A model checking-based approach for security policy verification of mobile systems - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Formal Aspects of Computing Année : 2010

A model checking-based approach for security policy verification of mobile systems

Résumé

This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.
Fichier principal
Vignette du fichier
PEER_stage2_10.1007%2Fs00165-010-0159-y.pdf (543.78 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00618198 , version 1 (01-09-2011)

Identifiants

Citer

Chiara Braghin, Natasha Sharygina, Katerina Barone-Adesi. A model checking-based approach for security policy verification of mobile systems. Formal Aspects of Computing, 2010, 23 (5), pp.627-648. ⟨10.1007/s00165-010-0159-y⟩. ⟨hal-00618198⟩

Collections

PEER
36 Consultations
228 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More