首页 > 最新文献

2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)最新文献

英文 中文
Lattice-Based Information Flow Control-by-Construction for Security-by-Design 基于格的信息流构造控制与安全设计
Tobias Runge, Alexander Knüppel, Thomas Thüm, Ina Schaefer
Many software applications contain confidential information, which has to be prevented from leaking through unauthorized access. To enforce confidentiality, there are language-based security mechanisms that rely on information flow control. Typically, these mechanisms work post-hoc by checking whether confidential data is accessed unauthorizedly after the complete program is written. The disadvantage is that incomplete programs cannot be interpreted properly and information flow properties cannot be built in constructively. In this work, we present a methodology to construct programs incrementally using refinement rules to follow a lattice-based information flow policy. In every refinement step, confidentiality and functional correctness of the program is guaranteed, such that insecure programs are prohibited by construction. Our contribution is fourfold. We formalize refinement rules for the constructive information flow control methodology, prove soundness of the refinement rules, show that our approach is at least as expressive as standard language-based mechanisms for information flow, and implement it in a graphical editor called CorC. Our methodology is also usable for integrity properties, which are dual to confidentiality.
许多软件应用程序包含机密信息,必须防止未经授权的访问泄露这些信息。为了加强机密性,存在依赖于信息流控制的基于语言的安全机制。通常,这些机制通过检查是否在编写完整程序后未经授权访问机密数据来进行事后处理。缺点是不能正确解释不完整的程序,不能建设性地构建信息流属性。在这项工作中,我们提出了一种方法,使用细化规则来遵循基于格的信息流策略,以增量方式构建程序。在每一个细化步骤中,都保证了程序的保密性和功能正确性,从而使不安全的程序被构造禁止。我们的贡献是四倍的。我们形式化了构建信息流控制方法的细化规则,证明了细化规则的合理性,表明我们的方法至少与基于标准语言的信息流机制一样具有表现力,并在称为CorC的图形编辑器中实现了它。我们的方法也可用于完整性属性,这与机密性是双重的。
{"title":"Lattice-Based Information Flow Control-by-Construction for Security-by-Design","authors":"Tobias Runge, Alexander Knüppel, Thomas Thüm, Ina Schaefer","doi":"10.1145/3372020.3391565","DOIUrl":"https://doi.org/10.1145/3372020.3391565","url":null,"abstract":"Many software applications contain confidential information, which has to be prevented from leaking through unauthorized access. To enforce confidentiality, there are language-based security mechanisms that rely on information flow control. Typically, these mechanisms work post-hoc by checking whether confidential data is accessed unauthorizedly after the complete program is written. The disadvantage is that incomplete programs cannot be interpreted properly and information flow properties cannot be built in constructively. In this work, we present a methodology to construct programs incrementally using refinement rules to follow a lattice-based information flow policy. In every refinement step, confidentiality and functional correctness of the program is guaranteed, such that insecure programs are prohibited by construction. Our contribution is fourfold. We formalize refinement rules for the constructive information flow control methodology, prove soundness of the refinement rules, show that our approach is at least as expressive as standard language-based mechanisms for information flow, and implement it in a graphical editor called CorC. Our methodology is also usable for integrity properties, which are dual to confidentiality.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129098607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
UML Consistency Rules: a Case Study with Open-Source UML Models UML一致性规则:开源UML模型的案例研究
Damiano Torre, Y. Labiche, M. Genero, M. Elaasar, C. Menghi
UML models are standard artifacts used by software engineers for designing software. As software is designed, different UML diagram types (e.g., class diagrams and sequence diagrams) are produced by software designers. Since the various UML diagram types describe different aspects of a software system, they are not independent but strongly depend on each other, hence they must be consistent. Inconsistencies cause faults in the final software systems. It is, therefore, paramount that they get detected, analyzed, and fixed. Consistency rules are a useful tool proposed in the literature to detect inconsistencies. They categorize constraints that help in identifying inconsistencies when violated. This case study aims at collecting and analyzing UML models with OCL consistency rules proposed in the literature and at promoting the development of a reference benchmark that can be reused by the (FM-)research community. We collected 33 UML consistency rules and 206 different UML diagrams contained in 34 open-source UML models presented in the literature. We propose an FM-based encoding of the consistency rules in OCL. This encoding allows analyzing whether the consistency rules are satisfied or violated within the 34 UML models. To assess the proposed benchmark, we analyzed how the UML models, consistency rules, diagram types contained in the benchmark help in assessing the consistency of UML models, and the consistency of diagrams across the different software development phases. Our results show that the considered UML models and consistency rules allowed identifying 2731 inconsistencies and that those inconsistencies refer to different software development phases. We concluded that the considered UML models and consistency rules could be considered as an initial benchmark that can be further extended by the research community.
UML模型是软件工程师用于设计软件的标准工件。在设计软件时,软件设计者会生成不同的UML图类型(例如,类图和序列图)。由于各种UML图类型描述了软件系统的不同方面,它们不是独立的,而是强烈地相互依赖,因此它们必须是一致的。不一致导致最终的软件系统出现故障。因此,检测、分析和修复它们是至关重要的。一致性规则是文献中提出的一种检测不一致性的有用工具。它们对约束进行分类,帮助识别违反时的不一致性。本案例研究旨在收集和分析文献中提出的具有OCL一致性规则的UML模型,并促进可被(FM-)研究社区重用的参考基准的开发。我们收集了文献中34个开源UML模型中包含的33个UML一致性规则和206个不同的UML图。提出了一种基于fm的OCL一致性规则编码方法。这种编码允许分析34个UML模型中是否满足或违反了一致性规则。为了评估建议的基准,我们分析了基准中包含的UML模型、一致性规则、图类型如何帮助评估UML模型的一致性,以及跨不同软件开发阶段的图的一致性。我们的结果表明,所考虑的UML模型和一致性规则允许识别2731个不一致性,并且这些不一致性涉及不同的软件开发阶段。我们的结论是,所考虑的UML模型和一致性规则可以被认为是一个初始的基准,可以被研究团体进一步扩展。
{"title":"UML Consistency Rules: a Case Study with Open-Source UML Models","authors":"Damiano Torre, Y. Labiche, M. Genero, M. Elaasar, C. Menghi","doi":"10.1145/3372020.3391554","DOIUrl":"https://doi.org/10.1145/3372020.3391554","url":null,"abstract":"UML models are standard artifacts used by software engineers for designing software. As software is designed, different UML diagram types (e.g., class diagrams and sequence diagrams) are produced by software designers. Since the various UML diagram types describe different aspects of a software system, they are not independent but strongly depend on each other, hence they must be consistent. Inconsistencies cause faults in the final software systems. It is, therefore, paramount that they get detected, analyzed, and fixed. Consistency rules are a useful tool proposed in the literature to detect inconsistencies. They categorize constraints that help in identifying inconsistencies when violated. This case study aims at collecting and analyzing UML models with OCL consistency rules proposed in the literature and at promoting the development of a reference benchmark that can be reused by the (FM-)research community. We collected 33 UML consistency rules and 206 different UML diagrams contained in 34 open-source UML models presented in the literature. We propose an FM-based encoding of the consistency rules in OCL. This encoding allows analyzing whether the consistency rules are satisfied or violated within the 34 UML models. To assess the proposed benchmark, we analyzed how the UML models, consistency rules, diagram types contained in the benchmark help in assessing the consistency of UML models, and the consistency of diagrams across the different software development phases. Our results show that the considered UML models and consistency rules allowed identifying 2731 inconsistencies and that those inconsistencies refer to different software development phases. We concluded that the considered UML models and consistency rules could be considered as an initial benchmark that can be further extended by the research community.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131549750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rule-based Word Equation Solving 基于规则的单词方程求解
Joel D. Day, Mitja Kulczynski, F. Manea, Dirk Nowotka, D. B. Poulsen
We present a transformation-system-based technique in the framework of string solving, by reformulating a classical combinatorics on words result, the Lemma of Levi. We further enrich the induced rules by simplification steps based on results from the combinatorial theory of word equations, as well as by the addition of linear length constraints. This transformation-system approach cannot solve all equations efficiently by itself. To improve the efficiency of our transformation-system approach we integrate existing successful string solvers, which are called based on several heuristics. The experimental evaluation we performed shows that integrating our technique as an inprocessing step improves in general the performance of existing solvers.
我们提出了一种基于变换系统的字符串求解技术,通过重新表述经典组合的词结果,列维引理。我们通过基于词方程组合理论结果的简化步骤,以及通过添加线性长度约束,进一步丰富了归纳规则。这种变换系统方法本身不能有效地求解所有方程。为了提高我们的转换系统方法的效率,我们集成了现有的成功的字符串求解器,它们是基于几种启发式方法调用的。我们进行的实验评估表明,将我们的技术集成为一个处理步骤,总体上提高了现有求解器的性能。
{"title":"Rule-based Word Equation Solving","authors":"Joel D. Day, Mitja Kulczynski, F. Manea, Dirk Nowotka, D. B. Poulsen","doi":"10.1145/3372020.3391556","DOIUrl":"https://doi.org/10.1145/3372020.3391556","url":null,"abstract":"We present a transformation-system-based technique in the framework of string solving, by reformulating a classical combinatorics on words result, the Lemma of Levi. We further enrich the induced rules by simplification steps based on results from the combinatorial theory of word equations, as well as by the addition of linear length constraints. This transformation-system approach cannot solve all equations efficiently by itself. To improve the efficiency of our transformation-system approach we integrate existing successful string solvers, which are called based on several heuristics. The experimental evaluation we performed shows that integrating our technique as an inprocessing step improves in general the performance of existing solvers.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Semantic-based Architecture Smell Analysis 基于语义的架构气味分析
Nacha Chondamrongkul, Jing Sun, I. Warren, S. Lee
Software smells have negative impacts on the reliability and modifiability of software systems. The smells in architecture design can be cascaded down to the implementation level and cause issues that require much effort to fix. Therefore, early detection of the architecture smells can benefit the overall quality of the software system. This paper presents an integration of methods that formally define the software architecture design towards architecture smell detection. Our approach serves as a framework that allows the architectural structures and behaviours to be formally analysed based on a coherent technique. We evaluated the accuracy and performance of our approach with the models generated from open source projects. The results show that our approach is effective and functions well.
软件气味对软件系统的可靠性和可修改性有负面影响。体系结构设计中的问题可以级联到实现级别,并导致需要大量努力才能解决的问题。因此,尽早发现架构气味可以提高软件系统的整体质量。本文提出了一种面向体系结构气味检测的正式定义软件体系结构设计的集成方法。我们的方法作为一个框架,允许基于一致的技术对架构结构和行为进行正式分析。我们用开源项目生成的模型评估了我们的方法的准确性和性能。结果表明,该方法是有效的,功能良好。
{"title":"Semantic-based Architecture Smell Analysis","authors":"Nacha Chondamrongkul, Jing Sun, I. Warren, S. Lee","doi":"10.1145/3372020.3391564","DOIUrl":"https://doi.org/10.1145/3372020.3391564","url":null,"abstract":"Software smells have negative impacts on the reliability and modifiability of software systems. The smells in architecture design can be cascaded down to the implementation level and cause issues that require much effort to fix. Therefore, early detection of the architecture smells can benefit the overall quality of the software system. This paper presents an integration of methods that formally define the software architecture design towards architecture smell detection. Our approach serves as a framework that allows the architectural structures and behaviours to be formally analysed based on a coherent technique. We evaluated the accuracy and performance of our approach with the models generated from open source projects. The results show that our approach is effective and functions well.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123668643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mind the gap: Robotic Mission Planning Meets Software Engineering 注意差距:机器人任务规划与软件工程
M. Askarpour, C. Menghi, Gabriele Belli, M. Bersani, Patrizio Pelliccione
In the context of robotic software, the selection of an appropriate planner is one of the most crucial software engineering decisions. Robot planners aim at computing plans (i.e., blueprint of actions) to accomplish a complex mission. While many planners have been proposed in the robotics literature, they are usually evaluated on showcase examples, making hard to understand whether they can be effectively (re)used for realising complex missions, with heterogeneous robots, and in real-world scenarios. In this paper we propose ENFORCE, a framework which allows wrapping FM-based planners into comprehensive software engineering tools, and considers complex robotic missions. ENFORCE relies on (i) realistic maps (e.g, fire escape maps) that describe the environment in which the robots are deployed; (ii) temporal logic for mission specification; and (iii) Uppaal model checker to compute plans that satisfy mission specifications. We evaluated ENFORCE by analyzing how it supports computing plans in real case scenarios, and by evaluating the generated plans in simulated and real environments. The results show that while ENFORCE is adequate for handling single-robot applications, the state explosion still represents a major barrier for reusing existing planners in multi-robot applications.
在机器人软件环境中,选择合适的规划器是最关键的软件工程决策之一。机器人规划者的目标是计算计划(即行动蓝图)来完成复杂的任务。虽然机器人文献中提出了许多规划器,但它们通常是在展示示例中进行评估的,这使得很难理解它们是否可以有效地(重新)用于实现复杂的任务,使用异构机器人,以及在现实世界的场景中。在本文中,我们提出了一个框架,它允许将基于fm的计划器包装到综合的软件工程工具中,并考虑复杂的机器人任务。enforcement依赖于(i)描述机器人部署环境的逼真地图(例如,消防逃生地图);任务规格的时间逻辑;(三)乌帕尔模型检查器,以计算满足任务规格的计划。我们通过分析它在真实场景中如何支持计算计划,以及在模拟和真实环境中评估生成的计划来评估ENFORCE。结果表明,虽然强制执行足以处理单机器人应用,但状态爆炸仍然是在多机器人应用中重用现有规划器的主要障碍。
{"title":"Mind the gap: Robotic Mission Planning Meets Software Engineering","authors":"M. Askarpour, C. Menghi, Gabriele Belli, M. Bersani, Patrizio Pelliccione","doi":"10.1145/3372020.3391561","DOIUrl":"https://doi.org/10.1145/3372020.3391561","url":null,"abstract":"In the context of robotic software, the selection of an appropriate planner is one of the most crucial software engineering decisions. Robot planners aim at computing plans (i.e., blueprint of actions) to accomplish a complex mission. While many planners have been proposed in the robotics literature, they are usually evaluated on showcase examples, making hard to understand whether they can be effectively (re)used for realising complex missions, with heterogeneous robots, and in real-world scenarios. In this paper we propose ENFORCE, a framework which allows wrapping FM-based planners into comprehensive software engineering tools, and considers complex robotic missions. ENFORCE relies on (i) realistic maps (e.g, fire escape maps) that describe the environment in which the robots are deployed; (ii) temporal logic for mission specification; and (iii) Uppaal model checker to compute plans that satisfy mission specifications. We evaluated ENFORCE by analyzing how it supports computing plans in real case scenarios, and by evaluating the generated plans in simulated and real environments. The results show that while ENFORCE is adequate for handling single-robot applications, the state explosion still represents a major barrier for reusing existing planners in multi-robot applications.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129589592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Verification of Privacy-Enhanced Collaborations 核实加强私隐合作计划
Sara Belluccini, R. Nicola, M. Dumas, Pille Pullonen, B. Re, F. Tiezzi
In a distributed scenario it is possible to find systems consisting of independent parties that collaboratively execute a business process, but cannot disclose a subset of the data used in this process to each other. Such systems can be modelled using the PE-BPMN notation: a privacy-enhanced extension of the BPMN process modeling notation. Given a PE-BPMN model, we address the problem of verifying that the content of certain data objects is not leaked to unauthorized parties. To this end, we formalise the semantics of PE-BPMN collaboration diagrams via a translation into process algebraic specifications. This formalisation enables us to apply model checking to detect unintended data leakages in a PE-BPMN model. We specifically consider data leakages in the context of secret sharing technology. The approach has been implemented on top of the mCRL2 toolset, and integrated into the Pleak toolset supporting privacy analysis of business processes. The proposal has been evaluated using real scenarios.
在分布式场景中,有可能找到由独立方组成的系统,这些独立方协作执行业务流程,但不能相互公开此流程中使用的数据子集。这样的系统可以使用PE-BPMN表示法进行建模:这是BPMN流程建模表示法的隐私增强扩展。给定PE-BPMN模型,我们将解决验证某些数据对象的内容不会泄露给未授权方的问题。为此,我们通过转换为过程代数规范来形式化PE-BPMN协作图的语义。这种形式化使我们能够应用模型检查来检测PE-BPMN模型中的意外数据泄漏。我们特别考虑了秘密共享技术背景下的数据泄漏。该方法已在mCRL2工具集之上实现,并集成到支持业务流程隐私分析的Pleak工具集中。这个建议已经用真实的场景进行了评估。
{"title":"Verification of Privacy-Enhanced Collaborations","authors":"Sara Belluccini, R. Nicola, M. Dumas, Pille Pullonen, B. Re, F. Tiezzi","doi":"10.1145/3372020.3391553","DOIUrl":"https://doi.org/10.1145/3372020.3391553","url":null,"abstract":"In a distributed scenario it is possible to find systems consisting of independent parties that collaboratively execute a business process, but cannot disclose a subset of the data used in this process to each other. Such systems can be modelled using the PE-BPMN notation: a privacy-enhanced extension of the BPMN process modeling notation. Given a PE-BPMN model, we address the problem of verifying that the content of certain data objects is not leaked to unauthorized parties. To this end, we formalise the semantics of PE-BPMN collaboration diagrams via a translation into process algebraic specifications. This formalisation enables us to apply model checking to detect unintended data leakages in a PE-BPMN model. We specifically consider data leakages in the context of secret sharing technology. The approach has been implemented on top of the mCRL2 toolset, and integrated into the Pleak toolset supporting privacy analysis of business processes. The proposal has been evaluated using real scenarios.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124176274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Formally Verified Key Management for Industrial Control Systems 面向工控系统的正式验证密钥管理
T. Kulik, Jalil Boudjadar, Diego F. Aranha
Adoption of new digital technologies is impacting all aspects of society. While these new technologies are accepted rapidly within the consumer segment, in the area of industrial control systems the pace of change in computing is slower. This is often due to the criticality and security constraints of such systems, since degraded or hijacked control could lead to injuries or competitive disadvantages. Nowadays a critical component of control systems is the key management protocol for protecting communication. This is specifically important as more and more devices become part of industrial control networks. The key management system must be reliable and robust in order to ensure stable operation of the system with minimum downtime. This often means that the system needs to be autonomous and dynamic, capable of periodically changing the keys automatically and authenticating the system components. Different techniques have been used to examine the reliability and robustness of the key management systems, one promising approach is by using formal methods. In this paper we present a formally verified key management system for use within distributed industrial control systems. We demonstrate that the key management system can reliably handle authentication/communication operations in real-time as well as joining/leaving of control units within the system. We use UPPAAL to analyse several security properties, showing that our models satisfy a collection of requirements defined by our industrial partner and are viable for dynamic key management applications.CCS CONCEPTS• Security and privacy $rightarrow$ Key management; Formal security models; Authorization; Security protocols;
新数字技术的采用正在影响社会的各个方面。虽然这些新技术在消费者领域被迅速接受,但在工业控制系统领域,计算的变化速度较慢。这通常是由于此类系统的重要性和安全性限制,因为退化或劫持控制可能导致伤害或竞争劣势。目前控制系统的一个重要组成部分是保护通信的密钥管理协议。随着越来越多的设备成为工业控制网络的一部分,这一点尤为重要。密钥管理系统必须可靠、健壮,以确保系统在最短的停机时间内稳定运行。这通常意味着系统需要是自治和动态的,能够定期自动更改密钥并对系统组件进行身份验证。已经使用了不同的技术来检查密钥管理系统的可靠性和健壮性,一种有前途的方法是使用形式化方法。在本文中,我们提出了一个正式验证的密钥管理系统,用于分布式工业控制系统。我们证明了密钥管理系统可以可靠地实时处理认证/通信操作以及系统内控制单元的加入/离开。我们使用UPPAAL来分析几个安全属性,显示我们的模型满足我们的工业合作伙伴定义的一系列需求,并且对于动态密钥管理应用程序是可行的。CCS CONCEPTS•安全和隐私$right row$密钥管理;正式安全模型;授权;安全协议;
{"title":"Towards Formally Verified Key Management for Industrial Control Systems","authors":"T. Kulik, Jalil Boudjadar, Diego F. Aranha","doi":"10.1145/3372020.3391555","DOIUrl":"https://doi.org/10.1145/3372020.3391555","url":null,"abstract":"Adoption of new digital technologies is impacting all aspects of society. While these new technologies are accepted rapidly within the consumer segment, in the area of industrial control systems the pace of change in computing is slower. This is often due to the criticality and security constraints of such systems, since degraded or hijacked control could lead to injuries or competitive disadvantages. Nowadays a critical component of control systems is the key management protocol for protecting communication. This is specifically important as more and more devices become part of industrial control networks. The key management system must be reliable and robust in order to ensure stable operation of the system with minimum downtime. This often means that the system needs to be autonomous and dynamic, capable of periodically changing the keys automatically and authenticating the system components. Different techniques have been used to examine the reliability and robustness of the key management systems, one promising approach is by using formal methods. In this paper we present a formally verified key management system for use within distributed industrial control systems. We demonstrate that the key management system can reliably handle authentication/communication operations in real-time as well as joining/leaving of control units within the system. We use UPPAAL to analyse several security properties, showing that our models satisfy a collection of requirements defined by our industrial partner and are viable for dynamic key management applications.CCS CONCEPTS• Security and privacy $rightarrow$ Key management; Formal security models; Authorization; Security protocols;","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122958055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimal Assumptions Refinement for Realizable Specifications 可实现规范的最小假设细化
D. Cavezza, Dalal Alrajeh, A. György
A challenge that has gathered much attention in recent years is automated synthesis of correct-by-construction software systems from declarative specifications. The specification language is typically a subset of linear temporal logic called generalized reactivity of rank 1, for which there exists an efficient synthesis algorithm. Specifications in this language model the system as the interaction between an environment and a controller, the former satisfying a set of assumptions and the latter a set of guarantees. In order for a solution to exist, a sufficient set of assumptions implying the guarantees must be provided. The assumptions must be as general as possible and small enough to be intelligible by engineers that need to assess their consistency with the true environment where the synthesized controller will operate.The search for such assumptions is generally a refinement approach driven by counterstrategies, characterizations of undesirable environment behaviors that force the violation of the guarantees; assumptions are progressively refined in order to exclude such behaviors. In this work we provide a heuristic to drive this counterstrategy-guided search towards smaller refinements. We define a concept of minimality of refinements with respect to counterstrategies and provide an algorithm that provably finds minimal refinements with little time overhead. We show experimentally that it consistently produces one or more shorter solutions than state of the art for a set of popular case studies. We also demonstrate that in a popular case study (AMBA-AHB protocol) our heuristic finds a close-to-optimal solution that cannot be found by previous fully automated approaches.CCS CONCEPTS•Software and its engineering $rightarrow$ Formal software verification; Requirements analysis;•Hardware $rightarrow$ Buses and high-speed links.
近年来,一个备受关注的挑战是根据声明性规范自动合成构造正确的软件系统。规范语言通常是线性时间逻辑的子集,称为秩1的广义反应性,存在一种有效的综合算法。这种语言中的规范将系统建模为环境和控制器之间的交互,前者满足一组假设,后者满足一组保证。为了使解决方案存在,必须提供一组暗示保证的充分假设。这些假设必须尽可能地一般化,并且足够小,以便工程师能够理解,以便评估它们与合成控制器将运行的真实环境的一致性。寻找这种假设通常是一种由反策略驱动的改进方法,即描述迫使违反保证的不受欢迎的环境行为;为了排除这类行为,假设逐渐得到完善。在这项工作中,我们提供了一种启发式方法,将这种反策略引导的搜索推向更小的改进。我们定义了一个关于反策略的最小化优化的概念,并提供了一种算法,可以证明在很少的时间开销下找到最小的优化。我们通过实验证明,对于一组流行的案例研究,它始终如一地产生一个或多个较短的解决方案。我们还证明,在一个流行的案例研究(AMBA-AHB协议)中,我们的启发式方法找到了一个接近最优的解决方案,这是以前的全自动方法无法找到的。CCS CONCEPTS•软件及其工程$右右$正式的软件验证;•硬件:总线和高速链路。
{"title":"Minimal Assumptions Refinement for Realizable Specifications","authors":"D. Cavezza, Dalal Alrajeh, A. György","doi":"10.1145/3372020.3391557","DOIUrl":"https://doi.org/10.1145/3372020.3391557","url":null,"abstract":"A challenge that has gathered much attention in recent years is automated synthesis of correct-by-construction software systems from declarative specifications. The specification language is typically a subset of linear temporal logic called generalized reactivity of rank 1, for which there exists an efficient synthesis algorithm. Specifications in this language model the system as the interaction between an environment and a controller, the former satisfying a set of assumptions and the latter a set of guarantees. In order for a solution to exist, a sufficient set of assumptions implying the guarantees must be provided. The assumptions must be as general as possible and small enough to be intelligible by engineers that need to assess their consistency with the true environment where the synthesized controller will operate.The search for such assumptions is generally a refinement approach driven by counterstrategies, characterizations of undesirable environment behaviors that force the violation of the guarantees; assumptions are progressively refined in order to exclude such behaviors. In this work we provide a heuristic to drive this counterstrategy-guided search towards smaller refinements. We define a concept of minimality of refinements with respect to counterstrategies and provide an algorithm that provably finds minimal refinements with little time overhead. We show experimentally that it consistently produces one or more shorter solutions than state of the art for a set of popular case studies. We also demonstrate that in a popular case study (AMBA-AHB protocol) our heuristic finds a close-to-optimal solution that cannot be found by previous fully automated approaches.CCS CONCEPTS•Software and its engineering $rightarrow$ Formal software verification; Requirements analysis;•Hardware $rightarrow$ Buses and high-speed links.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Active Learning of Decomposable Systems 可分解系统的主动学习
Omar al Duhaiby, J. F. Groote
Active automata learning is a technique of querying black box systems and modelling their behaviour. In this paper, we aim to apply active learning in parts. We formalise the conditions on systems—with a decomposable set of actions—that make learning in parts possible. The systems are themselves decomposable through nonintersecting subsets of actions. Learning these subsystems/components requires less time and resources. We prove that the technique works for both two components as well as an arbitrary number of components. We illustrate the usefulness of this technique through a classical example and through a real example from the industry.CCS CONCEPTS• Computing methodologies $rightarrow$Model development and analysis;• Theory of computation $rightarrow$Formal languages and automata theory; Active learning;• Software and its engineering $rightarrow$ Model-driven software engineering.
主动自动机学习是一种查询黑盒系统并对其行为建模的技术。在本文中,我们的目标是将主动学习应用于部分。我们将系统上的条件形式化——用一组可分解的动作——使局部学习成为可能。系统本身可以通过不相交的动作子集进行分解。学习这些子系统/组件需要较少的时间和资源。我们证明了该技术既适用于两个分量,也适用于任意数量的分量。我们通过一个经典的例子和一个来自行业的真实例子来说明这种技术的有用性。计算方法模型开发和分析计算理论形式语言和自动机理论主动学习;•软件及其工程模型驱动软件工程。
{"title":"Active Learning of Decomposable Systems","authors":"Omar al Duhaiby, J. F. Groote","doi":"10.1145/3372020.3391560","DOIUrl":"https://doi.org/10.1145/3372020.3391560","url":null,"abstract":"Active automata learning is a technique of querying black box systems and modelling their behaviour. In this paper, we aim to apply active learning in parts. We formalise the conditions on systems—with a decomposable set of actions—that make learning in parts possible. The systems are themselves decomposable through nonintersecting subsets of actions. Learning these subsystems/components requires less time and resources. We prove that the technique works for both two components as well as an arbitrary number of components. We illustrate the usefulness of this technique through a classical example and through a real example from the industry.CCS CONCEPTS• Computing methodologies $rightarrow$Model development and analysis;• Theory of computation $rightarrow$Formal languages and automata theory; Active learning;• Software and its engineering $rightarrow$ Model-driven software engineering.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact Analysis of Cyber-Physical Attacks on a Water Tank System via Statistical Model Checking 基于统计模型检验的水箱系统网络物理攻击影响分析
A. Munteanu, Michele Pasqua, Massimo Merro
Cyber-Physical Systems (CPSs) are integrations of distributed computing systems with physical processes that monitor and control entities in a physical environment. Although the range of their applications include several critical domains, the current trend is to verify CPSs with simulation-test systems rather than formal methodologies. In this paper, we test the effectiveness of statistical model checking, within the MODEST TOOLSET, when analyzing the security of a non-trivial quadruple-tank water system equipped with an ad-hoc intrusion detection system (IDS) capable of mitigating attacks. Our goal is to evaluate the impact of three carefully chosen cyber-physical attacks, i. e., attacks targeting sensors and/or actuators of the system with potential consequences on the safety of the inner physical process. Our security analysis estimates both the physical impact of the attacks and the performance of the proposed IDS.CCS CONCEPTS•Computer systems organization $rightarrow$ Sensors and actuators;•Software and its engineering $rightarrow$ Model checking.
信息物理系统(cps)是分布式计算系统与物理过程的集成,用于监视和控制物理环境中的实体。虽然它们的应用范围包括几个关键领域,但目前的趋势是用模拟测试系统而不是正式的方法来验证cps。在本文中,我们在MODEST TOOLSET中测试了统计模型检查的有效性,当分析配备能够减轻攻击的ad-hoc入侵检测系统(IDS)的非平凡四水箱水系统的安全性时。我们的目标是评估三种精心选择的网络物理攻击的影响,即针对系统传感器和/或执行器的攻击,对内部物理过程的安全产生潜在后果。我们的安全分析估计了攻击的物理影响和所建议的IDS的性能。•计算机系统组织$右箭头$传感器和执行器;•软件及其工程$右箭头$模型检查。
{"title":"Impact Analysis of Cyber-Physical Attacks on a Water Tank System via Statistical Model Checking","authors":"A. Munteanu, Michele Pasqua, Massimo Merro","doi":"10.1145/3372020.3391563","DOIUrl":"https://doi.org/10.1145/3372020.3391563","url":null,"abstract":"Cyber-Physical Systems (CPSs) are integrations of distributed computing systems with physical processes that monitor and control entities in a physical environment. Although the range of their applications include several critical domains, the current trend is to verify CPSs with simulation-test systems rather than formal methodologies. In this paper, we test the effectiveness of statistical model checking, within the MODEST TOOLSET, when analyzing the security of a non-trivial quadruple-tank water system equipped with an ad-hoc intrusion detection system (IDS) capable of mitigating attacks. Our goal is to evaluate the impact of three carefully chosen cyber-physical attacks, i. e., attacks targeting sensors and/or actuators of the system with potential consequences on the safety of the inner physical process. Our security analysis estimates both the physical impact of the attacks and the performance of the proposed IDS.CCS CONCEPTS•Computer systems organization $rightarrow$ Sensors and actuators;•Software and its engineering $rightarrow$ Model checking.","PeriodicalId":448369,"journal":{"name":"2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE/ACM 8th International Conference on Formal Methods in Software Engineering (FormaliSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1