features are configured based on requirements. Configured features are then composed to produce a design model that supports hybrid access control. The approach enables systematic development of hybrid systems of RBAC and MAC and reduces development complexity and errors through need-based configuration of features in early development phases. We use a hospital system to demonstrate the approach. Tool support for the approach is also discussed.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121002115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security Goals Assurance Based on Software Active Monitoring 基于软件主动监控的安全目标保证
Changzhi Zhao, Wei Dong, M. Leucker, Zhichang Qi
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinux). It is extremely difficult to verify the consistency between the security policies and the security goals desired by applications. In this paper, we present how to predict whether the information flow security goal is violated or not during runtime, how to generate the corresponding control actions on-line when divergence is detected and how to apply these actions in time based on software active monitoring technique. The symbolic security information flow model of SElinux is generated from a formalization of the access control mechanism which can be used to generate the N-step ahead projection of the future behavior. Information flow security goals are expressed in linear temporal logic (LTL) which provides clear description of the objectives desired by applications. Anticipatory monitor is generated from LTL formula automatically. We consider an on-line scheme where after the occurrence of an event, the next control action is determined on the basis of the N-step ahead projection of the future behavior. This procedure is repeated after the occurrence of next security relevant event. Thus, a closed-loop system is generated that all behavior sequences will satisfy the security goals.
访问控制是当今操作系统中重要的安全机制,规定与安全相关行为的安全策略冗长而复杂,例如在security - enhanced Linux (SELinux)中。验证安全策略与应用程序所需的安全目标之间的一致性是极其困难的。本文介绍了基于软件主动监测技术,如何在运行过程中预测信息流安全目标是否被违反,如何在检测到偏离时在线生成相应的控制动作,以及如何及时应用这些控制动作。SElinux的符号安全信息流模型是由访问控制机制的形式化生成的,该机制可用于生成未来行为的n步提前预测。信息流安全目标以线性时序逻辑(LTL)的形式表达,它提供了应用程序所需目标的清晰描述。预期监视器由LTL公式自动生成。我们考虑一种在线方案,其中在事件发生后,下一个控制动作是根据未来行为的n步前投影确定的。在下一个安全相关事件发生后,重复此过程。这样就形成了一个所有行为序列都满足安全目标的闭环系统。
{"title":"Security Goals Assurance Based on Software Active Monitoring","authors":"Changzhi Zhao, Wei Dong, M. Leucker, Zhichang Qi","doi":"10.1109/SSIRI.2011.34","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.34","url":null,"abstract":"Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinux). It is extremely difficult to verify the consistency between the security policies and the security goals desired by applications. In this paper, we present how to predict whether the information flow security goal is violated or not during runtime, how to generate the corresponding control actions on-line when divergence is detected and how to apply these actions in time based on software active monitoring technique. The symbolic security information flow model of SElinux is generated from a formalization of the access control mechanism which can be used to generate the N-step ahead projection of the future behavior. Information flow security goals are expressed in linear temporal logic (LTL) which provides clear description of the objectives desired by applications. Anticipatory monitor is generated from LTL formula automatically. We consider an on-line scheme where after the occurrence of an event, the next control action is determined on the basis of the N-step ahead projection of the future behavior. This procedure is repeated after the occurrence of next security relevant event. Thus, a closed-loop system is generated that all behavior sequences will satisfy the security goals.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123058902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Probabilistic Risk Assessment for Security Requirements: A Preliminary Study 安全需求的概率风险评估:初步研究
Seok-Won Lee
Risk assessment is a critical decision making process during the Security Certification and Accreditation (C&A) process. However, existing infrastructure-wide C&A processes in real world are challenged by the ever increasing complexity of information systems and their diverse socio-technical operational environments. The lack of an explicit model and the associated uncertainties of software behavior are two main reasons that directly impact the effectiveness of risk assessment as well as the subjective decisions made based on the different level of domain expertise. In this paper, we propose a method for a probabilistic model driven risk assessment on security requirements. The security requirements and their causal relationships are represented using MEBN (Multi-Entities Bayesian Networks) logic that constructs an explicit formal risk assessment model that supports evidence-driven arguments. The proposed approach is described by using real-world C&A scenarios to show not only its feasibility for security requirements risk assessment but also its effectiveness for the sensitivity analysis to identify critical influences among information entities in a complex and uncertain operational environment.
风险评估是安全认证与认可(C&A)过程中一个关键的决策过程。然而,现实世界中现有的基础设施范围内的C&A过程受到信息系统日益增加的复杂性及其多样化的社会技术操作环境的挑战。缺乏明确的模型和相关的软件行为的不确定性是直接影响风险评估有效性的两个主要原因,以及基于不同层次的领域专业知识做出的主观决策。本文提出了一种基于概率模型的安全需求风险评估方法。安全需求及其因果关系使用MEBN(多实体贝叶斯网络)逻辑表示,该逻辑构建了一个明确的形式化风险评估模型,支持证据驱动的论点。通过使用真实的C&A场景来描述所提出的方法,不仅表明其在安全需求风险评估方面的可行性,而且表明其在复杂和不确定的操作环境中识别信息实体之间关键影响的敏感性分析方面的有效性。
{"title":"Probabilistic Risk Assessment for Security Requirements: A Preliminary Study","authors":"Seok-Won Lee","doi":"10.1109/SSIRI.2011.12","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.12","url":null,"abstract":"Risk assessment is a critical decision making process during the Security Certification and Accreditation (C&A) process. However, existing infrastructure-wide C&A processes in real world are challenged by the ever increasing complexity of information systems and their diverse socio-technical operational environments. The lack of an explicit model and the associated uncertainties of software behavior are two main reasons that directly impact the effectiveness of risk assessment as well as the subjective decisions made based on the different level of domain expertise. In this paper, we propose a method for a probabilistic model driven risk assessment on security requirements. The security requirements and their causal relationships are represented using MEBN (Multi-Entities Bayesian Networks) logic that constructs an explicit formal risk assessment model that supports evidence-driven arguments. The proposed approach is described by using real-world C&A scenarios to show not only its feasibility for security requirements risk assessment but also its effectiveness for the sensitivity analysis to identify critical influences among information entities in a complex and uncertain operational environment.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131033729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL 基于UML和OCL的静态和动态RBAC约束综合两层分析
Mirco Kuhlmann, K. Sohr, Martin Gogolla
Organizations with stringent security requirements like banks or hospitals frequently adopt role-based access control (RBAC) principles to simplify their internal permission management. Authorization constraints represent a fundamental advanced RBAC concept enabling precise restrictions on access rights. Thereby, the complexity of the resulting security policies increases so that tool support for comfortable creation and adequate validation is required. We propose a new approach to developing and analyzing RBAC policies using UML for modeling RBAC core concepts and OCL to realize authorization constraints. Dynamic (i. e., time-dependent) constraints, their visual representation in UML and their analysis are of special interest. The approach results in a domain-specific language for RBAC which is highly configurable and extendable with respect to new RBAC concepts and classes of authorization constraints and allows the developer to validate RBAC policies in an effective way. The approach is supported by a UML and OCL validation tool.
银行或医院等具有严格安全要求的组织经常采用基于角色的访问控制(RBAC)原则来简化其内部权限管理。授权约束代表了一个基本的高级RBAC概念,可以对访问权限进行精确的限制。因此,生成的安全策略的复杂性会增加,因此需要工具支持舒适的创建和充分的验证。我们提出了一种新的方法来开发和分析RBAC策略,使用UML建模RBAC核心概念,使用OCL实现授权约束。动态的(例如,依赖于时间的)约束,它们在UML中的可视化表示和它们的分析是特别有趣的。这种方法为RBAC提供了一种特定于领域的语言,这种语言在新的RBAC概念和授权约束类方面具有高度可配置性和可扩展性,并允许开发人员以有效的方式验证RBAC策略。该方法由UML和OCL验证工具支持。
{"title":"Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL","authors":"Mirco Kuhlmann, K. Sohr, Martin Gogolla","doi":"10.1109/SSIRI.2011.18","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.18","url":null,"abstract":"Organizations with stringent security requirements like banks or hospitals frequently adopt role-based access control (RBAC) principles to simplify their internal permission management. Authorization constraints represent a fundamental advanced RBAC concept enabling precise restrictions on access rights. Thereby, the complexity of the resulting security policies increases so that tool support for comfortable creation and adequate validation is required. We propose a new approach to developing and analyzing RBAC policies using UML for modeling RBAC core concepts and OCL to realize authorization constraints. Dynamic (i. e., time-dependent) constraints, their visual representation in UML and their analysis are of special interest. The approach results in a domain-specific language for RBAC which is highly configurable and extendable with respect to new RBAC concepts and classes of authorization constraints and allows the developer to validate RBAC policies in an effective way. The approach is supported by a UML and OCL validation tool.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing 基于突变的防火墙测试用例加权选择评估
Tugkan Tuglular, Gurcan Gercek
As part of network security testing, an administrator needs to know whether the firewall enforces the security policy as expected or not. In this setting, black-box testing and evaluation methodologies can be helpful. In this paper, we employ a simple mutation operation, namely flipping a bit, to generate mutant firewall policies and use them to evaluate our previously proposed weighted test case selection method for firewall testing. In the previously proposed firewall testing approach, abstract test cases that are automatically generated from firewall decision diagrams are instantiated by selecting test input values from different test data pools for each field of firewall policy. Furthermore, a case study is presented to validate the proposed approach.
作为网络安全测试的一部分,管理员需要知道防火墙是否按照预期执行了安全策略。在这种情况下,黑盒测试和评估方法可能会有所帮助。在本文中,我们使用一个简单的突变操作,即翻转位,来生成突变的防火墙策略,并使用它们来评估我们之前提出的用于防火墙测试的加权测试用例选择方法。在先前提出的防火墙测试方法中,通过为防火墙策略的每个字段从不同的测试数据池中选择测试输入值来实例化从防火墙决策图自动生成的抽象测试用例。最后,通过实例分析验证了该方法的有效性。
{"title":"Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing","authors":"Tugkan Tuglular, Gurcan Gercek","doi":"10.1109/SSIRI.2011.22","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.22","url":null,"abstract":"As part of network security testing, an administrator needs to know whether the firewall enforces the security policy as expected or not. In this setting, black-box testing and evaluation methodologies can be helpful. In this paper, we employ a simple mutation operation, namely flipping a bit, to generate mutant firewall policies and use them to evaluate our previously proposed weighted test case selection method for firewall testing. In the previously proposed firewall testing approach, abstract test cases that are automatically generated from firewall decision diagrams are instantiated by selecting test input values from different test data pools for each field of firewall policy. Furthermore, a case study is presented to validate the proposed approach.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121836630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deriving Data Dependence from/for UML State Machine Diagrams 从UML状态机图中导出数据依赖性
Hyeon-Jeong Kim, Doo-Hwan Bae, V. Debroy, W. E. Wong
Slicing is a well-known reduction technique in many areas such as debugging, maintenance, and testing, and thus, there has been considerable research in the application of slicing techniques to models at the design level. UML state machine diagrams can properly describe the behavior of large software systems at the design level. The slicing of UML state machine diagrams is helpful for their maintenance. But it is difficult to apply a slicing algorithm to automatically reduce the diagrams with respect to slicing criteria, because of the unique properties of these diagrams, such as hierarchy and orthogonality. These properties make constructing a data dependence graph highly complicated. Hierarchy between states leads to implicit paths between states, which may affect data dependence. Also, orthogonality (i.e., parallelism) can cause an intransitivity problem when tracing data dependence. In this paper, we discuss an approach to address such problems. We first construct a control flow graph, which explicitly describes all possible transitions; and a hierarchy graph, which depicts the hierarchical structure of state machine diagram. Next we retrieve data dependence information and construct a dependence graph across different levels. We also show how data dependence information is retrieved, by virtue of ATM example.
切片是一种在调试、维护和测试等许多领域中众所周知的约简技术,因此,在设计层面上对切片技术在模型中的应用进行了大量的研究。UML状态机图可以在设计级别恰当地描述大型软件系统的行为。UML状态机图的切片有助于它们的维护。但是,由于图的层次性和正交性等特性,很难应用切片算法根据切片标准对图进行自动约简。这些属性使得构造数据依赖图非常复杂。状态之间的层次结构导致状态之间的隐式路径,这可能会影响数据依赖性。此外,在跟踪数据依赖性时,正交性(即并行性)可能导致不可传递性问题。在本文中,我们讨论了一种解决这类问题的方法。我们首先构造一个控制流图,它明确地描述了所有可能的转换;层次图,描述了状态机图的层次结构。接下来,我们检索数据依赖信息并构建跨不同级别的依赖图。我们还通过ATM示例展示了如何检索数据依赖信息。
{"title":"Deriving Data Dependence from/for UML State Machine Diagrams","authors":"Hyeon-Jeong Kim, Doo-Hwan Bae, V. Debroy, W. E. Wong","doi":"10.1109/SSIRI.2011.19","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.19","url":null,"abstract":"Slicing is a well-known reduction technique in many areas such as debugging, maintenance, and testing, and thus, there has been considerable research in the application of slicing techniques to models at the design level. UML state machine diagrams can properly describe the behavior of large software systems at the design level. The slicing of UML state machine diagrams is helpful for their maintenance. But it is difficult to apply a slicing algorithm to automatically reduce the diagrams with respect to slicing criteria, because of the unique properties of these diagrams, such as hierarchy and orthogonality. These properties make constructing a data dependence graph highly complicated. Hierarchy between states leads to implicit paths between states, which may affect data dependence. Also, orthogonality (i.e., parallelism) can cause an intransitivity problem when tracing data dependence. In this paper, we discuss an approach to address such problems. We first construct a control flow graph, which explicitly describes all possible transitions; and a hierarchy graph, which depicts the hierarchical structure of state machine diagram. Next we retrieve data dependence information and construct a dependence graph across different levels. We also show how data dependence information is retrieved, by virtue of ATM example.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124249229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Synthesis of Static Fault Trees from System Models 基于系统模型的静态故障树自动合成
Jianwen Xiang, Kazuo Yanoo, Y. Maeno, Kumiko Tadano
Fault tree analysis (FTA) is a traditional reliability analysis technique. In practice, the manual development of fault trees could be costly and error-prone, especially in the case of fault tolerant systems due to the inherent complexities such as various dependencies and interactions among components. Some dynamic fault tree gates, such as Functional Dependency (FDEP) and Priority AND (PAND), are proposed to model the functional and sequential dependencies, respectively. Unfortunately, the potential semantic troubles and limitations of these gates have not been well studied before. In this paper, we describe a framework to automatically generate static fault trees from system models specified with SysML. A reliability configuration model (RCM) and a static fault tree model (SFTM) are proposed to embed system configuration information needed for reliability analysis and error mechanism for fault tree generation, respectively. In the SFTM, the static representations of functional and sequential dependencies with standard Boolean AND and OR gates are proposed, which can avoid the problems of the dynamic FDEP and PAND gates and can reduce the cost of analysis based on a combinatorial model. A fault-tolerant parallel processor (FTTP) example is used to demonstrate our approach.
故障树分析是传统的可靠性分析方法。在实践中,手动开发故障树可能代价高昂且容易出错,特别是在容错系统的情况下,由于固有的复杂性,例如组件之间的各种依赖关系和交互。提出了一些动态故障树门,如功能依赖门(FDEP)和优先级与门(PAND),分别对功能依赖和顺序依赖进行建模。不幸的是,这些门的潜在语义问题和局限性尚未得到很好的研究。本文描述了一个从SysML指定的系统模型自动生成静态故障树的框架。提出了可靠性配置模型(RCM)和静态故障树模型(SFTM),分别嵌入可靠性分析所需的系统配置信息和故障树生成的错误机制。在SFTM中,提出了用标准布尔与或门表示功能和顺序依赖关系的静态表示,避免了动态FDEP和PAND门的问题,降低了基于组合模型的分析成本。用一个容错并行处理器(FTTP)的例子来演示我们的方法。
{"title":"Automatic Synthesis of Static Fault Trees from System Models","authors":"Jianwen Xiang, Kazuo Yanoo, Y. Maeno, Kumiko Tadano","doi":"10.1109/SSIRI.2011.32","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.32","url":null,"abstract":"Fault tree analysis (FTA) is a traditional reliability analysis technique. In practice, the manual development of fault trees could be costly and error-prone, especially in the case of fault tolerant systems due to the inherent complexities such as various dependencies and interactions among components. Some dynamic fault tree gates, such as Functional Dependency (FDEP) and Priority AND (PAND), are proposed to model the functional and sequential dependencies, respectively. Unfortunately, the potential semantic troubles and limitations of these gates have not been well studied before. In this paper, we describe a framework to automatically generate static fault trees from system models specified with SysML. A reliability configuration model (RCM) and a static fault tree model (SFTM) are proposed to embed system configuration information needed for reliability analysis and error mechanism for fault tree generation, respectively. In the SFTM, the static representations of functional and sequential dependencies with standard Boolean AND and OR gates are proposed, which can avoid the problems of the dynamic FDEP and PAND gates and can reduce the cost of analysis based on a combinatorial model. A fault-tolerant parallel processor (FTTP) example is used to demonstrate our approach.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph 一种实用的基于有向信息流图的源代码隐蔽信道识别方法
Jingzheng Wu, Liping Ding, Yongji Wang, Wei Han
Covert channel analysis is an important requirement when building secure information systems, and identification is the most difficult task. Although some approaches were presented, they are either experimental or constrained to some particular systems. This paper presents a practical approach based on directed information flow graph taking advantage of the source code analysis. The approach divides the whole system into serval independent modules and analyzes them respectively. All the shared variables and their caller functions are found out from the source codes and modeled into directed information flow graphs. When the information flow branches are visible and modifiable to the external interface, a potential covert channel exists. Contributions made in this paper are as follows: a modularized analysis scheme is proved and reduces the workloads of identifying, a directed information flow graph algorithm is presented and used to model the covert channels, more than 30 covert channels have been identified in Linux kernel source code using this scheme, and a typical channel scenario is constructed.
隐蔽信道分析是构建安全信息系统的重要要求,而识别隐蔽信道是最困难的任务。虽然提出了一些方法,但它们要么是实验性的,要么仅限于某些特定的系统。本文利用源代码分析的优势,提出了一种基于有向信息流图的实用方法。该方法将整个系统划分为几个独立的模块,并分别进行分析。从源代码中找出所有共享变量及其调用函数,并将其建模为有向信息流图。当信息流分支对外部接口可见且可修改时,就存在潜在的隐蔽通道。本文的贡献如下:证明了一种模块化的分析方案,减少了识别的工作量;提出了一种有向信息流图算法,并将其用于隐蔽通道的建模;利用该方案在Linux内核源代码中识别了30多个隐蔽通道,并构建了一个典型的通道场景。
{"title":"A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph","authors":"Jingzheng Wu, Liping Ding, Yongji Wang, Wei Han","doi":"10.1109/SSIRI.2011.17","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.17","url":null,"abstract":"Covert channel analysis is an important requirement when building secure information systems, and identification is the most difficult task. Although some approaches were presented, they are either experimental or constrained to some particular systems. This paper presents a practical approach based on directed information flow graph taking advantage of the source code analysis. The approach divides the whole system into serval independent modules and analyzes them respectively. All the shared variables and their caller functions are found out from the source codes and modeled into directed information flow graphs. When the information flow branches are visible and modifiable to the external interface, a potential covert channel exists. Contributions made in this paper are as follows: a modularized analysis scheme is proved and reduces the workloads of identifying, a directed information flow graph algorithm is presented and used to model the covert channels, more than 30 covert channels have been identified in Linux kernel source code using this scheme, and a typical channel scenario is constructed.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Safe Software: Does It Cost More to Develop? 安全软件:开发成本更高吗?
W. E. Wong, Andrea Demel, V. Debroy, Michael F. Siok
The importance of system safety has intensified in recent years given the ever-growing use of safety-critical systems in avionics, medicine, nuclear energy, and other fields. However, despite the abundance of standards which exist to provide guidance for the development of safe software for safety-critical systems, there is no consensus on how to achieve safety assurance in a cost-effective fashion. This paper reviews five software safety standards: the FAA System Safety Handbook, the US DoD MIL-STD-882D, the UK MoD DEF-STAN 00-56, NASA-STD 8719.13b and the RTCA DO-178B, and evaluates each in terms of cost effectiveness. It provides an overview of several safety-critical projects, ones that have incurred significant cost overruns as well as ones that have produced safety-critical software in a reasonably cost-effective manner. By virtue of discussing such projects we posit that it is possible to develop software, despite significant safety assurance requirements, without necessarily sacrificing cost. Specifically, projects can realize savings by using mature processes and appropriate tools to assist in development of safety-critical software.
近年来,随着安全关键系统在航空电子、医药、核能等领域的应用日益广泛,系统安全的重要性日益凸显。然而,尽管存在大量的标准来为安全关键系统的安全软件开发提供指导,但对于如何以具有成本效益的方式实现安全保证尚无共识。本文回顾了五个软件安全标准:FAA系统安全手册,美国国防部MIL-STD-882D,英国国防部DEF-STAN 00-56, NASA-STD 8719.13b和RTCA DO-178B,并从成本效益方面对每个标准进行了评估。它提供了几个安全关键项目的概述,其中一些项目已经产生了显著的成本超支,还有一些项目已经以合理的成本效益方式生产了安全关键软件。通过讨论这样的项目,我们假设开发软件是可能的,尽管有重要的安全保证需求,但没有必要牺牲成本。具体来说,项目可以通过使用成熟的过程和适当的工具来帮助开发安全关键软件来实现节省。
{"title":"Safe Software: Does It Cost More to Develop?","authors":"W. E. Wong, Andrea Demel, V. Debroy, Michael F. Siok","doi":"10.1109/SSIRI.2011.28","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.28","url":null,"abstract":"The importance of system safety has intensified in recent years given the ever-growing use of safety-critical systems in avionics, medicine, nuclear energy, and other fields. However, despite the abundance of standards which exist to provide guidance for the development of safe software for safety-critical systems, there is no consensus on how to achieve safety assurance in a cost-effective fashion. This paper reviews five software safety standards: the FAA System Safety Handbook, the US DoD MIL-STD-882D, the UK MoD DEF-STAN 00-56, NASA-STD 8719.13b and the RTCA DO-178B, and evaluates each in terms of cost effectiveness. It provides an overview of several safety-critical projects, ones that have incurred significant cost overruns as well as ones that have produced safety-critical software in a reasonably cost-effective manner. By virtue of discussing such projects we posit that it is possible to develop software, despite significant safety assurance requirements, without necessarily sacrificing cost. Specifically, projects can realize savings by using mature processes and appropriate tools to assist in development of safety-critical software.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Execution Constraint Verification of Exception Handling on UML Sequence Diagrams UML序列图异常处理的执行约束验证
S. Ciraci, Hasan Sözer, M. Aksit, W. Havinga
Exception handling alters the control flow of the program. As such, errors introduced in exception handling code may influence the overall program in undesired ways. To detect such errors early and thereby decrease the programming costs, it is worthwhile to consider exception handling at design level. Preferably, design models must be extended to incorporate exception handling behavior and the control flow must be verified accordingly. Common practices for verification require a formal model and semantics of the design. Defining semantics and manually converting design models to formal models are costly. We propose an approach for verifying exception handling in UML design models, where we extend UML with exception handling notations, define execution and exception handling semantics, and automatically transform UML models to a formal model. The formal model is used for generating execution paths. Constraints are specified (as temporal logic formulas) on execution paths and are verified.
异常处理改变程序的控制流。因此,在异常处理代码中引入的错误可能会以不希望的方式影响整个程序。为了尽早检测此类错误,从而降低编程成本,在设计级别考虑异常处理是值得的。最好是,必须扩展设计模型以包含异常处理行为,并且必须相应地验证控制流。验证的常见实践需要设计的正式模型和语义。定义语义和手动将设计模型转换为正式模型的成本很高。我们提出了一种在UML设计模型中验证异常处理的方法,其中我们用异常处理符号扩展UML,定义执行和异常处理语义,并自动将UML模型转换为正式模型。形式化模型用于生成执行路径。在执行路径上指定约束(作为时间逻辑公式)并进行验证。
{"title":"Execution Constraint Verification of Exception Handling on UML Sequence Diagrams","authors":"S. Ciraci, Hasan Sözer, M. Aksit, W. Havinga","doi":"10.1109/SSIRI.2011.13","DOIUrl":"https://doi.org/10.1109/SSIRI.2011.13","url":null,"abstract":"Exception handling alters the control flow of the program. As such, errors introduced in exception handling code may influence the overall program in undesired ways. To detect such errors early and thereby decrease the programming costs, it is worthwhile to consider exception handling at design level. Preferably, design models must be extended to incorporate exception handling behavior and the control flow must be verified accordingly. Common practices for verification require a formal model and semantics of the design. Defining semantics and manually converting design models to formal models are costly. We propose an approach for verifying exception handling in UML design models, where we extend UML with exception handling notations, define execution and exception handling semantics, and automatically transform UML models to a formal model. The formal model is used for generating execution paths. Constraints are specified (as temporal logic formulas) on execution paths and are verified.","PeriodicalId":224250,"journal":{"name":"2011 Fifth International Conference on Secure Software Integration and Reliability Improvement","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132466074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1