A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automatic compositional verification of some Security properties
[chapter]
1996
Lecture Notes in Computer Science
1 The Compositional Security Checker (CSC for short) is a semantic tool for the automatic veri cation of some compositional information ow properties. ...
The information ow security properties which can be veri ed by CSC are some of those classi ed in 4]. They are derivations of some classic notions, e.g. Non Interference 6]. ...
The aim of this work is to present a tool called Compositional Security Checker which can be used to check automatically ( nite state) SPA speci cations against some information ow security properties. ...
doi:10.1007/3-540-61042-1_44
fatcat:p4osbdfevnhhjogunyhvim5upa
Deductive verification of cryptographic software
2010
Innovations in Systems and Software Engineering
We apply state-of-the art deductive verification tools to check security-relevant properties of cryptographic software, including safety, absence of error propagation, and correctness with respect to reference ...
These techniques allow us to integrate automatic proof tools with an interactive proof assistant, where the latter is used off-line to prove once-and-for-all fundamental lemmas about properties of programs ...
Some of the generated proof-obligations would not however be discharged by an automatic prover. ...
doi:10.1007/s11334-010-0127-y
fatcat:ppds2e2jlndujpujasiksuzcxm
Slede: Framework for automatic verification of sensor network security protocol implementations
2009
2009 31st International Conference on Software Engineering - Companion Volume
Key features include automation of: extraction of models, generation and composition of intrusion models, and verification of security properties. ...
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. ...
composition of the models and providing the counterexamples for property violations in terms of the domain language. ...
doi:10.1109/icse-companion.2009.5071045
dblp:conf/icse/HannaR09
fatcat:jawejil4fne6zebinaz6y36uee
Distributed Mils (D-Mils) Specification, Analysis, Deployment, And Assurance Of Distributed Critical Systems
2015
International Conference on High Performance Embedded Architectures and Compilers
Presentation on D-MILS project overview and verification framework ...
requirement: the system satisfy functional
and security requirements even if some
subcomponents fail
n System requirements guaranteed by the properties
of the subcomponents
Requirements and properties ...
on a compositional
approach
n System properties are inferred by component
properties
n Advantages:
n Formalized assumptions: components'
expectations on their environment
t Assumptions must ...
doi:10.5281/zenodo.47985
dblp:conf/hipeac/RuessT15
fatcat:ovbvzpwbarh5dmeckjxa3ru2e4
Formal verification of side-channel countermeasures using self-composition
2013
Science of Computer Programming
Our techniques solve some of the automation problems that had previously been identified for the self-composition technique [26] . This work will be revised in more detail in Section 2. ...
We tackle the formal verification of high-level security policies adopted in the implementation of the recently proposed NaCl cryptographic library. ...
The availability of these lemmas will allow automatic provers to carry out the verification process, validating the potentially large number of verification conditions generated by the self-composition ...
doi:10.1016/j.scico.2011.10.008
fatcat:k4jaosxejraejdgqhyfp6dcly4
Compositionality of Security Protocols: A Research Agenda
2006
Electronical Notes in Theoretical Computer Science
Several formalisms and (semi-)automatic tools for the verification of security protocols have been developed. ...
In this paper we identify a number of issues that are relevant to applying formal methods to the problem of security protocol composition. ...
This layer of abstraction has enabled formal analysis and automatic verification of security protocols. ...
doi:10.1016/j.entcs.2004.12.047
fatcat:imwclgyajzb7digp6nz6r6axf4
Formal Methods Research at SICS and KTH
2003
Electronical Notes in Theoretical Computer Science
using call-graph abstractions and compositional techniques; (iii) Formalisation and analysis of security properties, in the areas of information flow control, authorisation, and verification of security ...
To deal with post-issuence loading, we adopt a compositional approach to verification, allowing global control-flow properties of the whole system to be reduced to local controlflow properties of the individual ...
doi:10.1016/s1571-0661(04)80824-7
fatcat:3rhsokuaw5haxa32nhwne63h7q
Verification of the Correctness in Composed UML Behavioural Diagrams
[chapter]
2010
Studies in Computational Intelligence
In this paper, a verification methodology of a composition of UML behavioural diagrams (State Machine, Activity Diagram, and Sequence Diagram) is proposed. ...
In addition, this operator posses a nice property which allows to handle the verification of large system efficiently. To demonstrate the effectiveness of our approach, a case study is presented. ...
[5] investigate how the verification of security properties can be enabled by adding formal constraints to UML-based security patterns. ...
doi:10.1007/978-3-642-13273-5_11
fatcat:bqr4g347nvdkhlnizwri4io6bq
Current solutions for Web service composition
2004
IEEE Internet Computing
Web service composition lets developers create applications on top of serviceoriented computing's native description, discovery, and communication capabilities. ...
There are many existing approaches to service composition, ranging from abstract methods to those aiming to be industry standards. The authors describe four key issues for Web service composition. ...
Composition correctness requires verification of the composed service's properties, such as security or dependability. ...
doi:10.1109/mic.2004.58
fatcat:e4evym4phbelvevbrbb7eql4qy
MOUSSE: Scaling modelling and verification to complex Heterogeneous Embedded Systems evolution
2012
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)
It supports early rapid modelling of complex HES through smooth refinements, an open interface based on IP-XACT extensions for secure composition of HES components, and automatic testbench generation over ...
This work proposes an advanced methodology based on an open source virtual prototyping framework for verification of complex Heterogeneous Embedded Systems (HES). ...
verification of
functional and non-functional
properties
Testbench for verification of
functional properties
Acceler-
ation
Generators
Automatic
testbench
generation
Automatic
conversion ...
doi:10.1109/date.2012.6176482
dblp:conf/date/BeckerDFMPV12
fatcat:ehp4n5fhkfce7nzhu5eooi6bpu
A Survey of Formal Verification for Business Process Modeling
[chapter]
2008
Lecture Notes in Computer Science
They have defined semantics of the models and applied various logics and formal methods to verification of the rigorousness. ...
This paper focuses on formal verification of the models and surveys the efforts. We also discuss the prospect of the solutions. ...
The followings are process-algebraic approaches to specify and verify secure compositions of business processes. ...
doi:10.1007/978-3-540-69387-1_58
fatcat:thdl3ghdcrc2bnzqtih6czsyzi
Specification, verification, and quantification of security in model-based systems
2015
Computing
In this paper, we review the state-of-the-art related to security specification, verification, and quantification for software and systems that are modeled by using UML or SysML language. ...
The reviewed work fall into the field of secure software and systems engineering that aims at fulfilling the security as an afterthought in the development of secure systems. ...
Those research directions are considered as hot research topics in security and formal verification in both software and hardware modeling for the next years. ...
doi:10.1007/s00607-015-0445-x
fatcat:yuifxclfgfcmhoxjfpateksysq
Deep Attention on Measurable and Behavioral-driven Complete Service Composition Design Process
2021
International Journal of Advanced Computer Science and Applications
specification, formalization, model checking verification and integration steps of desired concrete composite service. ...
The integration of Non-Functional Requirements (NFRs) in each step of service composition process, starting with abstract service composition specification to the generation of the verified and concrete ...
Whereas the semi-automatic verification consists on adding some adjustments into the generated UPPAAL's automata modeling then running the verification of designer's properties. ...
doi:10.14569/ijacsa.2021.0120377
fatcat:ovsvi5nr4ndhrocudw3oth353u
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Σ-Protocols
[chapter]
2010
Lecture Notes in Computer Science
The compiler allows the fully automatic translation of an abstract description of a proof goal into an executable implementation. ...
Finally, our compiler is certifying, in the sense that it automatically produces a formal proof of the soundness of the compiled protocol for a large class of protocols using the Isabelle/HOL theorem prover ...
Also, we would like to thank Stefania Barzan for implementing a preliminary version of the PVT. ...
doi:10.1007/978-3-642-15497-3_10
fatcat:3iizfdskrzal5hb64k5ibm6g2a
FocusST Solution for Analysis of Cryptographic Properties
[article]
2018
arXiv
pre-print
A security flaw in the initial version of TLS specification was revealed using a semi-automatic theorem prover, Isabelle/HOL. ...
In this paper, we present a theory that allows (1) to specify distributed systems formally, (2) to verify their cryptographic wrt. composition properties, and (3) to demonstrate the correctness of syntactic ...
In this work we focus on modelling of security aspects and the corresponding properties of composition. ...
arXiv:1807.01928v1
fatcat:ker7ea54vjgzjlzoxpng6lzjsm
« Previous
Showing results 1 — 15 out of 26,112 results