首页 > 最新文献

2011 IEEE 13th International Symposium on High-Assurance Systems Engineering最新文献

英文 中文
Monarch: A High-Assurance Java-to-Java (J2j) Source-Code Migrator 君主:一个高保证的java到java (J2j)源代码迁移器
V. Winter, Jonathan Guerrero, Carl Reinke, James T. Perry
JVM-based processors used in embedded systems are often scaled back versions of the standard JVM which do not support the full set of Java byte codes and native methods assumed by a JVM. As a result, code bases such as Java libraries must be migrated in order make them suitable for execution on the embedded JVM-based processor. This paper describes Monarch, a high-assurance Java-to-java (J2j) source code migrator that we are developing to assist such code migrations.
嵌入式系统中使用的基于JVM的处理器通常是标准JVM的缩小版本,这些版本不支持JVM所假定的全部Java字节码和本机方法。因此,必须迁移诸如Java库之类的代码库,以便使它们适合在嵌入式基于jvm的处理器上执行。本文描述了Monarch,一个高保证的Java-to-java (J2j)源代码迁移器,我们正在开发它来帮助这种代码迁移。
{"title":"Monarch: A High-Assurance Java-to-Java (J2j) Source-Code Migrator","authors":"V. Winter, Jonathan Guerrero, Carl Reinke, James T. Perry","doi":"10.1109/HASE.2011.30","DOIUrl":"https://doi.org/10.1109/HASE.2011.30","url":null,"abstract":"JVM-based processors used in embedded systems are often scaled back versions of the standard JVM which do not support the full set of Java byte codes and native methods assumed by a JVM. As a result, code bases such as Java libraries must be migrated in order make them suitable for execution on the embedded JVM-based processor. This paper describes Monarch, a high-assurance Java-to-java (J2j) source code migrator that we are developing to assist such code migrations.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134185630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Testing Service for Lifelong Validation of Dynamic SOA 动态SOA终身验证的测试服务
A. Ceccarelli, M. Vieira, A. Bondavalli
Service Oriented Architectures (SOAs) are increasingly being used to support the information infrastructures of organizations. SOAs are dynamic and evolve after deployment in order to adapt to changes in the requirements and infrastructure. Consequently, traditional validation approaches based on offline testing conducted before deployment are not adequate anymore, demanding for new techniques that allow testing the SOA during its whole lifecycle. In this paper we propose a SOA testing approach based on a composite service that is able to trace SOA evolution and automatically test the various services according to specific testing policies. The paper describes the architecture of the testing service and presents a concrete implementation focused on robustness testing. Results from a case study demonstrate the effectiveness of the proposed approach in discovering and testing the robustness of SOA services.
面向服务的体系结构(soa)越来越多地被用于支持组织的信息基础设施。soa是动态的,在部署之后会发展,以适应需求和基础设施的变化。因此,基于部署前进行的脱机测试的传统验证方法不再适用,需要在整个生命周期中测试SOA的新技术。在本文中,我们提出了一种基于组合服务的SOA测试方法,该方法能够跟踪SOA的演变,并根据特定的测试策略自动测试各种服务。本文描述了测试服务的体系结构,并给出了一个专注于鲁棒性测试的具体实现。案例研究的结果证明了所建议的方法在发现和测试SOA服务的健壮性方面的有效性。
{"title":"A Testing Service for Lifelong Validation of Dynamic SOA","authors":"A. Ceccarelli, M. Vieira, A. Bondavalli","doi":"10.1109/HASE.2011.18","DOIUrl":"https://doi.org/10.1109/HASE.2011.18","url":null,"abstract":"Service Oriented Architectures (SOAs) are increasingly being used to support the information infrastructures of organizations. SOAs are dynamic and evolve after deployment in order to adapt to changes in the requirements and infrastructure. Consequently, traditional validation approaches based on offline testing conducted before deployment are not adequate anymore, demanding for new techniques that allow testing the SOA during its whole lifecycle. In this paper we propose a SOA testing approach based on a composite service that is able to trace SOA evolution and automatically test the various services according to specific testing policies. The paper describes the architecture of the testing service and presents a concrete implementation focused on robustness testing. Results from a case study demonstrate the effectiveness of the proposed approach in discovering and testing the robustness of SOA services.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking 基于概率模型检验的DNS带宽放大攻击及其对策形式化分析
Tushar Deshpande, P. Katsaros, Stylianos Basagiannis, S. Smolka
The DNS Bandwidth Amplification Attack (BAA) is a distributed denial-of-service attack in which a network of computers floods a DNS server with responses to requests that have never been made. Amplification enters into the attack by virtue of the fact that a small 60-byte request can be answered by a substantially larger response of 4,000 bytes or more in size. We use the PRISM probabilistic model checker to introduce a Continuous Time Markov Chain model of the DNS BAA and three recently proposed countermeasures, and to perform an extensive cost-benefit analysis of the countermeasures. Our analysis, which is applicable to both DNS and DNSSec (a security extension of DNS), is based on objective metrics that weigh the benefits for a server in terms of the percentage increase in the processing of legitimate packets against the cost incurred by incorrectly dropping legitimate traffic. The results we obtain, gleaned from more than 450 PRISM runs, demonstrate significant differences between the countermeasures as reflected by their respective net benefits. Our results also reveal that DNSSec is more vulnerable than DNS to a BAA attack, and, relatedly, DNSSec derives significantly less benefit from the countermeasures.
DNS带宽放大攻击(BAA)是一种分布式拒绝服务攻击,其中计算机网络向DNS服务器发送从未发出过的请求响应。由于一个小的60字节请求可以被一个大得多的4000字节或更多的响应所应答,因此放大进入了攻击。我们使用PRISM概率模型检查器介绍了DNS BAA的连续时间马尔可夫链模型和最近提出的三种对策,并对对策进行了广泛的成本效益分析。我们的分析既适用于DNS,也适用于DNSSec (DNS的一种安全扩展),它是基于客观指标来权衡服务器的收益,即合法数据包处理的百分比增加与错误丢弃合法流量所造成的成本。我们从450多次PRISM运行中收集到的结果表明,不同的对策之间存在显著差异,这反映在各自的净效益上。我们的研究结果还表明,DNSSec比DNS更容易受到BAA攻击,并且相对而言,DNSSec从对策中获得的收益明显更少。
{"title":"Formal Analysis of the DNS Bandwidth Amplification Attack and Its Countermeasures Using Probabilistic Model Checking","authors":"Tushar Deshpande, P. Katsaros, Stylianos Basagiannis, S. Smolka","doi":"10.1109/HASE.2011.57","DOIUrl":"https://doi.org/10.1109/HASE.2011.57","url":null,"abstract":"The DNS Bandwidth Amplification Attack (BAA) is a distributed denial-of-service attack in which a network of computers floods a DNS server with responses to requests that have never been made. Amplification enters into the attack by virtue of the fact that a small 60-byte request can be answered by a substantially larger response of 4,000 bytes or more in size. We use the PRISM probabilistic model checker to introduce a Continuous Time Markov Chain model of the DNS BAA and three recently proposed countermeasures, and to perform an extensive cost-benefit analysis of the countermeasures. Our analysis, which is applicable to both DNS and DNSSec (a security extension of DNS), is based on objective metrics that weigh the benefits for a server in terms of the percentage increase in the processing of legitimate packets against the cost incurred by incorrectly dropping legitimate traffic. The results we obtain, gleaned from more than 450 PRISM runs, demonstrate significant differences between the countermeasures as reflected by their respective net benefits. Our results also reveal that DNSSec is more vulnerable than DNS to a BAA attack, and, relatedly, DNSSec derives significantly less benefit from the countermeasures.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Unifying Approach to Validating Specification-Oriented XML Constraints 验证面向规范的XML约束的统一方法
Yongxin Zhao, Zheng Wang, Hao Xiao, Jing Ping, G. Pu, Jifeng He, Huibiao Zhu
In this paper, we present a unifying approach to specifying and verifying specification-oriented XML constraints. The formal tree model and the XML constraint logic are developed to describe the XML documents and constraints respectively. The XML constraint logic, as an extension of the first order logic, is constructed and interpreted in the framework of our formal tree model, where the node domain and value domain for XML are separated rigorously. Furthermore, an effective algorithm is given to establish the satisfaction of the logic formulas with respect to the corresponding tree model. We implement a tool and the experiments are carried out for the standard XMLbased specifications from industry, such as WS-BPEL, WS-CDL, and WSDL. The experimental results show that our approach is effective in practice.
在本文中,我们提出了一种统一的方法来指定和验证面向规范的XML约束。开发了形式树模型和XML约束逻辑来分别描述XML文档和约束。XML约束逻辑作为一阶逻辑的扩展,在我们的形式化树模型框架中构造和解释,其中XML的节点域和值域是严格分离的。此外,给出了一种有效的算法来确定逻辑公式对相应树模型的满足性。我们实现了一个工具,并针对行业中基于xml的标准规范(如WS-BPEL、WS-CDL和WSDL)进行了实验。实验结果表明,该方法在实际应用中是有效的。
{"title":"A Unifying Approach to Validating Specification-Oriented XML Constraints","authors":"Yongxin Zhao, Zheng Wang, Hao Xiao, Jing Ping, G. Pu, Jifeng He, Huibiao Zhu","doi":"10.1109/HASE.2011.28","DOIUrl":"https://doi.org/10.1109/HASE.2011.28","url":null,"abstract":"In this paper, we present a unifying approach to specifying and verifying specification-oriented XML constraints. The formal tree model and the XML constraint logic are developed to describe the XML documents and constraints respectively. The XML constraint logic, as an extension of the first order logic, is constructed and interpreted in the framework of our formal tree model, where the node domain and value domain for XML are separated rigorously. Furthermore, an effective algorithm is given to establish the satisfaction of the logic formulas with respect to the corresponding tree model. We implement a tool and the experiments are carried out for the standard XMLbased specifications from industry, such as WS-BPEL, WS-CDL, and WSDL. The experimental results show that our approach is effective in practice.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Driven Validation of System Architectures 系统架构的模型驱动验证
A. Pflüger, Wolfgang Golubski, Stefan Queins
The architecture is the basic structure of every system. The system architect is responsible for ensuring that it fits to the system requirements even if these requirements change according to new conditions during development process. Our approach defines a model driven process for the architect to validate system architecture against system requirements and it supports the architect in analysing the impacts of requirements changes.
体系结构是每个系统的基本结构。系统架构师负责确保它符合系统需求,即使这些需求在开发过程中根据新的条件发生了变化。我们的方法为架构师定义了一个模型驱动的过程,以根据系统需求验证系统架构,并支持架构师分析需求变更的影响。
{"title":"Model Driven Validation of System Architectures","authors":"A. Pflüger, Wolfgang Golubski, Stefan Queins","doi":"10.1109/HASE.2011.46","DOIUrl":"https://doi.org/10.1109/HASE.2011.46","url":null,"abstract":"The architecture is the basic structure of every system. The system architect is responsible for ensuring that it fits to the system requirements even if these requirements change according to new conditions during development process. Our approach defines a model driven process for the architect to validate system architecture against system requirements and it supports the architect in analysing the impacts of requirements changes.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129344100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Autonomous Online Expansion Technology for ZigBee Wireless Sensor Networks ZigBee无线传感器网络的自主在线扩展技术
M. Haque, Fan Wei, T. Gouda, Xiaodong Lu, K. Mori
In Zig Bee, the router capable devices have restriction to accept a number of devices as children devices. A router capable device can not allow any new device to join as a child device if it reaches to the maximum capacity of children or depth limit. If a device can not join the network, it isolates from the network and becomes an orphan node even though address spaces are available in the network. The orphan problem becomes worse when the topology of the network changes dynamically. In this paper we propose an autonomous online expansion technology for Zig Bee networks that shares available address spaces by router devices to connect maximum number of devices. Our simulation results show that the proposed online expansion technology significantly reduces the orphan nodes in the network.
在zigbee中,具有路由器功能的设备有限制,只能接受多个设备作为子设备。具有路由器功能的设备如果达到子设备的最大容量或深度限制,则不能允许任何新设备作为子设备加入。如果一个设备不能加入网络,即使网络中有可用的地址空间,它也会与网络隔离,成为孤立节点。当网络拓扑结构发生动态变化时,孤立问题变得更加严重。本文提出了一种zigbee网络的自主在线扩展技术,该技术通过路由器设备共享可用地址空间以连接最大数量的设备。仿真结果表明,所提出的在线扩展技术显著减少了网络中的孤立节点。
{"title":"Autonomous Online Expansion Technology for ZigBee Wireless Sensor Networks","authors":"M. Haque, Fan Wei, T. Gouda, Xiaodong Lu, K. Mori","doi":"10.1109/HASE.2011.55","DOIUrl":"https://doi.org/10.1109/HASE.2011.55","url":null,"abstract":"In Zig Bee, the router capable devices have restriction to accept a number of devices as children devices. A router capable device can not allow any new device to join as a child device if it reaches to the maximum capacity of children or depth limit. If a device can not join the network, it isolates from the network and becomes an orphan node even though address spaces are available in the network. The orphan problem becomes worse when the topology of the network changes dynamically. In this paper we propose an autonomous online expansion technology for Zig Bee networks that shares available address spaces by router devices to connect maximum number of devices. Our simulation results show that the proposed online expansion technology significantly reduces the orphan nodes in the network.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114539353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of User Habituation in Keystroke Dynamics on Password Security Policy 按键动力学中用户习惯对密码安全策略的影响
Zahid A. Syed, Sean Banerjee, Qi Cheng, B. Cukic
Access control systems rely on a variety of methods for authenticating legitimate users and preventing malicious ones from accessing the system. The most commonly used system is a simple username and password approach. This technology has been the de-facto standard for remote authentication applications. A username-password based system assumes that only the genuine users know their own credentials. However, breaching this type of system has become a common occurrence in today's age of social networks and modern computational devices. Once broken, the system will accept every authentication trial using compromised credentials until the breach is detected. In this paper, we explore certain aspects of utilizing keystroke dynamics in username-password based systems. We show that as users get habituated to typing their credentials, there is a significant reduction in the variance of the keystroke patterns. This trend is more pronounced for long and complex passwords as opposed to short dictionary based passwords. We also study the time window necessary to perceive habituation in user typing patterns. Furthermore, we show that habituation plays a key role in classification of genuine login attempts by reducing the equal error rate (EER) over time. Finally, we explore an authentication scheme that employs the security of complex passwords and keystroke dynamics. Access control systems rely on a variety of methods for authenticating legitimate users and preventing malicious ones from accessing the system. The most commonly used system is a simple username and password approach. This technology has been the de-facto standard for remote authentication applications. A username-password based system assumes that only the genuine users know their own credentials. However, breaching this type of system has become a common occurrence in today's age of social networks and modern computational devices. Once broken, the system will accept every authentication trial using compromised credentials until the breach is detected. In this paper, we explore certain aspects of utilizing keystroke dynamics in username-password based systems. We show that as users get habituated to typing their credentials, there is a significant reduction in the variance of the keystroke patterns. This trend is more pronounced for long and complex passwords as opposed to short dictionary based passwords. We also study the time window necessary to perceive habituation in user typing patterns. Furthermore, we show that habituation plays a key role in classification of genuine login attempts by reducing the equal error rate (EER) over time. Finally, we explore an authentication scheme that employs the security of complex passwords and keystroke dynamics.
访问控制系统依靠各种方法来验证合法用户并防止恶意用户访问系统。最常用的系统是简单的用户名和密码方法。这种技术已经成为远程身份验证应用程序的事实上的标准。基于用户名-密码的系统假设只有真正的用户知道自己的凭据。然而,在当今社会网络和现代计算设备的时代,破坏这种类型的系统已经成为一种常见的现象。一旦被攻破,系统将接受使用受损凭据的每一次身份验证试验,直到检测到漏洞。在本文中,我们探讨了在基于用户名-密码的系统中利用击键动力学的某些方面。我们表明,随着用户习惯于输入他们的凭据,击键模式的差异会显著减少。这种趋势在长而复杂的密码中更为明显,而不是基于短字典的密码。我们还研究了感知用户输入模式习惯所需的时间窗口。此外,我们表明,习惯在分类真正的登录尝试中起着关键作用,随着时间的推移减少了相等错误率(EER)。最后,我们探索了一种采用复杂密码和击键动力学安全性的身份验证方案。访问控制系统依靠各种方法来验证合法用户并防止恶意用户访问系统。最常用的系统是简单的用户名和密码方法。这种技术已经成为远程身份验证应用程序的事实上的标准。基于用户名-密码的系统假设只有真正的用户知道自己的凭据。然而,在当今社会网络和现代计算设备的时代,破坏这种类型的系统已经成为一种常见的现象。一旦被攻破,系统将接受使用受损凭据的每一次身份验证试验,直到检测到漏洞。在本文中,我们探讨了在基于用户名-密码的系统中利用击键动力学的某些方面。我们表明,随着用户习惯于输入他们的凭据,击键模式的差异会显著减少。这种趋势在长而复杂的密码中更为明显,而不是基于短字典的密码。我们还研究了感知用户输入模式习惯所需的时间窗口。此外,我们表明,习惯在分类真正的登录尝试中起着关键作用,随着时间的推移减少了相等错误率(EER)。最后,我们探索了一种采用复杂密码和击键动力学安全性的身份验证方案。
{"title":"Effects of User Habituation in Keystroke Dynamics on Password Security Policy","authors":"Zahid A. Syed, Sean Banerjee, Qi Cheng, B. Cukic","doi":"10.1109/HASE.2011.16","DOIUrl":"https://doi.org/10.1109/HASE.2011.16","url":null,"abstract":"Access control systems rely on a variety of methods for authenticating legitimate users and preventing malicious ones from accessing the system. The most commonly used system is a simple username and password approach. This technology has been the de-facto standard for remote authentication applications. A username-password based system assumes that only the genuine users know their own credentials. However, breaching this type of system has become a common occurrence in today's age of social networks and modern computational devices. Once broken, the system will accept every authentication trial using compromised credentials until the breach is detected. In this paper, we explore certain aspects of utilizing keystroke dynamics in username-password based systems. We show that as users get habituated to typing their credentials, there is a significant reduction in the variance of the keystroke patterns. This trend is more pronounced for long and complex passwords as opposed to short dictionary based passwords. We also study the time window necessary to perceive habituation in user typing patterns. Furthermore, we show that habituation plays a key role in classification of genuine login attempts by reducing the equal error rate (EER) over time. Finally, we explore an authentication scheme that employs the security of complex passwords and keystroke dynamics. Access control systems rely on a variety of methods for authenticating legitimate users and preventing malicious ones from accessing the system. The most commonly used system is a simple username and password approach. This technology has been the de-facto standard for remote authentication applications. A username-password based system assumes that only the genuine users know their own credentials. However, breaching this type of system has become a common occurrence in today's age of social networks and modern computational devices. Once broken, the system will accept every authentication trial using compromised credentials until the breach is detected. In this paper, we explore certain aspects of utilizing keystroke dynamics in username-password based systems. We show that as users get habituated to typing their credentials, there is a significant reduction in the variance of the keystroke patterns. This trend is more pronounced for long and complex passwords as opposed to short dictionary based passwords. We also study the time window necessary to perceive habituation in user typing patterns. Furthermore, we show that habituation plays a key role in classification of genuine login attempts by reducing the equal error rate (EER) over time. Finally, we explore an authentication scheme that employs the security of complex passwords and keystroke dynamics.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Verification of Interoperability Security Policies by Model Checking 通过模型检查验证互操作性安全策略
Mazen El Maarabani, A. Cavalli, Iksoon Hwang, Fatiha Zaïdi
Access control policies are the key point for a secured interaction in business community. In general, an information system has to include an interoperability access control security policy to regulate the access from other systems to its resources. The security policy specifies a set of rules that defines the privileges of any subject accessing to the information system resources. In this paper we provide an approach to verify the correctness of contextual based interoperability access control security policies which are integrated in a system model. Security rules are initially described using the organization to organization model (O2O). We first propose an approach to transform O2O security rules to the well known Linear Temporal Logic (LTL). In order to instantiate the LTL formulae from a set of O2O security rules, we provided a mapping between the elements of the O2O security rule and the elements of the functional model in which the security rules are integrated. The resulted LTL formulae are used to verify the correctness of the security rules by model checking.
访问控制策略是业务社区中安全交互的关键。通常,信息系统必须包含互操作性访问控制安全策略,以规范其他系统对其资源的访问。安全策略指定了一组规则,这些规则定义了访问信息系统资源的任何主体的特权。在本文中,我们提供了一种方法来验证集成在系统模型中的基于上下文的互操作性访问控制安全策略的正确性。安全规则最初是使用组织到组织模型(O2O)描述的。我们首先提出了一种将O2O安全规则转换为众所周知的线性时间逻辑(LTL)的方法。为了从一组O2O安全规则中实例化LTL公式,我们提供了O2O安全规则元素与集成安全规则的功能模型元素之间的映射。得到的LTL公式通过模型检查来验证安全规则的正确性。
{"title":"Verification of Interoperability Security Policies by Model Checking","authors":"Mazen El Maarabani, A. Cavalli, Iksoon Hwang, Fatiha Zaïdi","doi":"10.1109/HASE.2011.17","DOIUrl":"https://doi.org/10.1109/HASE.2011.17","url":null,"abstract":"Access control policies are the key point for a secured interaction in business community. In general, an information system has to include an interoperability access control security policy to regulate the access from other systems to its resources. The security policy specifies a set of rules that defines the privileges of any subject accessing to the information system resources. In this paper we provide an approach to verify the correctness of contextual based interoperability access control security policies which are integrated in a system model. Security rules are initially described using the organization to organization model (O2O). We first propose an approach to transform O2O security rules to the well known Linear Temporal Logic (LTL). In order to instantiate the LTL formulae from a set of O2O security rules, we provided a mapping between the elements of the O2O security rule and the elements of the functional model in which the security rules are integrated. The resulted LTL formulae are used to verify the correctness of the security rules by model checking.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124946363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience 使用SysML对安全关键的软硬件接口进行建模:指南和行业经验
M. Sabetzadeh, S. Nejati, L. Briand, A. H. Mills
Safety-critical embedded systems often need to undergo a rigorous certification process to ensure that the safety risks associated with the use of the systems are adequately mitigated. Interfaces between software and hardware components (SW/HW interfaces) play a fundamental role in these systems by linking the systems' control software to either the physical hardware components or to a hardware abstraction layer. Subsequently, safety certification of embedded systems necessarily has to cover the SW/HW interfaces used in these systems. In this paper, we describe a Model Driven Engineering (MDE) approach based on the SysML language, targeted at facilitating the certification of SW/HW interfaces in embedded systems. Our work draws on our experience with maritime and energy systems, but the work should also apply to a broader set of domains, e.g., the automotive sector, where similar design principles are used for (SW/HW) interface design. Our approach leverages our previous work on the development of SysML-based modeling and analysis techniques for safety-critical systems. Specifically, we tailor the methodology developed in our previous work to the development of safety-critical interfaces, and provide step-by-step and practical guidelines aimed at providing the evidence necessary for arguing that the safety-related requirements of an interface are properly addressed by its design. We describe an application of our proposed guidelines to a representative safety-critical interface in the maritime and energy domain.
安全关键型嵌入式系统通常需要经过严格的认证过程,以确保与系统使用相关的安全风险得到充分缓解。软件和硬件组件之间的接口(SW/HW接口)通过将系统的控制软件连接到物理硬件组件或硬件抽象层,在这些系统中起着基础作用。因此,嵌入式系统的安全认证必须涵盖这些系统中使用的软件/硬件接口。在本文中,我们描述了一种基于SysML语言的模型驱动工程(MDE)方法,旨在促进嵌入式系统中软件/硬件接口的认证。我们的工作借鉴了我们在海事和能源系统方面的经验,但这项工作也应该适用于更广泛的领域,例如,汽车行业,其中类似的设计原则用于(SW/HW)接口设计。我们的方法利用了我们以前为安全关键系统开发的基于sysml的建模和分析技术。具体来说,我们将在之前的工作中开发的方法调整为安全关键接口的开发,并提供一步一步的实用指南,旨在提供必要的证据,以证明接口的安全相关需求在其设计中得到了适当的解决。我们描述了我们提出的指导方针在海事和能源领域中具有代表性的安全关键接口的应用。
{"title":"Using SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience","authors":"M. Sabetzadeh, S. Nejati, L. Briand, A. H. Mills","doi":"10.1109/HASE.2011.23","DOIUrl":"https://doi.org/10.1109/HASE.2011.23","url":null,"abstract":"Safety-critical embedded systems often need to undergo a rigorous certification process to ensure that the safety risks associated with the use of the systems are adequately mitigated. Interfaces between software and hardware components (SW/HW interfaces) play a fundamental role in these systems by linking the systems' control software to either the physical hardware components or to a hardware abstraction layer. Subsequently, safety certification of embedded systems necessarily has to cover the SW/HW interfaces used in these systems. In this paper, we describe a Model Driven Engineering (MDE) approach based on the SysML language, targeted at facilitating the certification of SW/HW interfaces in embedded systems. Our work draws on our experience with maritime and energy systems, but the work should also apply to a broader set of domains, e.g., the automotive sector, where similar design principles are used for (SW/HW) interface design. Our approach leverages our previous work on the development of SysML-based modeling and analysis techniques for safety-critical systems. Specifically, we tailor the methodology developed in our previous work to the development of safety-critical interfaces, and provide step-by-step and practical guidelines aimed at providing the evidence necessary for arguing that the safety-related requirements of an interface are properly addressed by its design. We describe an application of our proposed guidelines to a representative safety-critical interface in the maritime and energy domain.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Worst Case Temporal Consistency in Integrated Modular Avionics Systems 集成模块化航空电子系统的最坏情况时间一致性
M. Lauer, Jérôme Ermont, F. Boniol, C. Pagetti
Integrated Modular Avionics (IMA) architectures have been defined for sharing communication and computation resources. The aim of this paper is to evaluate temporal consistency properties of functions implemented on IMA platforms. More specifically, the two contributions are : (1) a modeling approach for IMA platforms based on the tagged signal model and an abstraction of the network, (2) the definition of two evaluation methods for temporal consistency properties. The industrial applicability of the method is demonstrated on an Airbus A380-like platform. We also discuss the significance of the over-approximations induced by the network abstraction.
集成模块化航空电子(IMA)体系结构被定义为共享通信和计算资源。本文的目的是评估在IMA平台上实现的函数的时间一致性特性。更具体地说,这两个贡献是:(1)基于标记信号模型和网络抽象的IMA平台建模方法,(2)定义了两种时间一致性评估方法。在类似空客a380的平台上验证了该方法的工业适用性。我们还讨论了由网络抽象引起的过逼近的意义。
{"title":"Worst Case Temporal Consistency in Integrated Modular Avionics Systems","authors":"M. Lauer, Jérôme Ermont, F. Boniol, C. Pagetti","doi":"10.1109/HASE.2011.48","DOIUrl":"https://doi.org/10.1109/HASE.2011.48","url":null,"abstract":"Integrated Modular Avionics (IMA) architectures have been defined for sharing communication and computation resources. The aim of this paper is to evaluate temporal consistency properties of functions implemented on IMA platforms. More specifically, the two contributions are : (1) a modeling approach for IMA platforms based on the tagged signal model and an abstraction of the network, (2) the definition of two evaluation methods for temporal consistency properties. The industrial applicability of the method is demonstrated on an Airbus A380-like platform. We also discuss the significance of the over-approximations induced by the network abstraction.","PeriodicalId":403140,"journal":{"name":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133035872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2011 IEEE 13th International Symposium on High-Assurance Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1