A verification approach to applied system security

  • Authors:
  • Achim D. Brucker;Burkhart Wolff

  • Affiliations:
  • Information Security, ETH Zürich, ETH-Zentrum, 8092, Zürich, Switzerland;Universität Freiburg, George-Köhler-Allee 52, 79110, Freiburg, Germany

  • Venue:
  • International Journal on Software Tools for Technology Transfer (STTT) - Special section on formal methods for industrial critical systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a method for the security analysis of realistic models over off-the-shelf systems and their configuration by formal, machine-checked proofs. The presentation follows a large case study based on a formal security analysis of a CVS-Server architecture.The analysis is based on an abstract architecture (enforcing a role-based access control), which is refined to an implementation architecture (based on the usual discretionary access control provided by the POSIX environment). Both architectures serve as a skeleton to formulate access control and confidentiality properties.Both the abstract and the implementation architecture are specified in the language Z. Based on a logical embedding of Z into Isabelle/HOL, we provide formal, machine-checked proofs for consistency properties of the specification, for the correctness of the refinement, and for security properties.