Handbook of theoretical computer science (vol. B)
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
A lattice model of secure information flow
Communications of the ACM
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Formal methods in the security business: exotic flowers thriving in an expanding niche
FM'06 Proceedings of the 14th international conference on Formal Methods
Hi-index | 0.00 |
The paper introduces a formal security model for a microprocessor hardware system. The model has been developed as part of the evaluation process of the processor product according to ITSEC assurance level E4. Novel aspects of the model are the need for defining integrity and confidentiality objectives on the hardware level without the operating system or application specification and security policy being given, and the utilisation of an abstract function and data space. The security model consists of a system model given as a state transition automaton on infinite structures, and the formalisation of security objectives by means of properties of automaton behaviours. Validity of the security properties is proved. The paper compares the model with published ones and summarises the lessons learned throughout the modelling process.