Idea: simulation based security requirement verification for transaction level models

  • Authors:
  • Johannes Loinig;Christian Steger;Reinhold Weiss;Ernst Haselsteiner

  • Affiliations:
  • Institute for Technical Informatics, Graz University of Technology, Graz, Austria;Institute for Technical Informatics, Graz University of Technology, Graz, Austria;Institute for Technical Informatics, Graz University of Technology, Graz, Austria;NXP Semiconductors Austria GmbH, Gratkorn, Austria

  • Venue:
  • ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hard-ware/software codesign flow. In such a case the system's modules and components are continuously modified and refined until all constraints are met and the system design is in a stable state. A transaction level model can be used for such a design space exploration in this phase. It is essential that security requirements are considered from the very first beginning. In this work we demonstrate a novel approach how to use meta-information in transaction level models to verify the consistent application of security requirements in embedded systems.